Thanks for this great series. All videos illustrate the basic very well. Help me a lot for my cybersecurity class.
@srushtibhagwat469011 ай бұрын
Which cyber security class do you join? And do you get a job after completing it ?
@helloparvizАй бұрын
superb! concise & fluent. thank you.
@raihanz8675 ай бұрын
good course, this is a rare course in youtube
@amirtamang14884 ай бұрын
plz do not stop uploading videos.
@raiden6313 ай бұрын
Very informative ! Thank you very much ! :)
@satishkarki30203 жыл бұрын
Great Content!!!!!
@iamacoder8331 Жыл бұрын
good content
@FrancoisHarnist8 ай бұрын
Thank you for this course!
@mmnahian Жыл бұрын
great
@blenderbottle3822 жыл бұрын
Really nice video. In HMAC, why do you need to hash both the key and the message? I thought about it and if you just hashed the key, then you can't verify the integrity of the message, and if you just hashed the message, you don't know if the message came from Alice. Is that correct? What if someone had the key in this symmetric algorithm? then they could still send a message hashing both their message and the key and the recipient wouldn't really know who it came from because this hacker had the same key and the recipient wouldn't know what the sender wanted to send originally.
@_uvop_6 ай бұрын
i guess pgp can be code for strings but for files i guess RSA,AES are the best for files(correct me if am wrong)