- Courses & Classes
- Institutes, Tutors & Colleges
View 15 courses from 2 providers |
Location
:- India
Provider Location
|
Active Filters : Category : IT Security and Ethical Hacking | Duration : Upto 7 Days (Short Courses) | Delivery : Classroom | Mode : Regular
Course Content: Hacking is not about the illegal things it's all about how to secure your system. In the two days workshop Google Hacking, Email Hacking, Dos Attacks, Torjens, SQL Injection, Windows Hacking, Mobile Hacking etc. topics will be covered. This workshop aims to give Technocrats a basic knowledge of hacking and how to protect your system against hazardous effects. Topics to be covered in Ethical Hackin... Category: IT Security and Ethical Hacking | Innovians TechnologiesIndia (Delhi) ![]() |
Course Content: This workshop is dedicated on Cyber Forensics & Crime Investigation. Computer Forensics is a detailed and scientific study, research and implementation of computer science subjects for the purpose of gathering digital evidence in cases of cyber crimes or for other scientific research purposes also it introduces the needs of the current cyber security sector. Topics to be covered in CF&CI W... Category: IT Security and Ethical Hacking | Innovians TechnologiesIndia (Delhi) ![]() |
Course Content: Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or... Category: IT Security and Ethical Hacking | Innovians TechnologiesIndia (Delhi) ![]() |
Course Content: The art of protecting information by transforming it (encrypting it) into an unreadable format & then re-transforming it to plain text. Cryptography is a key technology for achieving information security in communications, computer systems, electronic commerce, and, more generally, in the emerging information society. This workshop will provide them the understanding of Cryptography & Secu... Category: IT Security and Ethical Hacking | Innovians TechnologiesIndia (Delhi) ![]() |
Course Content: This workshop is designed for business persons who use computers, the Internet, eCommerce, online banking and online share trading etc for commercial purposes. Topics include: • Cyber threats to your business • Hack-proofing your laptop and smartphone • Securing your website • Online Reputation Management • Cyber Law Availabil... Category: IT Security and Ethical Hacking | Computer & Technology Law | Asian School of Cyber LawsIndia (Maharashtra, Goa) ![]() |
Course Content: The primary law for data privacy in India is the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 issued by the Central Government in exercise of the powers conferred by clause (ob) of subsection (2) of section 87 read with section 43A of the Information Technology Act, 2000. The data privacy rules define sensitive persona... Category: IT Security and Ethical Hacking | Computer & Technology Law | Asian School of Cyber LawsIndia (Maharashtra, Goa) ![]() |
Course Content: Computer security incident response has become an important component of information technology (IT) programs. Security-related threats have become not only more numerous and diverse but also more damaging and disruptive. New types of security-related incidents emerge frequently. Preventative activities based on the results of risk assessments can lower the number of incidents, but not all inciden... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsIndia (Maharashtra, Goa) ![]() |
Course Content: The Information Technology Act and its allied rules, regulations, orders etc impose several obligations on corporates. Failure to comply with these obligations may be penalized with fines, compensation and even imprisonment. The primary law for data privacy in India is the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 i... Category: IT Security and Ethical Hacking | Computer & Technology Law | Asian School of Cyber LawsIndia (Maharashtra, Goa) ![]() |
Course Content: Windows forensics relates to legal evidence found in computers and digital devices running the Windows operating system. The goal of Windows Forensics is to examine these digital devices in a forensically sound manner and identify, preserve, recover, analyze and present relevant evidence. Topics include: • Windows Disks, Files and Partitions • Windows Boot Sequence... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsIndia (Maharashtra, Goa) ![]() |
Course Content: Linux forensics relates to legal evidence found in computers and digital devices running the Linux operating system. The goal of Linux Forensics is to examine these digital devices in a forensically sound manner and identify, preserve, recover, analyze and present relevant evidence. Topics include: • Linux Disks, Files and Partitions • Linux Boot Sequence • &... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsIndia (Maharashtra, Goa) ![]() |
Course Content: Mac forensics relates to legal evidence found in computers and digital devices running the Macintosh operating system. The goal of Macintosh Forensics is to examine these digital devices in a forensically sound manner and identify, preserve, recover, analyze and present relevant evidence. Topics include: • Macintosh File Systems • Macintosh Operating Systems •... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsIndia (Maharashtra, Goa) ![]() |
Course Content: In many cyber crime cases, the use of the Facebook platform and Facebook App for mobiles needs to be investigated. Facebook Forensics involves forensic analysis and investigation of various activities like instant chats, wall comments, group events etc. Topics include: • Facebook Protocol Format • Forensics on Common Facebook Activities • Facebook Fore... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsIndia (Maharashtra, Goa) ![]() |
Course Content: Malware (malicious software) is designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to a computer system. In many cyber crime cases, the forensic analysis of malware is essential. Topics include: • Malware categories, Incident Prevention & Response • Volatile Data Collection & Examination on a Live Windows Syste... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsIndia (Maharashtra, Goa) ![]() |
Course Content: Applied Encryption is the application of cryptography to modern data protection and information security. In this workshop, you will first learn about how symmetric encryption, asymmetric encryption and digital signatures work in a real-world environment. You will then learn the practical methods of file encryption, disk encryption, full disk encryption and email encryption. Availability: T... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsIndia (Maharashtra, Goa) ![]() |
Course Content: Nowadays almost all crimes (cyber and conventional) involve some usage of mobile devices such as cell phones and tablets. Mobile devices such as cell phones contain important digital evidence such as: • Phonebook/Contact information, • Text messages, • Dialled, incoming, and missed call logs, • Electronic mail, • Photos, • &nbs... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsIndia (Maharashtra, Goa) ![]() |