2024-07-18
|
ClassLecture
|
5
|
5
|
Introduction to indian cyber law
|
2024-07-16
|
ClassLecture
|
5
|
5
|
Security in cyber security
|
2024-07-15
|
ClassLecture
|
5
|
5
|
Cyber security law
|
2024-07-13
|
ClassLecture
|
5
|
5
|
Introduction to security policy and cyber law
|
2024-07-12
|
ClassLecture
|
5
|
4
|
Digital evidence
|
2024-07-11
|
ClassLecture
|
5
|
4
|
Network forensics in cs
|
2024-07-10
|
ClassLecture
|
5
|
4
|
Network forensics in cs
|
2024-07-09
|
ClassLecture
|
5
|
4
|
Network forensics in cs
|
2024-07-08
|
ClassLecture
|
5
|
4
|
Digital evidence life cycle
|
2024-07-06
|
ClassLecture
|
5
|
4
|
Cyber forensics and digital evidences
|
2024-07-05
|
ClassLecture
|
5
|
4
|
Digital forensics science and branch
|
2024-07-04
|
ClassLecture
|
5
|
3
|
Buffer overflow in cs
|
2024-07-03
|
ClassLecture
|
5
|
3
|
Trojan horse and it's types
|
2024-07-03
|
ClassLecture
|
7
|
3
|
Types of backdoors
|
2024-07-02
|
ClassLecture
|
5
|
3
|
Types of sql injection
|
2024-07-01
|
ClassLecture
|
5
|
3
|
Sql injection in cs
|
2024-06-27
|
ClassLecture
|
5
|
3
|
Bruth force attacks
|
2024-06-26
|
ClassLecture
|
5
|
3
|
Credential attack in password cracking
|
2024-06-26
|
Lab
|
7
|
3
|
How to cracked password
|
2024-06-25
|
ClassLecture
|
5
|
3
|
PASSWORD CRACKING
|
2024-06-19
|
ClassLecture
|
5
|
3
|
Web based anonymisers
|
2024-06-18
|
ClassLecture
|
5
|
3
|
Types of anonymisers
|
2024-06-15
|
ClassLecture
|
5
|
3
|
Web based anonymisers
|
2024-06-13
|
ClassLecture
|
5
|
3
|
Anonymizers server
|
2024-06-12
|
Lab
|
7
|
3
|
Cyber cafe in cyber security lab
|
2024-06-10
|
ClassLecture
|
5
|
3
|
Proxy server and types
|
2024-06-06
|
ClassLecture
|
6
|
2
|
Security in cyber security
|
2024-06-05
|
ClassLecture
|
6
|
2
|
Mobile device management solution
|
2024-06-05
|
Lab
|
7
|
2
|
Cyber security lab
|
2024-06-04
|
ClassLecture
|
5
|
2
|
Security in cyber security
|
2024-06-03
|
ClassLecture
|
5
|
2
|
Mobile device registry setting
|
2024-06-01
|
ClassLecture
|
6
|
2
|
Security in cyber security
|
2024-05-30
|
ClassLecture
|
2
|
2
|
How to protect social engineering
|
2024-05-29
|
ClassLecture
|
5
|
2
|
Mobile phones attack
|
2024-05-29
|
Lab
|
7
|
2
|
Mobile phones attack
|
2024-05-24
|
ClassLecture
|
5
|
2
|
Attacks on mobile and cell phones
|
2024-05-23
|
ClassLecture
|
5
|
2
|
Wireless computing era
|
2024-05-23
|
Lab
|
7
|
2
|
Cyber security lab
|
2024-05-22
|
ClassLecture
|
5
|
2
|
Wireless computing era
|
2024-05-21
|
ClassLecture
|
5
|
2
|
Credit card froud
|
2024-05-20
|
ClassLecture
|
4
|
2
|
Trends and mobility
|
2024-05-18
|
ClassLecture
|
4
|
2
|
Trends and mobility
|
2024-05-18
|
Lab
|
7
|
2
|
Social engineering related lab
|
2024-05-17
|
ClassLecture
|
4
|
2
|
Trends and mobility
|
2024-05-16
|
ClassLecture
|
4
|
2
|
Trends and mobility
|
2024-05-16
|
Lab
|
7
|
2
|
Cyber security lab
|
2024-05-15
|
ClassLecture
|
4
|
2
|
Proliferation of mobile and wireless device
|
2024-05-15
|
Lab
|
7
|
2
|
Cyber security lab
|
2024-05-15
|
Lab
|
7
|
2
|
Cyber security lab
|
2024-05-14
|
ClassLecture
|
4
|
2
|
Features of wireless device
|
2024-05-13
|
ClassLecture
|
4
|
2
|
Features of wireless device
|
2024-05-08
|
ClassLecture
|
4
|
2
|
Features of wireless device
|
2024-05-08
|
Lab
|
7
|
2
|
Cyber security workshop
|
2024-05-06
|
ClassLecture
|
4
|
2
|
Wireless device
|
2024-05-04
|
ClassLecture
|
4
|
1
|
Attacks vectors
|
2024-05-04
|
Lab
|
7
|
1
|
Cyber security lab
|
2024-05-03
|
ClassLecture
|
4
|
1
|
Cyber cafe in cyber security
|
2024-05-02
|
ClassLecture
|
4
|
1
|
Social engineering
|
2024-05-01
|
ClassLecture
|
4
|
1
|
How criminal plan the attack
|
2024-04-30
|
ClassLecture
|
4
|
1
|
Cyber forensics
|
2024-04-27
|
ClassLecture
|
4
|
1
|
Ransomware and sql injection
|
2024-04-25
|
ClassLecture
|
4
|
1
|
Types of malware
|
2024-04-24
|
ClassLecture
|
4
|
1
|
Botnet and it's properties
|
2024-04-23
|
ClassLecture
|
4
|
1
|
Prevention of cyber crime
|
2024-04-20
|
ClassLecture
|
4
|
1
|
Prevention of cyber crime
|
2024-04-20
|
Lab
|
7
|
1
|
Cyber security lab
|
2024-04-19
|
ClassLecture
|
4
|
1
|
Classification of cyber crime
|
2024-04-18
|
ClassLecture
|
4
|
1
|
Classification of cyber crime
|
2024-04-16
|
ClassLecture
|
4
|
1
|
Classification of cybercrime
|
2024-04-15
|
ClassLecture
|
4
|
1
|
What is cyber crime and cyber criminal
|
2024-04-12
|
ClassLecture
|
4
|
1
|
Cyber security
|