It Is My First industrial Training For My University Purpose. I Worked With Desh Cyber Limited. I Shared My Experience and Task In This Presentation Briefly.
MMU INTERNSHIP REPORT JAAYNE JEEVITA A / P RONALD ALFREDJaayneWilliam
JAAYNE JEEVITA A / P RONALD ALFRED TRIMESTER 3 2020 / 2021. This internship report serves the purpose to record the details of my industrial training which was conducted in Influasia SDN.BHD
Passive Fire Protection According to UBBL MalaysiaZhao Wei Kim
Design and Application of passive fire protection stated in Uniform Building By-Laws of Malaysia. It contains graphical guidance to make the law items easier to comprehend and apply.
Credit to: UTM alumni
MMU INTERNSHIP REPORT JAAYNE JEEVITA A / P RONALD ALFREDJaayneWilliam
JAAYNE JEEVITA A / P RONALD ALFRED TRIMESTER 3 2020 / 2021. This internship report serves the purpose to record the details of my industrial training which was conducted in Influasia SDN.BHD
Passive Fire Protection According to UBBL MalaysiaZhao Wei Kim
Design and Application of passive fire protection stated in Uniform Building By-Laws of Malaysia. It contains graphical guidance to make the law items easier to comprehend and apply.
Credit to: UTM alumni
Chief Information Security Officer - A Critical Leadership RoleBrian Donovan
Ninety-four percent of CxOs in a recent IBM Survey believe it is probable their companies will experience a significant cyber security incident in the next two years. It is not a matter of ‘if’ it will happen, but when.
Businesses are therefore focused on developing effective strategies and governance frameworks to mitigate the risk and reduce the damage of the inevitable cyber security breaches they face.
However, to be effective those strategies and governance frameworks need to be supported and executed through great leadership by Chief Information Security Officers and their senior teams.
Our just released white paper highlights three key leadership challenges faced by Chief Information Security Officers.
Aw101 - THE DIFFERENCES ROLE OF SAFETY AND HEALTH ORGANIZATION IN MALAYSIAJGrace Johnny
THE DIFFERENCES ROLE OF SAFETY AND HEALTH ORGANIZATION IN MALAYSIA:
a) Department of Safety and Health (DOSH)
b) National Institute of Occupational Safety and Health (NIOSH)
c) Social Security Organization (SOCSO)
Cybergate International - Your Cyber Security Partner - Company Profile.pdfFrancescoMifsud1
Cybergate is a Maltese cyber security consultancy and penetration testing firm that offers a comprehensive range of cyber security services in a variety of technical areas. Our goal is to identify and eradicate cyber security threats and vulnerabilities in your organization before criminal actors do. Our services include the following:
- Cyber Security Awareness Training
- E-mail phishing as a Service
- Ethical Hacking
- Web Application Penetration Testing
- Mobile Application (iOS/Android)
- Penetration Testing
- Network Penetration Testing
- Cloud Security Assessments
With over ten years of expertise in cyber security, we have had the chance to deal with a wide range of industries, including financial, legal, and retail, as well as businesses of all kinds.
At Cybergate, we strive to stay ahead of the competition by attracting and maintaining the greatest industry personnel. Our experts can provide high-quality evaluations while properly explaining their findings and remedial recommendations to all levels of your organization, therefore eliminating cyber security concerns.
Chief Information Security Officer - A Critical Leadership RoleBrian Donovan
Ninety-four percent of CxOs in a recent IBM Survey believe it is probable their companies will experience a significant cyber security incident in the next two years. It is not a matter of ‘if’ it will happen, but when.
Businesses are therefore focused on developing effective strategies and governance frameworks to mitigate the risk and reduce the damage of the inevitable cyber security breaches they face.
However, to be effective those strategies and governance frameworks need to be supported and executed through great leadership by Chief Information Security Officers and their senior teams.
Our just released white paper highlights three key leadership challenges faced by Chief Information Security Officers.
Aw101 - THE DIFFERENCES ROLE OF SAFETY AND HEALTH ORGANIZATION IN MALAYSIAJGrace Johnny
THE DIFFERENCES ROLE OF SAFETY AND HEALTH ORGANIZATION IN MALAYSIA:
a) Department of Safety and Health (DOSH)
b) National Institute of Occupational Safety and Health (NIOSH)
c) Social Security Organization (SOCSO)
Cybergate International - Your Cyber Security Partner - Company Profile.pdfFrancescoMifsud1
Cybergate is a Maltese cyber security consultancy and penetration testing firm that offers a comprehensive range of cyber security services in a variety of technical areas. Our goal is to identify and eradicate cyber security threats and vulnerabilities in your organization before criminal actors do. Our services include the following:
- Cyber Security Awareness Training
- E-mail phishing as a Service
- Ethical Hacking
- Web Application Penetration Testing
- Mobile Application (iOS/Android)
- Penetration Testing
- Network Penetration Testing
- Cloud Security Assessments
With over ten years of expertise in cyber security, we have had the chance to deal with a wide range of industries, including financial, legal, and retail, as well as businesses of all kinds.
