You have helped me a lot Sir during my exam period, always brilliant and clear. And Thank you for keeping your teaching in English to help international student here. JESUS bless you. The minimum I can do is this comment. I am thankful for your existence.
You have no idea how you have saved me.. I am taking a resit exam in this course in two months. I hope to return with news of succcess with this help you have provided. Thank you
Sundeep ... lot of people are smart themselves but not everyone can teach well...you are so unique the way you recap and underline points is amazing...it almost took me in engineering class mamories 24 years back ..Thanks for sharing your knowledge.
I am from Pakistan...... Sir u r great teacher.... I was very week in computer security theories... after watching your technical videos.... i feel change...... really you are a great teacher.....i will wait for your message
hi saravanan thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
hi arafad thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi shubham thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Super...lectures .... No words to say... U r explanations are so simple & quick to understand.... Al u r videos make the concepts more clear... Keep doing more videos sir..❤️
TQ for qulity tutorial on cryptography. Add videos to this tutorial on number theory ,fermats theory and eulers and chinese remainder theorem . above topicks are left in this tutorial consept..👍
your lecturing is the best sir, Your videos useful to my career. I requesting upload "BACKEND VIDEOS TO WEBSITE OR FONT-END CONNECT TO BACK-END" videos. I'm waiting for you. MY BEST HEARFULLY WISHES YOUR RUclips CHANNEL.
It was very nice explaination . Thank you so much . Keep up the good work!!!!!! I have on doubt here. But here which key [ public or private key ] should be used for encryption and which key should be used for Decryption [ public key or private key].?
hi anu At ENCRYPTION --- WE HAVE TO USE RECEIVERS PUBLIC KEY At DECRYPTION --- WE HAVE TO USE RECEIVERS PRIVATE KEY Public Key is public to all the users in the network so we have to use receivers public key by the sender. Private Key must be kept secret so we have to use private key at the receivers side. hope your doubt has been clarified.
Thanks for clear explanation in simple manner. One mistake in that flow chart on Enc/Dec. You have mentioned the cipher text is transferred over secure channel. If the channel is secure, then we dont need to encrypt. It can be secure/unsecure, only then the cryotology will be useful.
hI amit sure soon i will upload more videos and give me some time for those videos. thanks for your interest towards our channel and if you like my videos subscribe to my channel and share my videos. thank you.
hi AMIT i would like to have a FEEDBACK ( in the form of video not more than 15 sec) from you towards our channel and my sessions.so that i will collect feedbacks from all and will upload in youtube, Send your valuable FEEDBACK to my WhatsApp number : +91 9885466061 (91 is the country code) waiting for your valuable feedback. ruclips.net/user/sundeepsaradhi SO MAKE A VIDEO WITH FEEDBACK ON OUR CHANNEL AND SEND AS SOON AS POSSIBLE
Hi arafad Thanks for your support and interest towards our channel. Subscribe to our channel and Share our channel with your friends. Keep following our channel.
hi ravi which concept do you want me to upload? thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi prabhakaran thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
superb explanation sir, thanq so much for these tutorials god bless u and every lecture of urs deseves equal number of views and likes once again tq sooooo much
hi TENZIN i would like to have a FEEDBACK ( in the form of video not more than 15 sec) from you towards our channel and my sessions.so that i will collect feedbacks from all and will upload in youtube, Send your valuable FEEDBACK to my WhatsApp number : +91 9885466061 (91 is the country code) waiting for your valuable feedback. ruclips.net/user/sundeepsaradhi SO MAKE A VIDEO WITH FEEDBACK ON OUR CHANNEL AND SEND AS SOON AS POSSIBLE
hi harsh i would like to have a FEEDBACK ( in the form of video not more than 15 sec) from you towards our channel and my sessions.so that i will collect feedbacks from all and will upload in youtube, Send your valuable FEEDBACK VIDEO to my WhatsApp number : +91 9885466061 (91 is the country code) waiting for your valuable feedback. ruclips.net/user/sundeepsaradhi SO MAKE A VIDEO WITH FEEDBACK (in any language) ON OUR CHANNEL AND SEND AS SOON AS POSSIBLE.
hi ananth thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi Purushotham thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Cryptanalysis is not the usual decryption, it is a decryption without the required key. That's is it is a kind of hacking. Cryptography, on the other hand, provides ways for decryption as well, in addition to encryption.
Amazing video sir Sir a small request plz provide a small pdf cheat sheet or any type of reference file so that it will be more helpful you r doing great work sir
You have helped me a lot Sir during my exam period, always brilliant and clear. And Thank you for keeping your teaching in English to help international student here. JESUS bless you. The minimum I can do is this comment. I am thankful for your existence.
Nice
my teacher indian they are the best really its clear ,, you are the best thank u
Hi kim son thank you very much for your interest and subscribe to my channel and share my videos with your friends and support me and my videos
You have no idea how you have saved me.. I am taking a resit exam in this course in two months. I hope to return with news of succcess with this help you have provided. Thank you
It has been 4 years really long time, you must be at another stage in your life, so how was the exam, i wish you the best.
