Channel Avatar

Simply Made @UCz-C74rL2U44Fugk0e74WZg@youtube.com

7.2K subscribers - no pronouns :c

The main purpose of this channel is to make exam topic so ea


01:38
November 25, 2023
07:14
software piracy | Pirated software | software piracy in cyber security
07:42
cyber terrorism | cyber terrorism in cyber security
09:35
Connection oriented and connection less service Part 2 | Reliable and unreliable service Lecture 10
10:32
Connection oriented and connectionless service | part 1/2 lecture 9
10:34
components of computer network | lecture 8
08:38
Goals of computer network | Lecture 7
15:43
Attacks on wireless network
13:52
Phishing techniques | phishing techniques in cyber security | lecture 37
04:31
Phishing | what is phishing | explain phishing attack | Lecture 36
17:12
Dos and Ddos attack | Dos attack | denial of service attack | lecture 35
06:40
Buffer and overflow | Lecture 34 part 2 | Buffer overflow attack in cyber security
07:59
Buffer and overflow | Buffer overflow | part 1 Lecture 33 | Buffer overflow in cyber security
10:15
Backdoor in cyber security | Types of backdoors | Lecture 32
08:45
Types of trojan horse | Types of trojan horse in cyber security | lecture 31
05:57
Trojan horse in cyber security | trojan in cyber security | Lecture 30
07:38
worms in cyber security | Virus and worms | Lecture 29
13:17
types of virus | virus in cyber security | Part 2 | Lecture 28
10:35
virus in cyber security | what is virus | Virus | Lecture 27
07:50
Spyware | Spyware in cyber security | Spyware in detail | Lecture 26
07:34
keylogger | key logger in cyber security | types of key loggers | Lecture 25
07:25
Password cracking | Password cracking techniques | Lecture 24 Part 2 of 2
08:40
Password cracking | Password cracking in cyber security | Lecture 24
06:03
Proxy server and anonimizer | Lecture 24 Part 2
11:43
Proxy servers and anonimizer | Part 1 | Lecture 23
07:09
Nature of criminality | Lecture 21 | Exams
11:47
Jurisdiction | Jurisdiction and cyber crime | Kinds of Jurisdiction | Lecture 20 #exams
09:14
Harassment in cyber security | cyber Harassment | Lecture 18 | RGPV | exam
06:24
Defamation | Defamation in cyber security | cyber Defamation | Lecture 17
08:15
Cyber Fraud | cyber fraud in cyber security | Lecture 16
08:41
Hacking | Types of Hacking | punishment of Hacking | Lecture 15 | Exams
10:18
session hijacking || Lecture 13 || RGPV
09:17
Virtual Crime | Lecture 12 | RGPV
08:53
Online Fraud in cyber security | Lecture 11
07:35
Identity Theft in cybercrime | Lecture 10
05:50
computer network intrusion | Lecture 9 | Part 2 | network intrusion techniques
09:58
computer network intrusion | Part 1 | Lecture 8 | RGPV | Exam
09:01
Web jacking || web jacking in cyber crime || Lecture 7
05:12
Internet time theft || Salami Attack || Lecture 6 || RGPV || Exams
08:22
Spamming | Email Spamming | Types of Spamming in Detail | Lecture 5
07:36
Computer network introduction | Introduction to computer network | Lecture 1
10:16
Email Spoofing | what is email spoofing | Lecture 4 | Rgpv | Exam
09:29
Classification of Cyber Crime | Part -1 | Lecture 3 | RGPV
06:02
Challenges of cybercrime | Lecture 2 | RGPV
06:44
Cyber Stalking in detail | Rgpv exam
09:22
OSI model | Application Layer | Presentation layer | Lecture 12
09:37
OSI Model Explained | Open System Interconnection Model | OSI 7 layers | Lecture 11
07:13
Introduction to Cyber Crime | Lecture 1 | RGPV
11:45
Service primitives in Computer Network || Lecture 10
14:04
Design issues of layers || Computer network || Lecture 9
09:00
Protocol Hierarchy || protocol hierarchy in computer network || Part 2/2 || Lecture 8
10:59
Protocol Hierarchy || protocol hierarchy in computer network || part-1/2 || lecture 7
08:37
Architecture of computer network Lecture 6 part 2
08:02
Architecture of computer network | lecture 5 part 1
07:12
Wide Area Network || Metropolitan area network || MAN || WAN || lecture 4
09:21
Local Area Network || LAN || types of computer network || Computer network tutorial || Lecture -3
04:03
Types of computer network || PAN || Personal area network | Lecture 2
07:36
Computer network Introduction || What is computer network | lecture1
09:50
DBMS Introduction | DBMS Concepts - Part 1
03:40
C programming- about course