CDR Ayam®

@CDRAyam - 46 本の動画

チャンネル登録者数 1840人

For educative digital forensic and cybersecurity awareness, reviews, courses, updates, tips by a Learned, Experienced, Skillful and Certified Cybersecurity-F...

最近の動画

Software Reversing Engineering Complete  Master Class 2:57:42

Software Reversing Engineering Complete Master Class

Being Anonymous & Untraceable Online 5:49

Being Anonymous & Untraceable Online

Advanced Encryption Standard (AES) 6:45

Advanced Encryption Standard (AES)

2022 Most Secured Smartphones 29:22

2022 Most Secured Smartphones

Types of Software License Models 4:24

Types of Software License Models

The WHY's about Ukraine's Invasion by Russia 18:57

The WHY's about Ukraine's Invasion by Russia

Forms of System Backdoors 2:44

Forms of System Backdoors

Types of System Backdoors 1:46

Types of System Backdoors

What is a System Backdoor? 1:17

What is a System Backdoor?

10. The Analysis Phase Illustration of Software Reversing 1:25:44

10. The Analysis Phase Illustration of Software Reversing

9. The Design Phase, illustration of Software Reversing 22:47

9. The Design Phase, illustration of Software Reversing

8. The Implementation Phase, illustration of Software Reversing 14:25

8. The Implementation Phase, illustration of Software Reversing

7. Software Reversing Tools and Practical Installation (Practical Lab Setup) 13:18

7. Software Reversing Tools and Practical Installation (Practical Lab Setup)

6. Processes/Concept of Software Reversing Engineering 10:30

6. Processes/Concept of Software Reversing Engineering

5. Becoming a Software Reverse Engineer 2:21

5. Becoming a Software Reverse Engineer

4. Cyber Reverse Engineering Required Skillsets 16:55

4. Cyber Reverse Engineering Required Skillsets

3. Forms of Cyber Reverse Engineering 6:15

3. Forms of Cyber Reverse Engineering

2. Definition of Cyber Reverse Engineering 2:21

2. Definition of Cyber Reverse Engineering

1. Introduction to Software Reverse Engineering 3:52

1. Introduction to Software Reverse Engineering

How IoT Devices are Tracked and Monitored Online 7:00

How IoT Devices are Tracked and Monitored Online

How To Set Up Multi Factor Authentication with a Mobile Device in Microsoft 365 2:28

How To Set Up Multi Factor Authentication with a Mobile Device in Microsoft 365

Secrets about Antivirus You Have to Know 13:06

Secrets about Antivirus You Have to Know

How to Add Subtitle to a Youtube Video for Free 3:17

How to Add Subtitle to a Youtube Video for Free

12 USSD codes to Detect/Deactivate Call Tapping, Diversion & Mobile Hack, 13:28

12 USSD codes to Detect/Deactivate Call Tapping, Diversion & Mobile Hack,

Best Ways To Destroy Digital Data Storage Devices 6:20

Best Ways To Destroy Digital Data Storage Devices

The GAP Principles of Digital Data (Generally Accepted Privacy Principles) 7:34

The GAP Principles of Digital Data (Generally Accepted Privacy Principles)

Militarized Master Cybersecurity Class with Cdr Ayam Part 1/10 1:32:32

Militarized Master Cybersecurity Class with Cdr Ayam Part 1/10

11 - Data Managements and Ownership (detailed explained) 25:36

11 - Data Managements and Ownership (detailed explained)

10 - Code of Ethics for CyberSecurity Professionals 4:35

10 - Code of Ethics for CyberSecurity Professionals

9 - CyberSecurity Goals | how to Enforce and Achieve them (Detailed Explanations) 4:14

9 - CyberSecurity Goals | how to Enforce and Achieve them (Detailed Explanations)

8 - CyberSecurity Certifications + Job Roles - Detailed Explained 31:37

8 - CyberSecurity Certifications + Job Roles - Detailed Explained

7 - All Cybersecurity Jobs Roles, Explained into Details 10:58

7 - All Cybersecurity Jobs Roles, Explained into Details

6 - Who a Productive CyberSecurity Professional is! 3:26

6 - Who a Productive CyberSecurity Professional is!

5 - Qualities of an Effective Cybersecurity Professional 6:10

5 - Qualities of an Effective Cybersecurity Professional

4 - Pillars (Foundation) of Cyber Security 13:39

4 - Pillars (Foundation) of Cyber Security

3 - Forms (Types) of CyberSecurity 2:05

3 - Forms (Types) of CyberSecurity

2 - What is Cyber Security, Assets, Security, Threats, Cyber & Adversary? 2:43

2 - What is Cyber Security, Assets, Security, Threats, Cyber & Adversary?

1 - Introduction of the Course - Cyber Security with CDR. Ayam 2:06

1 - Introduction of the Course - Cyber Security with CDR. Ayam

Master Cybersecurity with CDR Ayam 1:22

Master Cybersecurity with CDR Ayam

Your Data Privacy Rights, Protection and Enforcement 6:48

Your Data Privacy Rights, Protection and Enforcement

Anatomy of the Internet Explained into Details 10:10

Anatomy of the Internet Explained into Details

Most Secretive Mobile Phone Hack 4:18

Most Secretive Mobile Phone Hack

Most Effective IoT Devices, Security Solutions 7:44

Most Effective IoT Devices, Security Solutions

2021 Most Secured Smartphones 5:28

2021 Most Secured Smartphones

Deepfake Detection, Prevention and Counter Measures 8:37

Deepfake Detection, Prevention and Counter Measures

2021 Top 5 Social Engineering Cyber Attacks 8:37

2021 Top 5 Social Engineering Cyber Attacks

動画

Software Reversing Engineering Complete  Master Class 2:57:42

Software Reversing Engineering Complete Master Class

619 回視聴 - 3 年前

Being Anonymous & Untraceable Online 5:49

Being Anonymous & Untraceable Online

464 回視聴 - 3 年前

Advanced Encryption Standard (AES) 6:45

Advanced Encryption Standard (AES)

304 回視聴 - 3 年前

2022 Most Secured Smartphones 29:22

2022 Most Secured Smartphones

624 回視聴 - 3 年前

Types of Software License Models 4:24

Types of Software License Models

2085 回視聴 - 3 年前

The WHY's about Ukraine's Invasion by Russia 18:57

The WHY's about Ukraine's Invasion by Russia

71 回視聴 - 3 年前

Forms of System Backdoors 2:44

Forms of System Backdoors

161 回視聴 - 3 年前

Types of System Backdoors 1:46

Types of System Backdoors

626 回視聴 - 3 年前

What is a System Backdoor? 1:17

What is a System Backdoor?

2041 回視聴 - 3 年前

10. The Analysis Phase Illustration of Software Reversing 1:25:44

10. The Analysis Phase Illustration of Software Reversing

62 回視聴 - 3 年前

9. The Design Phase, illustration of Software Reversing 22:47

9. The Design Phase, illustration of Software Reversing

56 回視聴 - 3 年前

8. The Implementation Phase, illustration of Software Reversing 14:25

8. The Implementation Phase, illustration of Software Reversing

64 回視聴 - 3 年前