I came here from IBM cybersecurity analyst courses on coursera to gain more clarity on this topic and I must say that I enjoyed this lecture. I found it detailed in explanation and easy to follow. Thank you so much. And also, I loved the Indian accent especially the way he pronounced Tim, haha.
I came here from IBM cybersecurity analyst courses on coursera to gain more clarity on this topic and I must say that I enjoyed this lecture. I found it detailed in explanation and easy to follow. Thank you so much.
And also, I loved the Indian accent especially the way he pronounced Tim, haha.
Did you got job bro?
Such a beautiful and precise explanation, neso team always rocks.
Darth will cause breakup of Bob and Alice 😂😂😂 I think darth is ex of Alice
🤧😂🤧🤧🤧
Yarraa nengallaaa🤣🤣🤣
@@revathye4886 😂😂😂tamil ha semma
😂
😂🤣🤣🤣
Very useful for your explanation easily .
Thank you bro😊
What an amazing explanation 🎉 hat's off
The bestest explanation i have ever seen ❤
Excellent Video.
Amazing explanation.
Such a clean and clear explanation tq
easy to remember with your example well explained
Great lecture!
thankQ for great explanation
Thank you sir it's really helpful
What the great informotion
Beautiful lecture thanks a lot
Very helpful video thank you
thanks a lot,
which playlist is this ?
can you please add the playlist link of each video from now on 💛💛
in the description box
th-cam.com/play/PLBlnK6fEyqRgJU3EsOYDTW7m6SUmW6kII.html
@@nesoacademy thanks 💛💛💛
Awesome explanation!!
Please upload data structures videos
Thank you so much sir ❤
Nice lecture:)
Great explanation...❤️
thank you my god bless you ; this is very helpful
Very nice
Thanks ✨
Clear cut..
well explained...🤝🏿🇿🇲
Your video watch and I am very very happy
best explanation. Thank you. Helped a lot
Thank you .
Please complete control systems asap
Tqsm sir
Thanks
Thank you so much!!
0:52 is what you are looking for !
Useful one
thank you
Thanks. ....😊
All jntuh students raise a like
Thanks dear its very helpful
lessom
thank you so much!
Modification of messages is also called as Man In The Middle Attack right ?? @NesoAcademy
Awesome
thank you so much :)
Passive attack can be classified a police callyou and tries to learn more about you these are triad cia messages....
Sir/mam where do I find yours complete notes on this subject
Great 👍
now i came to know that alice is female and bob is male
Is phishing a Masquerading or identity theft ?
Darth vader is dangerous ;)
A little bit of slow speed speaking would be good
He already speaks so slow. I watch in 2x.
Legends watching in 2x
thx thankss alot
poor Bob xD
Darth Vaderr
kenapa ini buk :")
Untuk belajar
Clean me
Would not be better if you could use Indian names or its important to fuch English culture everywhere?
Great idea
9:10 , arrow direction is wrong