Simply Made
6.77K subscribers
1:38
November 25, 2023
Simply Made
447 views • 10 months ago
7:14
software piracy | Pirated software | software piracy in cyber security
Simply Made
23K views • 1 year ago
7:42
cyber terrorism | cyber terrorism in cyber security
Simply Made
34K views • 1 year ago
9:35
Connection oriented and connection less service Part 2 | Reliable and unreliable service Lecture 10
Simply Made
5.2K views • 1 year ago
10:32
Connection oriented and connectionless service | part 1/2 lecture 9
Simply Made
12K views • 1 year ago
10:34
components of computer network | lecture 8
Simply Made
7.6K views • 1 year ago
8:38
Goals of computer network | Lecture 7
Simply Made
9.5K views • 1 year ago
15:43
Attacks on wireless network
Simply Made
19K views • 1 year ago
13:52
Phishing techniques | phishing techniques in cyber security | lecture 37
Simply Made
23K views • 1 year ago
4:31
Phishing | what is phishing | explain phishing attack | Lecture 36
Simply Made
60K views • 1 year ago
17:12
Dos and Ddos attack | Dos attack | denial of service attack | lecture 35
Simply Made
68K views • 1 year ago
6:40
Buffer and overflow | Lecture 34 part 2 | Buffer overflow attack in cyber security
Simply Made
19K views • 1 year ago
7:59
Buffer and overflow | Buffer overflow | part 1 Lecture 33 | Buffer overflow in cyber security
Simply Made
30K views • 1 year ago
10:15
Backdoor in cyber security | Types of backdoors | Lecture 32
Simply Made
25K views • 1 year ago
8:45
Types of trojan horse | Types of trojan horse in cyber security | lecture 31
Simply Made
15K views • 1 year ago
5:57
Trojan horse in cyber security | trojan in cyber security | Lecture 30
Simply Made
38K views • 1 year ago
7:38
worms in cyber security | Virus and worms | Lecture 29
Simply Made
18K views • 1 year ago
13:17
types of virus | virus in cyber security | Part 2 | Lecture 28
Simply Made
13K views • 1 year ago
10:35
virus in cyber security | what is virus | Virus | Lecture 27
Simply Made
17K views • 1 year ago
7:50
Spyware | Spyware in cyber security | Spyware in detail | Lecture 26
Simply Made
24K views • 1 year ago
7:34
keylogger | key logger in cyber security | types of key loggers | Lecture 25
Simply Made
34K views • 1 year ago
7:25
Password cracking | Password cracking techniques | Lecture 24 Part 2 of 2
Simply Made
13K views • 1 year ago
8:40
Password cracking | Password cracking in cyber security | Lecture 24
Simply Made
31K views • 1 year ago
6:03
Proxy server and anonimizer | Lecture 24 Part 2
Simply Made
16K views • 1 year ago
11:43
Proxy servers and anonimizer | Part 1 | Lecture 23
Simply Made
27K views • 1 year ago
7:09
Nature of criminality | Lecture 21 | Exams
Simply Made
7.4K views • 1 year ago
11:47
Jurisdiction | Jurisdiction and cyber crime | Kinds of Jurisdiction | Lecture 20 #exams
Simply Made
18K views • 1 year ago
9:14
Harassment in cyber security | cyber Harassment | Lecture 18 | RGPV | exam
Simply Made
8.5K views • 1 year ago
6:24
Defamation | Defamation in cyber security | cyber Defamation | Lecture 17
Simply Made
19K views • 2 years ago
8:15
Cyber Fraud | cyber fraud in cyber security | Lecture 16
Simply Made
12K views • 2 years ago
Load More