2024-07-13
|
ClassLecture
|
5
|
4
|
Chain of custody concept
|
2024-07-12
|
ClassLecture
|
5
|
4
|
Digital forensics
|
2024-07-11
|
ClassLecture
|
5
|
4
|
Computer forensics
|
2024-07-10
|
ClassLecture
|
5
|
3
|
Identity theft
|
2024-07-05
|
ClassLecture
|
5
|
3
|
What is Steganography
|
2024-07-04
|
ClassLecture
|
5
|
3
|
What is anonymiser
|
2024-06-29
|
ClassLecture
|
3
|
3
|
Types of proxy server
|
2024-06-27
|
ClassLecture
|
3
|
3
|
Tools and methods used in cybercrime
|
2024-06-06
|
ClassLecture
|
3
|
2
|
Mobile in trends
|
2024-06-01
|
Class_Test_Assignment
|
3
|
2
|
Mobile generation
|
2024-05-31
|
ClassLecture
|
3
|
2
|
Mobile computing
|
2024-05-24
|
ClassLecture
|
3
|
2
|
Proliferation of mobile and wireless devices
|
2024-05-18
|
ClassLecture
|
3
|
2
|
Mobile devices and wireless devices
|
2024-05-17
|
ClassLecture
|
3
|
1
|
Revision class unit 1
|
2024-05-09
|
ClassLecture
|
3
|
1
|
Types of vector attack
|
2024-05-07
|
ClassLecture
|
3
|
1
|
Cyber cafe and cyber crime
|
2024-05-06
|
ClassLecture
|
6
|
1
|
Working of botnet
|
2024-05-03
|
ClassLecture
|
6
|
1
|
Botnet the fuel of cyber crime
|
2024-05-02
|
ClassLecture
|
6
|
1
|
Prevention of cyber stalking
|
2024-05-01
|
ClassLecture
|
6
|
1
|
Cyber Stalking
|
2024-04-30
|
ClassLecture
|
6
|
1
|
Cyber crime Stalking
|
2024-04-29
|
ClassLecture
|
6
|
1
|
A global perspective on cyber cime
|