Excellent sir you are really genius. Your mode of teaching is UN comparable. Salute you sir
Crystal clear Explaination.Thanks and great teaching..
Sundeep ... lot of people are smart themselves but not everyone can teach well...you are so unique the way you recap and underline points is amazing...it almost took me in engineering class mamories 24 years back ..Thanks for sharing your knowledge.
hi ganesh
thanks for watching my sessions and interest towards our channel.
nice sir realllyyyyyy
Sir one video on network automation
Sir ur explanation is great
Very good and effective learning channel, thank you for your enthusiastic lessons
Nice information, very good teaching and explanation
Sir, I love this lecture so much and I learn a lot of basic knowledge about network cybersecurity. Thank you so much!!
I am from Pakistan...... Sir u r great teacher.... I was very week in computer security theories... after watching your technical videos.... i feel change...... really you are a great teacher.....i will wait for your message
Thank you so much sir! You explained the concepts very clearly, unlike my university professor.
💯
Best teacher for Network/Web Security....ThankYou so much sir
hi sagar
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Thanks for teaching this series i understand it very clear. God bless you
Superb Sir, Good Explanation and Summary... Thanks for your effort and helping other to learn
Very Nice your explanation. Thank You for sharing these videos.
hi saravanan
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
Your explanation is so clear. Thank you very much for all the videos on network security.
Thank you very much Sir, Excellent presentation as simple as easy to understand. You have helped me from zero with basic concept
your teaching is awesome,,,,,i will surely share this for my friends for understanding
my dear bro or my dear teacher thanks . also you welcome . you are honest person . and you well be reach your goal where if you are
hi arafad
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Excellent abstract of Network security.
These videos helped a lot in Cryptography sem examination, Thanks a lot.
Very nice Series sir !
Thank you!
Also god bless 2x speed feature on RUclips 😍
hi shubham
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Well said
It's blessed bro
But i reccomend to watch it slowly.
Super...lectures .... No words to say... U r explanations are so simple & quick to understand.... Al u r videos make the concepts more clear... Keep doing more videos sir..❤️
TQ for qulity tutorial on cryptography.
Add videos to this tutorial on number theory ,fermats theory and eulers and chinese remainder theorem .
above topicks are left in this tutorial consept..👍
Sir I really like your videos it's easily understood method.....u r teaching way is nicely
Very Nice video and easy to understand . Thank you very much
Sir ap bhut achhi or aram tareeke se samjh aa jaye aye samjhte h hume bhut help h sir. Thank you so much sir .
hi ekta
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Very nice videos sir. Clearing all the concepts.
Thank you so much for providing the summary in the end, sir!
Super sir, all concepts are clearly understand. thank you sir
hi
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
your lecturing is the best sir, Your videos useful to my career. I requesting upload "BACKEND VIDEOS TO WEBSITE OR FONT-END CONNECT TO BACK-END" videos. I'm waiting for you. MY BEST HEARFULLY WISHES YOUR RUclips CHANNEL.
Engineering faculty should learn a lot from u ... Hatsoff sir 🙏🙏
Good playlist sir
Excellent Teaching Model Awesome
Nic way of teaching.... In shot time teach many things... Thanks
Very good and understandable tutorials thank you so much sir
Thank you very much, very well explained video now I finally understand.
Thank you sir , it was really worth watching such wonderful lecture.
hi Amit
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Thank you soo much sir... It's really very clear and by listening once we can understand it sir..
sir thanks very much itne achee se to koi pdata hi ni..
thank u very much sir ur explanation is perfect and ur videos are very useful to me thank u very much for sharing ur knowledge sir
Thanks for the Easy way of explanation 👍👍
It was very nice explaination . Thank you so much . Keep up the good work!!!!!!
I have on doubt here.
But here which key [ public or private key ] should be used for encryption and which key should be used for Decryption [ public key or private key].?
hi anu
At ENCRYPTION --- WE HAVE TO USE RECEIVERS PUBLIC KEY
At DECRYPTION --- WE HAVE TO USE RECEIVERS PRIVATE KEY
Public Key is public to all the users in the network so we have to use receivers public key by the sender.
Private Key must be kept secret so we have to use private key at the receivers side.
hope your doubt has been clarified.
you are a great teacher.
Thanks for clear explanation in simple manner. One mistake in that flow chart on Enc/Dec. You have mentioned the cipher text is transferred over secure channel. If the channel is secure, then we dont need to encrypt. It can be secure/unsecure, only then the cryotology will be useful.
Thanks you sir for providing free video lecture
Thanks 🙏 it's very good explanation
amazing vedios easy to understand the concept by your vedios..... keep it up sir you will go far and get big success
Vera level sir....I understand it clearly thanks a lottttttttttttttttttttttttttt 😍😍😍
best vedio and really good concept delievered by you sir...thankew soo much for this video
Nice explanation easy to understand.
Thank you sir :-)
Thank you helped me. Preparing for security plus exam
I like your videos...thanks a lot sir!
Beautifully explained!
concepts which you are saying is well understood
thank you sir
life saver... this video is so helpful for my exams
Really superb explanation.
