Edu Desire
Hello, friends welcome to my channel Edu Desire.
Edu Desire is my attempt to teach basics and those computer techniques to people in a short time which took me ages to learn.
At Edu Desire, I teach all computer-related courses basic to high level and computer science and engineering all trending topics and subjects. And I teach all computer science and engineering subjects.
I am SANJEEV YADAV ( B.Tech - Computer Science and Engineering )
(: Quality videos in Hindi :)
GUI Programming | What is Tkinter | Key features & Use of Tkinter | What is Widgets | AKTU
Python Packages | Build in Functions of packages | Matplotlib | NumPy | Pandas | AKTU
File I/O | Different Mode to Open a File in Python | Reading & Writing File in Python | Seek()
Python Function | Part of Function | Function Arguments | Default and Keyword Arguments | AKTU
Python Tuples Data Type | Dictionary Data Type | Dictionary Manipulation | AKTU | BCC302/BCC402
Python Lists Data Type | Access List Item | List Slicing | List Manipulation | AKTU
Python Strings | Access String Character | Python Multiline Strings | Python Strings Manipulation
Control Flow Statement | Break and Continue Statement | Python Programming | AKTU
Python Loops | For Loop using Ranges, Strings, Lists, and Dictionaries | While Loop | AKTU
Conditional Statement in Python | if statement | if else statement | elif statement | AKTU
Python Data Types | Numeric Data Type | Set Data Type | Dictionary Data Type | String | List | Tuple
Python Operators | Operator Precedence | Operator Associativity | Python Programming AKTU
Introduction To Python Programming | Python Variables | Local & Global Variable | Example | AKTU
Python Programming Course Overview in Hindi | Python Programming Playlist | AKTU | BCC302/BCC402
Intellectual Property | Patent, Copyright, Trademarks | Intellectual Property Legislation in India
Security Policy and Cyber Law | Digital Personal Data Protection Act 2023 | Indian Cyber Law | AKTU
Chain of Custody Concept | Network Forensics | Approaching a Computer Forensics Investigation
Computer Forensics Science | Cyber Forensics and Digital Evidence | Digital Forensics Life Cycle
DoS and DDoS Attacks | SQL Injection | Buffer Overflow Attack | Identity Theft (ID Theft) | AKTU
What are Backdoors and Its Types | What is Steganography and its Defferent Technique | AKTU
What is Virus and Worms? | Virus vs Worms | Trojan-Horses and Its Types | AKTU
Proxy Servers and Anonymizers | Phishing | Password Cracking | Keyloggers and Spywares | AKTU
Attacks on Mobile/Cell Phones | Organisational Security Policies in Mobile Computing Era | AKTU
Security Challenges Posed by Mobile Devices | Authentication Service Security | AKTU
Mobile and Wireless Device Introduction | Trends in Mobility | Credit Card Frauds in Mobile | AKTU
What is Social Engineering | Cyber Stalking | Cybercafe and Cybercrime | Attack Vector | AKTU
What is Cyber Crime | Classifications of Cyber Crimes | Survival Mantra for the Netizens | AKTU
Introduction to Cyber Security Course Playlist | Detailed Syllabus | AKTU | BCC301/BCC401
What is an (IDS)Intrusion Detection System | Classification of IDS | AKTU
What is Firewall | How do firewalls works | Types of Firewalls | AKTU