I came here from IBM cybersecurity analyst courses on coursera to gain more clarity on this topic and I must say that I enjoyed this lecture. I found it detailed in explanation and easy to follow. Thank you so much. And also, I loved the Indian accent especially the way he pronounced Tim, haha.
I came here from IBM cybersecurity analyst courses on coursera to gain more clarity on this topic and I must say that I enjoyed this lecture. I found it detailed in explanation and easy to follow. Thank you so much.
And also, I loved the Indian accent especially the way he pronounced Tim, haha.
Did you got job bro?
Such a beautiful and precise explanation, neso team always rocks.
sir your english is too great
Darth will cause breakup of Bob and Alice 😂😂😂 I think darth is ex of Alice
🤧😂🤧🤧🤧
Yarraa nengallaaa🤣🤣🤣
@@revathye4886 😂😂😂tamil ha semma
😂
😂🤣🤣🤣
Very useful for your explanation easily .
Thank you bro😊
What an amazing explanation 🎉 hat's off
The bestest explanation i have ever seen ❤
bob and alice are never going to leave us anywhere..😄. by the way nice explanation.
thankQ for great explanation
Excellent Video.
Amazing explanation.
Such a clean and clear explanation tq
Great lecture!
Thank you sir it's really helpful
easy to remember with your example well explained
Great explanation...❤️
Very helpful video thank you
Beautiful lecture thanks a lot
Awesome explanation!!
Thanks ✨
Nice lecture:)
Thank you so much sir ❤
thank you my god bless you ; this is very helpful
Marvellous 🎉
thanks a lot,
which playlist is this ?
can you please add the playlist link of each video from now on 💛💛
in the description box
ruclips.net/p/PLBlnK6fEyqRgJU3EsOYDTW7m6SUmW6kII
@@nesoacademy thanks 💛💛💛
Thanks dear its very helpful
lessom
well explained...🤝🏿🇿🇲
best explanation. Thank you. Helped a lot
Thank you so much!!
thank you so much!
Thanks. ....😊
What the great informotion
Very nice
Your video watch and I am very very happy
Please upload data structures videos
Thank you .
0:52 is what you are looking for !
Useful one
Please complete control systems asap
thank you
Clear cut..
Thanks
Tqsm sir
Great 👍
thank you so much :)
Awesome
Modification of messages is also called as Man In The Middle Attack right ?? @NesoAcademy
Sir/mam where do I find yours complete notes on this subject
Passive attack can be classified a police callyou and tries to learn more about you these are triad cia messages....
Is phishing a Masquerading or identity theft ?
thx thankss alot
now i came to know that alice is female and bob is male
A little bit of slow speed speaking would be good
He already speaks so slow. I watch in 2x.
Legends watching in 2x
Is bob says i love you and darth modify the message as darth love you truly 😂to you
Poor bob 😂🙃😫
poor Bob xD
Darth vader is dangerous ;)
All jntuh students raise a like
Darth Vaderr
Clean me
Alice should marry Darth , bob knows nothing .
kenapa ini buk :")
Untuk belajar
Would not be better if you could use Indian names or its important to fuch English culture everywhere?
Great idea
9:10 , arrow direction is wrong