2024-07-13
|
ClassLecture
|
5
|
4
|
Chain of custody concept
|
2024-07-12
|
ClassLecture
|
5
|
4
|
Digital forensics
|
2024-07-11
|
ClassLecture
|
5
|
4
|
Computer forensics
|
2024-07-10
|
ClassLecture
|
5
|
3
|
Identity theft
|
2024-07-03
|
ClassLecture
|
3
|
3
|
What is anonymiser
|
2024-07-02
|
ClassLecture
|
3
|
3
|
Keylogger and spyware
|
2024-06-25
|
ClassLecture
|
3
|
3
|
Tools and methods used in cybercrime
|
2024-06-24
|
ClassLecture
|
1
|
3
|
Trends in mobility
|
2024-06-19
|
ClassLecture
|
3
|
2
|
Revision class
|
2024-06-18
|
ClassLecture
|
3
|
2
|
Authentication service security
|
2024-06-11
|
ClassLecture
|
3
|
2
|
Security challenges posed by mobile devices
|
2024-06-10
|
ClassLecture
|
3
|
2
|
Trends in mobility
|
2024-06-05
|
ClassLecture
|
3
|
2
|
Trends in mobility
|
2024-06-04
|
ClassLecture
|
3
|
2
|
Mobile computing
|
2024-05-29
|
ClassLecture
|
3
|
2
|
Mobile generation
|
2024-05-27
|
ClassLecture
|
3
|
2
|
Mobile generation
|
2024-05-22
|
ClassLecture
|
3
|
2
|
Proliferation of mobile and wireless devices
|
2024-05-20
|
ClassLecture
|
3
|
2
|
Mobile devices and wireless devices
|
2024-05-08
|
ClassLecture
|
3
|
1
|
Vector attack cyber security
|
2024-05-07
|
ClassLecture
|
3
|
1
|
Cyber cafe and cyber crime
|
2024-05-06
|
ClassLecture
|
6
|
1
|
Working of botnet
|
2024-05-03
|
ClassLecture
|
6
|
1
|
Botnet the fuel of cyber crime
|
2024-05-02
|
ClassLecture
|
6
|
1
|
Prevention of cyber stalking
|
2024-05-01
|
ClassLecture
|
6
|
1
|
Cyber Stalking
|
2024-05-01
|
ClassLecture
|
6
|
1
|
Cyber Stalking
|
2024-04-30
|
ClassLecture
|
6
|
1
|
Cyber crime Stalking
|
2024-04-29
|
ClassLecture
|
6
|
1
|
A global perspective on cyber cime
|