-
Notifications
You must be signed in to change notification settings - Fork 0
/
cyber.html
101 lines (88 loc) · 4.14 KB
/
cyber.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
<html>
<head>
<title>
Cyber Security (Ethical Hacking, Bitcoin & Blockchain Technology)</title>
<meta charset="utf-8">
<link rel="icon" type="image/x-icon" href="et.jpg" />
<link rel="stylesheet" type="text/css" href="greenbub.css">
<style type="text/css">
.para{
background-color: black;
width: 1000px;
margin: 20px;
opacity:0.1;
border: 1px solid black;
padding: 20px;
resize: both;
overflow: auto;
}
.para:hover {
opacity: 1;
filter: alpha(opacity=100);
}
</style>
<h1 align="center" style="background-color: black; color: yellow; width: device-width; padding: 10px">
Cyber Security (Ethical Hacking, Bitcoin & Blockchain Technology)</h1>
</head>
<body>
<h2 style="margin-left: 30px">Details</h2>
<div class="para">
<p style="color:yellow">
  
In today's Internet-dependent business environment, organizations must link their systems across enterprise-wide and virtual private networks as well as connect mobile users.<br/><br/>
In this course, you learn how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to network threats.<br/><br/>
“Cyber awareness has become the need of the hour.”<br/>
Learning Objective:<br/><br/>
Analyze your exposure to security threats and protect your organization's systems and data<br/>
Deploy firewalls and data encryption to minimize threats<br/>
Manage risks emanating from inside the organization and from the Internet<br/>
Preventing unwanted network access with a personal firewall.<br/>
Seminar topics:-<br/><br/>
IT security in your office<br/><br/>
Secure your Email accounts (Gmail , company email )<br/>
Secure your Social networking accounts (Facebook, Linked In etc.)<br/>
Find out/investigate if someone has hacked your Computer.<br/>
Secure your Company data.<br/>
Monitoring employee internet usage<br/>
Mobile Hacking & security (Live mobile hacking demos)<br/>
How to detect key loggers, malwares or Trojan in PC<br/>
Net banking security tips<br/>
How to detect Phishing attacks <br/>
Data recovery<br/>
Cyber Warfare<br/>
Office network security<br/>
Mobile security- Safeguard your phone from being monitored and hacked.<br/>
Backups: Mobile, Email accounts<br/>
How to secure your WI-FI <br/>
Creating Virtual Machines - Safer Net banking)<br/>
How to securely use Drop box & Google drive<br/>
Basic guidance on cyber crime incident handling<br/>
How to file cyber complains under the IT Act & preserve evidence.<br/>
Question & Answers<br/>
Bitcoin & Block Chain Technology<br/><br/>
What is Blockchain ?<br/>
Sample Transaction: How transaction gets executed & distributed? <br/>
Conflicts resolutions<br/>
Blockchain: Smart Contracts <br/>
How Blockchain can be Hacked <br/>
Can I setup my Own Blockchain i.e private blockchain<br/>
Case Studies<br/>
What determines the price of Bitcoins?<br/>
How Bitcoin mining and Bitcoin Exchange is different things ?<br/>
How to Trading / Buy and Sell Bitcoin and Earn ?<br/>
How safe is to use Bitcoin and other cryptocurrency.<br/>
How best to prevent being a victim of Cyber Crime & safety measures.<br/>
Safety tips<br/>
Over 2GB of materials would be provided in the form of: PowerPoint slides (step by Step Instructions on operating the tools), open source software, <br/>Video tutorials.<br/><br/>
The entire workshop will be hands on and full practical based.<br/>
The participants themselves will have to do all the things on their computers.<br/>
For each & every module & concept which will be taught, we will be giving minimum 2 tools for each module which can be use later on.”<br/>
</p>
</div>
<br/>
<h2 style="margin-left: 300px">Maps and Direction</h2>
<center>
<iframe src="https://www.google.com/maps/embed?pb=!1m18!1m12!1m3!1d3887.685207037033!2d77.57958431448951!3d12.991974890842474!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x3bae163eff33c14f%3A0xbdaffaf56a72be23!2sThe+LaLiT+Ashok+Bangalore!5e0!3m2!1sen!2sin!4v1511099709216" width="800" height="600" frameborder="0" style="border:border:1px solid #666666" allowfullscreen></iframe>
</center>
</body>
</html>