Nice explanation sir....thank you sir..🙏🏼
Nice and easy explanation thank you Sir for this video
hi rahul
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Your explanation is excellent. I am studying for Comptia Security + and my exam is only in few days.
Very nice explanation sandeep..!! great work.!!
thank you ramjee...
Thanks very much sir for sharing your knowledge with us🙏🙏🙏
Hai sir u r a best teacher forever and ever
clear and Really Good explanation sir
superb teaching !
Very good instruction
Good Explaination Sir.
Thank you very much sir really superb explanation and clear explanation
NICE SUPER EXCELLENT MOTIVATED
way of explanation is good...
Hi
Thanks for your support towards our channel share our channel with your friends and keep following our channel
Very clear and understandable video, request to make video on different type of algorithms along with their vulnerability study
hI amit sure soon i will upload more videos and give me some time for those videos. thanks for your interest towards our channel and if you like my videos subscribe to my channel and share my videos. thank you.
hi AMIT
i would like to have a FEEDBACK ( in the form of video not more than 15 sec) from you towards our channel and my sessions.so that i will collect feedbacks from all and will upload in youtube,
Send your valuable FEEDBACK to my WhatsApp number : +91 9885466061 (91 is the country code)
waiting for your valuable feedback.
ruclips.net/user/sundeepsaradhi
SO MAKE A VIDEO WITH FEEDBACK ON OUR CHANNEL AND SEND AS SOON AS POSSIBLE
Sir explanations are always brilliant !
Thanks sir me valle eh subject pass aya..tnq sir...😍😍😘😘
I liked ur teaching sir thank u
Great instruction Thank you Sir
Superb explanation SIR 🙏
my dear teacher thanks for your teaching.
Hi arafad
Thanks for your support and interest towards our channel. Subscribe to our channel and Share our channel with your friends. Keep following our channel.
awesome tutorial sir
Good explanation sir..make more videos on information security.. thankyou
hi ravi
which concept do you want me to upload?
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Sundeep Saradhi Kanthety osi layer's.. network devices..ports..how communication happen between layers... like that sir.
You taught me clear ...thank you sir
hi prabhakaran
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Great lecture sir
Sir Ur lectures are awesome they helps me alot
plzzzzz send the SHA-1 ALGORITHM also....
hi ranapratap
i have uploaded SHA-512 algorithm and the explanation and steps are both same for SHA-1.
superb explanation sir, thanq so much for these tutorials god bless u and every lecture of urs deseves equal number of views and likes once again tq sooooo much
hi sudha
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
@@sundeepsaradhi Garu, I love ur videos, I just started learning I loved ur video which video should I see next in order to learn more.
Great job sir
wow! Amazing lecture. Can you Please make a video series for python>>>>> Please
hi thayai
thanks for your support and definitely i will do but takes some time.
hi TENZIN
i would like to have a FEEDBACK ( in the form of video not more than 15 sec) from you towards our channel and my sessions.so that i will collect feedbacks from all and will upload in youtube,
Send your valuable FEEDBACK to my WhatsApp number : +91 9885466061 (91 is the country code)
waiting for your valuable feedback.
ruclips.net/user/sundeepsaradhi
SO MAKE A VIDEO WITH FEEDBACK ON OUR CHANNEL AND SEND AS SOON AS POSSIBLE
Thank you so much for the breakdown. I am now a SUBSCRIBER! Please keep up the great work!
hi thanks for subscribing to our channel and your support and interest towards my session and our channel.
Nice video sir
Thanks for the information sir
Please upload the hashing videos
Begging level to in depth
Appreciate if you also provide the example and application of the concepts
hi harsh
i would like to have a FEEDBACK ( in the form of video not more than 15 sec) from you towards our channel and my sessions.so that i will collect feedbacks from all and will upload in youtube,
Send your valuable FEEDBACK VIDEO to my WhatsApp number : +91 9885466061 (91 is the country code)
waiting for your valuable feedback.
ruclips.net/user/sundeepsaradhi
SO MAKE A VIDEO WITH FEEDBACK (in any language) ON OUR CHANNEL AND SEND AS SOON AS POSSIBLE.
thank you,this video is very useful
clear explanation! thank you
Really good. well explained my friend . Thanks
hi Ibrahim
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.
Tq so much Sir you are god gifted teacher
sir, can you start the series of networking basics for web application security
Very nice explanation tq you sir
thank you sir very clear explained thank you very much
hi ananth
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
SIR UR VIDEOS ARE AWESOME ,
CAN U PLS UPLOAD A VIDEO ON INS SECURITY FRAMEWORK AND CONTENGENCY PLANNING.EXPECTING A QUICK REPLY :)
hi Purushotham
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
sir ok but what about my request
Respected Sir
Does it cover the whole series in sequence for us to start focusing over it. Please confirm?
Cryptanalysis is not the usual decryption, it is a decryption without the required key. That's is it is a kind of hacking. Cryptography, on the other hand, provides ways for decryption as well, in addition to encryption.
Amazing video sir
Sir a small request plz provide a small pdf cheat sheet or any type of reference file so that it will be more helpful
you r doing great work sir
super explanation sir