2024-05-18
|
ClassLecture
|
4
|
5
|
Revision class
|
2024-05-17
|
Class_Test_Assignment
|
6
|
5
|
Class test unit 5
|
2024-05-16
|
ClassLecture
|
6
|
1
|
Information act 2000
|
2024-05-09
|
ClassLecture
|
4
|
3
|
Types of phishing
|
2024-05-08
|
ClassLecture
|
4
|
1
|
Introduction of cyber security
|
2024-05-07
|
ClassLecture
|
4
|
5
|
Class test........
|
2024-05-06
|
ClassLecture
|
3
|
4
|
Stalking cyber crime
|
2024-05-03
|
ClassLecture
|
3
|
5
|
Penetration testing
|
2024-05-02
|
ClassLecture
|
3
|
5
|
Penetration testing tool and software
|
2024-05-01
|
ClassLecture
|
3
|
5
|
Penetration testing
|
2024-04-30
|
ClassLecture
|
3
|
4
|
Network security
|
2024-04-25
|
ClassLecture
|
3
|
5
|
Disaster recovery
|
2024-04-24
|
ClassLecture
|
3
|
4
|
Computer forensics
|
2024-04-20
|
ClassLecture
|
3
|
4
|
Ethical hacking
|
2024-04-19
|
ClassLecture
|
4
|
5
|
internet security
|
2024-04-17
|
ClassLecture
|
4
|
5
|
IT act 2000...
|
2024-04-16
|
ClassLecture
|
4
|
5
|
Revision class
|
2024-04-15
|
ClassLecture
|
4
|
5
|
Cybersecurity law
|
2024-04-10
|
ClassLecture
|
4
|
5
|
Revision class
|
2024-04-09
|
ClassLecture
|
4
|
5
|
Class revision
|
2024-04-06
|
ClassLecture
|
4
|
5
|
Email security
|
2024-04-05
|
ClassLecture
|
4
|
5
|
Digital signature and application
|
2024-04-04
|
ClassLecture
|
4
|
4
|
Digital signature
|
2024-04-03
|
ClassLecture
|
4
|
4
|
Network management
|
2024-04-01
|
ClassLecture
|
4
|
4
|
Network problem
|
2024-03-20
|
ClassLecture
|
4
|
3
|
Class revision
|
2024-03-18
|
ClassLecture
|
4
|
3
|
Revision class
|
2024-03-16
|
ClassLecture
|
4
|
3
|
Modem and WiFi
|
2024-03-15
|
ClassLecture
|
4
|
3
|
Advantages of virus
|
2024-03-14
|
ClassLecture
|
4
|
3
|
Mobile security
|
2024-03-13
|
ClassLecture
|
4
|
3
|
Mobile security
|
2024-03-12
|
ClassLecture
|
4
|
3
|
Network interface card
|
2024-03-11
|
ClassLecture
|
4
|
3
|
Wireless network
|
2024-03-11
|
ClassLecture
|
5
|
3
|
Wireless network security
|
2024-03-09
|
ClassLecture
|
4
|
3
|
Network security
|
2024-03-07
|
ClassLecture
|
4
|
3
|
Network security
|
2024-03-06
|
ClassLecture
|
4
|
3
|
Wireless network
|
2024-03-06
|
ClassLecture
|
5
|
3
|
Components of wireless network
|
2024-03-05
|
ClassLecture
|
4
|
3
|
Wireless network
|
2024-03-04
|
ClassLecture
|
4
|
3
|
Computer threat
|
2024-03-02
|
ClassLecture
|
4
|
2
|
Internet security
|
2024-03-01
|
ClassLecture
|
4
|
2
|
Firewall cyber security
|
2024-02-29
|
ClassLecture
|
4
|
2
|
Internet security
|
2024-02-28
|
ClassLecture
|
4
|
1
|
Types of cyber threat
|
2024-02-27
|
ClassLecture
|
4
|
1
|
What is cyber security
|
2024-02-26
|
ClassLecture
|
3
|
1
|
History of cyber security
|
2024-02-22
|
ClassLecture
|
4
|
1
|
Cyber security appl6
|
2024-02-22
|
ClassLecture
|
3
|
1
|
Cyber security application
|
2024-02-15
|
ClassLecture
|
4
|
1
|
Introduction of cyber security
|