|
GSSU
(88 pages)
|
|
|
|
Introduction to GSITU
|
|
|
|
GSITU - Introduction to GSITU, Data & Information
|
|
|
|
GSITU - Threats to Data with Case Studies & Sanchar Sathi (Tefcop) Practical
|
|
|
|
GSITU - Data Security & Its Elements
|
|
|
|
GSITU - Elements of Data Security
|
|
|
|
GSITU - Elements of Data Security (Recap)
|
|
|
|
GSITU - Implementing Securities
|
|
|
|
GSITU - Operating System Securities
|
|
|
|
GSITU - Windows EFS & Developing a New Encryption Language
|
|
|
|
GSITU - Malware & Antivirus
|
|
|
|
GSITU - Malware & Antivirus
|
|
|
|
GSITU - Malware & Antivirus
|
|
|
|
GSITU - Malware & Antivirus
|
|
|
|
GSITU - Malware & Antivirus
|
|
|
|
GSITU - Malware & Antivirus
|
|
|
|
GSITU - Revision Class
|
|
|
|
GSITU - Symptoms of Malware & Functionalities of Anti Virus
|
|
|
|
GSITU - Antivirus & Its Working
|
|
|
|
GSITU - Limitation of Antivirus Software
|
|
|
|
GSITU - Malware Development (Auto-Typing)
|
|
|
|
GSITU - Processor Load Virus
|
|
|
|
GSITU - Any Desk & Disco Light Malware
|
|
|
|
GSITU - Malware Revision
|
|
|
|
GSITU - Malware Development (Shutdown & Restart Your PC)
|
|
|
|
GSITU - Malware Development (Text to Voise)
|
|
|
|
Malware - POP - Up VIRUS
|
|
|
|
GSITU - POP - Up VIRUS - IInd
|
|
|
|
GSITU - Automate Facebook Login
|
|
|
|
GSITU - Internet Securities
|
|
|
|
GSITU - Internet Securities
|
|
|
|
GSITU - Inetrnet Securities
|
|
|
|
GSITU - Extra Topics
|
|
|
|
GSITU - Security on Social Networking Sites
|
|
|
|
GSITU - Types of Social Engineering & Terminologies (Eavesdropping, Shoulder Surfing, Dumpster Diving, Piggy Backing & Tail Gating) Morning Session
|
|
|
|
GSITU - Types of Social Engineering & Terminologies (Eavesdropping, Shoulder Surfing, Dumpster Diving, Piggy Backing & Tail Gating) Evening Session
|
|
|
|
GSITU - Phishing, Spear Phishing & Insider Attacks (Evening Session)
|
|
|
|
GSITU - Risks Associated with Social Networking Sites (Morning Session)
|
|
|
|
GSITU - Risks Associated with Social Networking Sites (Morning Session)
|
|
|
|
GSITU - Exam Copy
|
|
|
|
GSITU - Securing Email Communications & Email Spoofing
|
|
|
|
GSITU - Email Securities (Morning Session)
|
|
|
|
GSITU - Securing Email Communications & Email Spoofing (Evening Session)
|
|
|
|
GSITU - Email Message & Cyber Forensics (Morning Session)
|
|
|
|
GSITU - Email Message & Cyber Forensics (Evening Session)
|
|
|
|
GSITU - Email Security & Threats (Morning Session)
|
|
|
|
GSITU - Email Security & Threats (Evening Session)
|
|
|
|
GSITU - Why Spam is Harmful? & Encryption, Decryption & its Types (Morning Session)
|
|
|
|
GSITU - Why Spam is Harmful? & Encryption, Decryption & its Types (Evening Session)
|
|
|
|
GSITU - Secuyring Mobile Devices (Android Hacking) - Morning Session
|
|
|
|
GSITU - Secuyring Mobile Devices (Android Hacking) - Evening Session
|
|
|
|
GSITU - Mobile Device Security Risk, Mobile Device Security Risk & Threats to Bluetooth Device (Morning Session)
|
|
|
|
GSITU - Mobile Device Security Risk, Mobile Device Security Risk & Threats to Bluetooth Device (Evening Session)
|
|
|
|
GSITU - History & Evolution of Android Operating System Ist (Morning Session)
|
|
|
|
GSITU - History & Evolution of Android Operating System Ist (Evening Session)
|
|
|
|
GSITU - History & Evolution of Android Operating System IInd (Morning Session)
|
|
|
|
GSITU - History & Evolution of Android Operating System IInd (Evening Session)
|
|
|
|
GSITU - History & Evolution of iOS Operating System Ist (Morning Session)
|
|
|
|
GSITU - History & Evolution of iOS Operating System Ist (Evening Session)
|
|
|
|
GSITU - Introduction to Cloud Computing & Securities
|
|
|
|
GSITU - Advantages of Cloud Computing
|
|
|
|
GSITU - Advantages of Cloud Security & Windows Hacking Shift Key Method
|
|
|
|
GSITU - Steps of Windows Hacking By Shift Key Method & PHP Script for Facebook Hacking
|
|
|
|
GSITU - Steps to Create Facebook Phishing Page
|
|
|
|
GSITU - Network Connection Securities (Morning Session)
|
|
|
|
GSITU - Network Connection Securities (Evening Session)
|
|
|
|
GSITU - Creating Our Own Server Using Xampp & WiFi - Hacking
|
|
|
|
GSITU - Threats to Wireless Networks Practicals (Net-Cut & Data Recovery Tool - Crack, Installation & Its Use) (Morning Session)
|
|
|
|
GSITU - Threats to Wireless Networks Practicals (Net-Cut & Data Recovery Tool - Crack, Installation & Its Use) (Evening Session)
|
|
|
|
GSITU - Cloud Computing
|
|
|
|
GSITU - Data Back-Up & Restore (Evening Session)
|
|
|
|
GSITU - Types of Data Backup (Morning Session)
|
|