What Is Hashing? | What Is Hashing With Example | Hashing Explained Simply | Simplilearn

preview_player
Показать описание

In this video on what is hashing, we learn about what is hashing with an example, the different applications, advantages and ways to strengthen hashes. Hash functions and hashing guidelines are also explained, and we take a look at how salting and peppering help reduce hash collisions to round out our lesson on hashing explained simply.

The topics covered in this video are:
00:00:00 Why Is Hashing necessary?
00:02:09 What Is Hashing?
00:03:10 Real-World Implementation
00:04:41 Hash Functions
00:05:46 Hashing Guidelines
00:07:29 Ways to Strengthen Hashes

#WhatIsHashing #HashingExplained #WhatIsHashingWithExample #HashingAlgorithmsAndSecurity #HashFunctionsExplainedSimply #CyberSecurity #CyberSecurityTrainingForBeginners #CyberSecurityTutorial #simplilearn

➡️ About Post Graduate Program In Cyber Security

This Post Graduate Program in Cyber Security will help you learn comprehensive approaches to protecting your infrastructure and securing data, including risk analysis, mitigation, and compliance. You will get foundational to advanced skills through industry-leading cyber security certification courses that are part of the program.

✅ Key Features

- Simplilearn Post Graduate Certificate
- Masterclasses from MIT Faculty
- Featuring Modules from MIT SCC and EC-Council
- 8X higher interaction in live online classes conducted by industry experts
- Simplilearn's JobAssist helps you get noticed by top hiring companies
- Industry case studies in cyber security
- Access to CEH Pro Version
- 25+ hands-on projects
- Capstone project in 3 domains
- MIT CSAIL Professional Programs Community

✅ Skills Covered

- Advanced Hacking Concepts
- Network Packet Analysis
- Ethical Hacking
- IDS Firewalls and Honeypots
- Security and Risk Management
- Network Security
- Software Development Security
- Cryptography OSI and TCPIP Models
- Identity and Access Management
- Security Assessment and Testing
- Trojans Backdoors and Countermeasures
- Mobile and Web Technologies

For more information about Simplilearn courses, visit:

🔥🔥 Interested in Attending Live Classes? Call Us: IN - 18002127688 / US - +18445327688
Рекомендации по теме
Комментарии
Автор

Got a Question on this topic? Let us know in the comment section below 👇 and we'll have our experts answer it for you. Cheers!

SimplilearnOfficial
Автор

if the same hash function is used to determine if the passwords match, then if someone finds out what the function is then cant they decrypt the password?

avinashkarthik
Автор

I have watched a few videos on Hashing, this is hand down the best explanation. Thanks!

himanshujoshi
Автор

Lovely simplelearn...
Just read an article about encryption and hashing but you explained clearly. Thank you so much

bantymech
Автор

This video is great sir for a beginner but i have a question if the pepper is same for all users and 2 user have same password and pepper wouldn't there be hash collision ?

rajatbishnoi
Автор

Awesome explanation. Thank you very much!

agob
Автор

Will the output(Digest) be the same if i use any hashing algorithms?

savioa
Автор

Loved the explanation.
Thanks for uploading

Anonymous_it_is
Автор

Hashing still doesn't protect brute force attack, i.e. randomly guessing the password from the user end. If a user password is weak, e.g. password123, hashing wouldn't help at all.

purplecrayon