Training Program on Cyber Security-
- Safe internet usage
- Protecting our identity over internet
- Intrusion Detection
- Threat Detection
HANDS on -
- MAC Addresses Demo
- MAC Addresses Spoofing Demo
- FPort Demo
- Proxy Server Demo
--------------------------------
- Information Gathering
- Preparation of attack
- Internal threats
- Gaining access
- Maintaining access
HANDS on -
- USB attacks
- E-mail Spoofing Demo
- Keylogger Demo
- EXE Binder Demo
-----------------------------------------
- Attacks, finding vulnerability in the target network
- Phishing/ anti-phishing
HANDS on -
- ALL topics demo
--------------------------------------
Fake email / frauds
- DATA protection
- DATA recovery
- HIDING important data
HANDS on -
- Encryption tools
- Undeleting deleted data Demo
- Cyber law compliance
-----------------------------------------
- Risk assurance
- Case studies
- Counter measures
- DEMO
-----------------------------------
Case studies
- Counter measures
Training Program on Cyber Security-
- Safe internet usage
- Protecting our identity over internet
- Intrusion Detection
- Threat Detection
HANDS on -
- MAC Addresses Demo
- MAC Addresses Spoofing Demo
- FPort Demo
- Proxy Server Demo
--------------------------------
- Information Gathering
- Preparation of attack
- Internal threats
- Gaining access
- Maintaining access
HANDS on -
- USB attacks
- E-mail Spoofing Demo
- Keylogger Demo
- EXE Binder Demo
-----------------------------------------
- Attacks, finding vulnerability in the target network
- Phishing/ anti-phishing
HANDS on -
- ALL topics demo
--------------------------------------
Fake email / frauds
- DATA protection
- DATA recovery
- HIDING important data
HANDS on -
- Encryption tools
- Undeleting deleted data Demo
- Cyber law compliance
-----------------------------------------
- Risk assurance
- Case studies
- Counter measures
- DEMO
-----------------------------------
Case studies
- Counter measures