Channel Avatar

Edu Desire @UC2cjZndYKx9p6zkkRiccxxQ@youtube.com

11K subscribers - no pronouns :c

Hello, friends welcome to my channel Edu Desire. Edu Desire


14:29
GUI Programming | What is Tkinter | Key features & Use of Tkinter | What is Widgets | AKTU
24:03
Python Packages | Build in Functions of packages | Matplotlib | NumPy | Pandas | AKTU
23:19
File I/O | Different Mode to Open a File in Python | Reading & Writing File in Python | Seek()
16:30
Python Function | Part of Function | Function Arguments | Default and Keyword Arguments | AKTU
14:32
Python Tuples Data Type | Dictionary Data Type | Dictionary Manipulation | AKTU | BCC302/BCC402
11:39
Python Lists Data Type | Access List Item | List Slicing | List Manipulation | AKTU
14:48
Python Strings | Access String Character | Python Multiline Strings | Python Strings Manipulation
07:18
Control Flow Statement | Break and Continue Statement | Python Programming | AKTU
20:18
Python Loops | For Loop using Ranges, Strings, Lists, and Dictionaries | While Loop | AKTU
17:03
Conditional Statement in Python | if statement | if else statement | elif statement | AKTU
13:40
Python Data Types | Numeric Data Type | Set Data Type | Dictionary Data Type | String | List | Tuple
19:14
Python Operators | Operator Precedence | Operator Associativity | Python Programming AKTU
15:19
Introduction To Python Programming | Python Variables | Local & Global Variable | Example | AKTU
06:53
Python Programming Course Overview in Hindi | Python Programming Playlist | AKTU | BCC302/BCC402
22:05
Intellectual Property | Patent, Copyright, Trademarks | Intellectual Property Legislation in India
21:53
Security Policy and Cyber Law | Digital Personal Data Protection Act 2023 | Indian Cyber Law | AKTU
16:31
Chain of Custody Concept | Network Forensics | Approaching a Computer Forensics Investigation
29:12
Computer Forensics Science | Cyber Forensics and Digital Evidence | Digital Forensics Life Cycle
23:46
DoS and DDoS Attacks | SQL Injection | Buffer Overflow Attack | Identity Theft (ID Theft) | AKTU
13:57
What are Backdoors and Its Types | What is Steganography and its Defferent Technique | AKTU
19:09
What is Virus and Worms? | Virus vs Worms | Trojan-Horses and Its Types | AKTU
43:57
Proxy Servers and Anonymizers | Phishing | Password Cracking | Keyloggers and Spywares | AKTU
24:14
Attacks on Mobile/Cell Phones | Organisational Security Policies in Mobile Computing Era | AKTU
26:36
Security Challenges Posed by Mobile Devices | Authentication Service Security | AKTU
21:20
Mobile and Wireless Device Introduction | Trends in Mobility | Credit Card Frauds in Mobile | AKTU
21:49
What is Social Engineering | Cyber Stalking | Cybercafe and Cybercrime | Attack Vector | AKTU
23:06
What is Cyber Crime | Classifications of Cyber Crimes | Survival Mantra for the Netizens | AKTU
06:45
Introduction to Cyber Security Course Playlist | Detailed Syllabus | AKTU | BCC301/BCC401
06:14
What is an (IDS)Intrusion Detection System | Classification of IDS | AKTU
05:26
What is Firewall | How do firewalls works | Types of Firewalls | AKTU
11:05
SSL(Secure Socket Layer) | How does SSL work | What is SSL Handshake | AKTU
05:46
What is PGP(Pretty Good Privacy) Encryption? | How does PGP Works? | AKTU
11:11
What is Kerberos? | Difference between Kerberos v4 and Kerberos v5 | AKTU
16:33
What is Secure Electronic Transaction(SET) | Dual Signature | Generation of dual signature | AKTU
11:29
Digital Certificate | X.509 Certificate Format | Digital Certificate vs Digital Signature | AKTU
17:21
Digital Signature Standard(DSS) | Digital Signature | Benefits of Digital Signatures | AKTU
12:40
What is a Birthday Attack? | Shannon’s Theory of Confusion and Diffusion | AKTU
16:47
Hash Function | Secure Hash Algorithm(SHA) | Differences Between SHA 256 and SHA 512 | AKTU
20:04
Message Authentication Code(MAC) | Authentication Requirements | Working of MAC | AKTU
15:28
AES (Advanced Encryption Standard) Algorithm | DES vs AES | Application | AKTU
13:31
DES (Data Encryption Standard) Algorithm | Double and Triple DES Algorithm | Cryptography AKTU
22:46
Stream Cipher and Block Cipher | Block Cipher modes of Operation | Cryptography AKTU
15:53
Cryptography and Network Security Attacks | Active Attack Vs Passive Attack | Steganography | AKTU
08:34
What is Encryption and Decryption | Symmetric and Asymmetric Encryption | Cryptography AKTU
19:10
Security Attacks | Security Services | Security Mechanisms | Cryptography AKTU
07:41
Introduction to Cryptography and Network Security Course Playlist | Detailed Syllabus | AKTU
11:46
Economic Opportunities and Business in the Metaverse | Benefits of Metaverse | AKTU
17:56
What is Mixed Reality and its types | Introduction to Artificial Intelligence (AI) | Types of AI
21:07
What is Augmented and Virtual Reality | Differences Between AR and VR | AKTU
15:49
Metaverse as a product of Extended Reality | What is Extended Reality | AKTU
15:18
Metaverse value chain with 7 layers | 7 layers of Metaverse | AKTU | Metaverse Course
11:29
The History of the Metaverse | Evaluation of Metaverse | AKTU | Metaverse Course
06:59
Metaverse Course Overview | Detailed Syllabus | Metaverse Course Playlist AKTU
15:15
What is Metaverse | How Does the Metaverse Work | Immersive Experience | AKTU
11:42
Risk Management in Social Enterprises | Legal Framework for Social Ventures | AKTU | PME
11:53
Social Innovations and Sustainability | Marketing Management | AKTU | PME
16:36
Social Entrepreneurship | Social Sector Perspectives | AKTU | PME
23:12
Projected Funds and Cash Flow Statements | Detailed Project Report (DPR) | AKTU
18:53
Capital Budgeting | Risk and Uncertainty in Project Evaluation | Projected Financial Statements
18:42
Project Financing | Project Cost Estimation | Working Capital Requirements | Sources of Funds