2024-07-11
|
ClassLecture
|
5
|
4
|
Network forensics in cs
|
2024-07-10
|
ClassLecture
|
5
|
4
|
Network forensics in cs
|
2024-07-09
|
ClassLecture
|
5
|
4
|
Network forensics in cs
|
2024-07-08
|
ClassLecture
|
5
|
4
|
Digital evidence life cycle
|
2024-07-05
|
ClassLecture
|
5
|
4
|
Digital forensics science and branch
|
2024-07-04
|
ClassLecture
|
5
|
3
|
Buffer overflow in cs
|
2024-07-03
|
ClassLecture
|
5
|
3
|
Trojan horse and it's types
|
2024-07-02
|
ClassLecture
|
5
|
3
|
Types of sql injection
|
2024-06-27
|
ClassLecture
|
5
|
3
|
Bruth force attacks
|
2024-06-26
|
ClassLecture
|
5
|
3
|
Credential attack in password cracking
|
2024-06-18
|
ClassLecture
|
5
|
3
|
Types of anonymisers
|
2024-06-14
|
ClassLecture
|
5
|
3
|
Virtual private network
|
2024-06-13
|
ClassLecture
|
5
|
3
|
Anonymizers server
|
2024-06-06
|
ClassLecture
|
6
|
2
|
Security in cyber security
|
2024-06-03
|
ClassLecture
|
5
|
2
|
Mobile device registry setting
|
2024-05-30
|
ClassLecture
|
2
|
2
|
How to protect social engineering
|
2024-05-24
|
ClassLecture
|
5
|
2
|
Attacks on mobile and cell phones
|
2024-05-23
|
ClassLecture
|
5
|
2
|
Wireless computing era
|
2024-05-22
|
ClassLecture
|
5
|
2
|
Wireless computing era
|
2024-05-21
|
ClassLecture
|
5
|
2
|
Credit card froud
|
2024-05-20
|
ClassLecture
|
4
|
2
|
Trends and mobility
|
2024-05-18
|
ClassLecture
|
4
|
2
|
Trends and mobility
|
2024-05-17
|
ClassLecture
|
4
|
2
|
Trends and mobility
|
2024-05-16
|
ClassLecture
|
4
|
2
|
Trends and mobility
|
2024-05-15
|
ClassLecture
|
4
|
2
|
Proliferation of mobile and wireless device
|
2024-05-14
|
ClassLecture
|
4
|
2
|
Features of wireless device
|
2024-05-13
|
ClassLecture
|
4
|
2
|
Features of wireless device
|
2024-05-08
|
ClassLecture
|
4
|
2
|
Features of wireless device
|
2024-05-06
|
ClassLecture
|
4
|
2
|
Wireless device
|
2024-05-04
|
ClassLecture
|
4
|
1
|
Attacks vectors
|
2024-05-03
|
ClassLecture
|
4
|
1
|
Cyber cafe in cyber security
|
2024-05-02
|
ClassLecture
|
4
|
1
|
Social engineering
|
2024-04-30
|
ClassLecture
|
4
|
1
|
Cyber forensics
|
2024-04-27
|
ClassLecture
|
4
|
1
|
Ransomware and sql injection
|
2024-04-23
|
ClassLecture
|
4
|
1
|
Prevention of cyber crime
|
2024-04-19
|
ClassLecture
|
4
|
1
|
Classification of cyber crime
|