CDR Ayam®
1.41K subscribers
2:57:42
Software Reversing Engineering Complete Master Class
CDR Ayam®
396 views • 2 years ago
5:49
Being Anonymous & Untraceable Online
CDR Ayam®
428 views • 2 years ago
6:45
Advanced Encryption Standard (AES)
CDR Ayam®
197 views • 2 years ago
29:22
2022 Most Secured Smartphones
CDR Ayam®
520 views • 2 years ago
4:24
Types of Software License Models
CDR Ayam®
1.5K views • 2 years ago
18:57
The WHY's about Ukraine's Invasion by Russia
CDR Ayam®
68 views • 2 years ago
2:44
Forms of System Backdoors
CDR Ayam®
109 views • 2 years ago
1:46
Types of System Backdoors
CDR Ayam®
386 views • 2 years ago
1:17
What is a System Backdoor?
CDR Ayam®
1.4K views • 2 years ago
1:25:44
10. The Analysis Phase Illustration of Software Reversing
CDR Ayam®
56 views • 2 years ago
22:47
9. The Design Phase, illustration of Software Reversing
CDR Ayam®
39 views • 2 years ago
14:25
8. The Implementation Phase, illustration of Software Reversing
CDR Ayam®
46 views • 2 years ago
13:18
7. Software Reversing Tools and Practical Installation (Practical Lab Setup)
CDR Ayam®
59 views • 2 years ago
10:30
6. Processes/Concept of Software Reversing Engineering
CDR Ayam®
30 views • 2 years ago
2:21
5. Becoming a Software Reverse Engineer
CDR Ayam®
55 views • 2 years ago
16:55
4. Cyber Reverse Engineering Required Skillsets
CDR Ayam®
53 views • 2 years ago
6:15
3. Forms of Cyber Reverse Engineering
CDR Ayam®
47 views • 2 years ago
2:21
2. Definition of Cyber Reverse Engineering
CDR Ayam®
42 views • 2 years ago
3:52
1. Introduction to Software Reverse Engineering
CDR Ayam®
82 views • 2 years ago
7:00
How IoT Devices are Tracked and Monitored Online
CDR Ayam®
202 views • 2 years ago
2:28
How To Set Up Multi Factor Authentication with a Mobile Device in Microsoft 365
CDR Ayam®
50 views • 2 years ago
13:06
Secrets about Antivirus You Have to Know
CDR Ayam®
147 views • 2 years ago
3:17
How to Add Subtitle to a Youtube Video for Free
CDR Ayam®
21 views • 2 years ago
13:28
12 USSD codes to Detect/Deactivate Call Tapping, Diversion & Mobile Hack,
CDR Ayam®
47K views • 2 years ago
6:20
Best Ways To Destroy Digital Data Storage Devices
CDR Ayam®
153 views • 2 years ago
7:34
The GAP Principles of Digital Data (Generally Accepted Privacy Principles)
CDR Ayam®
585 views • 2 years ago
1:32:32
Militarized Master Cybersecurity Class with Cdr Ayam Part 1/10
CDR Ayam®
115 views • 2 years ago
25:36
11 - Data Managements and Ownership (detailed explained)
CDR Ayam®
58 views • 2 years ago
4:35
10 - Code of Ethics for CyberSecurity Professionals
CDR Ayam®
624 views • 2 years ago
4:14
9 - CyberSecurity Goals | how to Enforce and Achieve them (Detailed Explanations)
CDR Ayam®
148 views • 2 years ago
Load More