A
A
A
Screen
Reader Access
Skip to
Main Content
English
Gujarati
Hindi
Toggle navigation
Courses
Program
About
Help
Login
Course: Cyber Security
Overview
Classroom
Material
Exam
{{jsondata.Name}}
Attachment
Xe1zS-vRG-U[1]
watch[1]
B_ba32YEHGk[1]
watch[1]
Block1_Unit1_Cyber Security Essentials
Unit1_Cyber Security Essentials
Read
1) Cyber Security Essentials
2) Unit1_Cyber Security Essentials
3) Cyber Security Essentials
4) Cyber Security Essentials
Block1_Unit2_Attack,Vectors,Threat,Units and Vulnerability
Block-1_Unit-2_Attack Vectors, Threat, Risk and Vulnerability
Read
1) Block-1_Unit-2_Attack Vectors, Threat, Risk and Vulnerability
2) Attack Vectors, Threat, Risk and Vulnerability
Block1_Unit3_Advance Persistent Threat and Cyber Kill Chain
Block-1_Unit-3_Advance Persistent Threat and Cyber Kill Chain
Read
1) Block-1_Unit-3_Advance Persistent Threat and Cyber Kill Chain
2) Advance Persistent Threat and Cyber Kill Chain
3) Advance Persistent Threat and Cyber Kill Chain
4) Advance Persistent Threat and Cyber Kill Chain
5) Advance Persistent Threat and Cyber Kill Chain
6) Cyber Kill Chain
Block-1_Unit-4_Cyber Security Framework
Block-1_Unit-4_Cyber Security Framework
Read
1) Block-1_Unit-4_Cyber Security Framework
2) Cyber Security Framework
3) Cyber Security Framework
4) Cyber Security Framework
Block2_Unit1_Firewall and Packet Filters
Block-2_Unit-1_Firewall and Packet Filters
Read
1) Block-2_Unit-1_Firewall and Packet Filters
Block-2_Unit-2_Introduction to Windows and Linux Firewall
Block-2_Unit-2_Introduction to Windows and Linux Firewall
Read
1) Block-2_Unit-2_Introduction to Windows and Linux Firewall
Block-2_Unit-3_Attacks on Wireless Networks
Block-2_Unit-3_Attacks on Wireless Networks
Read
1) Block-2_Unit-3_Attacks on Wireless Networks
Block-3_Unit-1_Scanning For Web Vulnerabilities Tools and
Block-3_Unit-1_Scanning For Web Vulnerabilities Tools and
Read
1) Block-3_Unit-1_Scanning For Web Vulnerabilities Tools and
Block-3_Unit-2_Application Inspection Tools
Block-3_Unit-2_Application Inspection Tools
Read
1) Block-3_Unit-2_Application Inspection Tools
Block-3_Unit-3_Password Cracking and Brute-Force Tools
Block-3_Unit-3_Password Cracking and Brute-Force Tools
Read
1) Block-3_Unit-3_Password Cracking and Brute-Force Tools
2) Password Cracking and Brute-Force Tools
3) Password Cracking and Brute-Force Tools
Block-3_Unit-4_Web Attack
Block-3_Unit-4_Web Attack
Read
1) Block-3_Unit-4_Web Attack
2) Web Attack
Block-4_Unit-1_Cyber Crimes
Block-4_Unit-1_Cyber Crimes
Read
1) Block-4_Unit-1_Cyber Crimes
2) Cyber Crimes
3) Cyber Crimes
Block-4_Unit-2_Internet crime and Act
Block-4_Unit-2_Internet crime and Act
Read
1) Block-4_Unit-2_Internet crime and Act
Block-4_Unit-3_Intellectual Property in the Cyber world
Block-4_Unit-3_Intellectual Property in the Cyber world
Read
1) Block-4_Unit-3_Intellectual Property in the Cyber world
2.1.1 Block-1_Unit-2_Attack Vectors, Threat, Risk and Vulnerability
3.1 Block-1_Unit-3_Advance Persistent Threat and Cyber Kill Chain
×