Summer Training on Cyber Security at HCL cdc munirka New Delhi

  • 168 views
Uploaded on

HCL invites applications for 4-6 weeks Live Project Based Industrial Training in Delhi for BE, B Tech, MCA, Msc , MCA , MBA , BBA students. …

HCL invites applications for 4-6 weeks Live Project Based Industrial Training in Delhi for BE, B Tech, MCA, Msc , MCA , MBA , BBA students.

HCL CDC Munirka offers a complete spectrum of Quality Certification and Skill Enhancement programs leading to career in Software, Hardware and Networking in association with leading Global IT organizations. HCL trains and certifies students on various technologies helping them to be prepared for the industry. HCL CDC’s training solutions are designed to help students to stay competitive today as well as in the future.

More in: Education
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
168
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
2
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Cyber Security
  • 2. • Fundamentals of Security • Introduction to Cyber Security • Securing e-mails • Securing Mobile Devices • Securing Personal Data • Safe Browsing • Securing Web Applications
  • 3. Fundamentals of Security • Security Basics • Brief history of Computer Security • Type of Attacks • How Hackers get in • Secure your System • Protecting Passwords • Virus , Worms and Trojans • Virus Attacks • Antivirus Software
  • 4. Fundamentals of Security • Understanding Firewalls • Good Security Habits • Keeping children safe on-line
  • 5. Introduction to Cyber Security • Why Cyber Security • Preventing Identity Theft • Recovering from Virus , Worms and Trojan • Avoiding Spyware • Avoiding Phishing Attacks • Denial-of-Services ( DoS )
  • 6. Securing e-mails • Understanding e-mail risk • E-mail Attachments • Spam mails • Benefits of BCC • Digital Signatures
  • 7. Securing Mobile Devices • Physical Security of portable devices • Data security • Protecting Data Security • Securing Wireless Networks • Security for Electronic Devices
  • 8. Securing Personal Data • Protecting your privacy • Understanding encryption • Effectively erasing files • Supplementing Passwords
  • 9. Safe Browsing • Web Browsers • Security setting of Web Browsers • Shopping safely online • Cookies • Understanding Web Site Certificates • Securing Bluetooth Wireless Technology • Copyrights
  • 10. Securing Web Applications • Using Patches • Voice Over IP ( VOIP ) • Risk of File-sharing • Brief introduction – Operating System