Cyber Llama Talks
P2Ep22: 2005-2010 - Logistic Regression and Feature Engineering
20:06
Cyber Llama Talks
Cyber Career (part 2) - Look through Financial Statement
17:47
Cyber Llama Talks
Cyber Career (part 1) - SecOps vs. Product R&D
8:52
Cyber Llama Talks
P2Ep21: 2005-2010 - ML Overview and Supervised models
13:24
Cyber Llama Talks
P2Ep20: 2005-2010 - Process Emulator III - Optimization
20:11
Cyber Llama Talks
P2Ep19: 2005-2010 - Rootkit Emulator
11:28
Cyber Llama Talks
P2Ep18: 2005-2010 - Process Emulator II
8:34
Cyber Llama Talks
P2Ep17: 2005-2010 - Process Emulator I
12:50
Cyber Llama Talks
P2Ep16: 2005-2010 - CPU Emulator
11:47
Cyber Llama Talks
P2Ep15: 2005-2010 - Anti Malware Technology Overview
9:37
Cyber Llama Talks
P2Ep13: 2005-2010 - Botnets
12:16
Cyber Llama Talks
P2Ep14: Books I, Cyber Llama Recommended
7:44
Cyber Llama Talks
P2Ep11: 2005-2010 - Windows Rootkit 64bit
13:08
Cyber Llama Talks
Xmas Special: Detection Technology Engineering or No "Silver Bullet" Rule
20:33
Cyber Llama Talks
P2Ep12: 2005-2010 - Exploit Kits
8:10
Cyber Llama Talks
P2Ep10: 2005-2010 - Windows Rootkit 32bit - Loading Methods
7:09
Cyber Llama Talks
P2Ep9: 2005-2010 - Windows Rootkit 32bit
12:42
Cyber Llama Talks
P2Ep8: 2005-2010 - Windows Rootkits - Usermode
12:59
Cyber Llama Talks
P2Ep7: 2005-2010 - Windows Rootkits - Intro
7:33
Cyber Llama Talks
Phishing 101: Hiding Phishing URL
8:44
Cyber Llama Talks
Phishing 101: Unrolling an Attack Step by Step
15:46
Cyber Llama Talks
P2Ep6: 2005-2010 - Server-side Polymorphism
17:23
Cyber Llama Talks
P2Ep5: 2005-2010 - Multi-Layer Packing and Advanced Protectors
12:54
Cyber Llama Talks
P2Ep4: 2005-2010 - Malicious Landscape (Technology)
6:20
Cyber Llama Talks
P2Ep3: 2005-2010 - Malicious Landscape (Business)
10:44
Cyber Llama Talks
P2Ep2: 2005-2010 - Key Time Characteristics
4:26
Cyber Llama Talks
P2Ep1: 2005-2010 - At the Peak of the Arm Race
1:40
Cyber Llama Talks
Build your career in cybersecurity right! #shorts
0:16
Cyber Llama Talks
P1Ep15: 2000-2005 - Why so PE centric?
5:42
Cyber Llama Talks
P1Ep14: 2000-2005 - Malware Analysis Labs I
8:42
Cyber Llama Talks
P1Ep13: 2000-2005 - PE Packers (and unpacking)
3:24
Cyber Llama Talks
Start your Cyber Career wisely!
26:24
Cyber Llama Talks
P1Ep12: 2000-2005 - Detection of Polymorphic virus
10:06
Cyber Llama Talks
P1Ep11: 2000-2005 - x86Emu and AV Scripts
7:06
Cyber Llama Talks
Ugly truth about RE career development from a manager
10:15
Cyber Llama Talks
P1Ep10: 2000-2005 - Matching Strategies for AV Signatures
6:58
Cyber Llama Talks
Twisted mind of Reverse Engineers #shorts
0:26
Cyber Llama Talks
P1Ep9: 2000-2005 - Multi-Point or "Nearly Exact" AV Signatures
4:29
Cyber Llama Talks
Teach RE to develop vs Teach Dev to RE? Sharing my experience!
5:13
Cyber Llama Talks
P1Ep8: 2000-2005 - Intro into AV Signatures
4:31
Cyber Llama Talks
P1Ep7: 2000-2005 - Overview of Anti-Malware
4:31
Cyber Llama Talks
P1Ep6: 2000-2005 - Worms
10:02
Cyber Llama Talks
P1Ep5: 2000-2005 - Polymorphic viruses
6:43
Cyber Llama Talks
P1Ep4: 2000-2005 - Polymorphic code
5:33
Cyber Llama Talks
P1Ep3: 2000-2005 - Viruses
6:18
Cyber Llama Talks
P1Ep2: 2000-2005 - PE Format
7:41
Cyber Llama Talks
Evolution of Malware and Anti-Malware - Intro
7:34
Cyber Llama Talks
P1Ep1: 2000-2005 - Malicious Landscape
8:34
Cyber Llama Talks
Why to join this channel? #shorts
0:22
Cyber Llama Talks
Cyber Llama Talks - Intro!
1:21