At Cybergate, we strive to stay ahead of the competition by attracting and maintaining the greatest industry personnel. Our experts can provide high-quality evaluations while properly explaining their findings and remedial recommendations to all levels of your organization, therefore eliminating cyber security concerns.
Welcome to the World of the BPS Security PracticeEdwin Soares
BPS World Cyber and Information Security Practice afford over six years’ experience working with End Users, Consultancies, Systems Integrators, Mainstream Security
Contractors and Government Agencies
Cyber Security Infotech Pvt Ltd Founded in 2012, the organization aims towards providing Information Security Services and Process Improving Consulting services. Members of CSI have attained excellence in providing end-to-end consulting services across sectors including but not limited to Banks, Airports, Finance, IT, Retails etc. With the core team comprising of domain experts with over a decade of experience, we at CSI help organizations to reduce risks and enhance their competitive advantage over others.
This is a presentation template if someone is interested in making a case for a web-based security awareness and training program within your company. It is free for all to use and change accordingly.
We work with many large and small organizations to ensure that information is managed through a risk based approach. Management systems can ensure that information resilience and risk mitigation is a focal point of corporate strategy as well as becoming a part of everyday business practice.
Read about risk assurance in our brochure now!
Company Profile
THE I is a company specialized in cyber security,
monitoring, IT infrastructure and software development.
The company was founded under the guidance of Antonino Abbate, an established specialist of Network Operations, IT Operations and Cyber Security, with 15 years of proven cooperation with numerous Italian and international companies and big corporations which operate in the sectors of Public Administration, Finance, Telecommunication, Industry, Media & Entertainment an Commerce.
THE I now boasts partnerships with major clients
and provides advice to some of the largest Italian
ICT companies. Our approach is based on efficiency, productivity and guarantee. Continuous training and total mastery of the most up-to-date and efficient methodologies allow us to develop actions and activities tailored to our clients while guaranteeing total security, time and resource optimization, training and assistance.
Strengh:
Even though our DNA is turning into a binary code, we strongly believe in human value, both in our relationship with our clients and with our team.
That is why we provide companies with the best possible resources, highly and constantly trained. Solutions tailored to the needs of the company, aimed at achieving the best result with the best tools, in a perspective of optimizing costs and time.
Agile:
The Agile methodology was born to optimize and improve the development process of a product, whose realization is the primary goal. Time, quality and costs are non- negotiable factors. The principles on which it is based are the importance of collaboration between team members, frequent releases, flexibility to achieve the final goal, collaboration with the customer. The product is not made with a single process but through a series of cycles that add and improve its functions.
The main advantages are: Greater flexibility; Greater productivity; Greater transparency; Higher quality products; Faster implementation of solutions; Faster delivery times; Reduced risk of missed targets; Increased customer satisfaction.
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...Falgun Rathod
Cyber Octet Private Limited is India's renowned Cyber Security Company of India and listed in Top 25 Companies. Cyber Octet Provides Ethical Hacking Training in Ahmedabad & Cyber Security Training and Certifications. More than 50000 Students has been trained by Cyber Octet Private Limited.
Penntech is a leading provider of IT managed services in London. We offer a wide range of IT services, from strategic project management to remote support.
What sets us apart is that we never tie clients into long contracts. We are confident of our ability to go above and beyond, so we don’t need to.
We’re proud to have 100% client retention since the business began.
Security Operation Center (SOC) is the most sensible move in order to save your business during an attempted cyber security attack. SOC Represents the Overall Security in an organization/environment which includes Cyber, Digital & Information security and the operations center is responsible for assessing and implementing the Security Posture of an Organization. Through SOC, multiple layers of security are put in place where the objective is to protect Information valuable to an organization.
Cyber Security For Organization Proposal PowerPoint Presentation SlidesSlideTeam
If your company needs to submit a Cyber Security For Organization Proposal PowerPoint Presentation Slides look no further. Our researchers have analyzed thousands of proposals on this topic for effectiveness and conversion. Just download our template, add your company data and submit to your client for a positive response. https://bit.ly/31xeb6e
Cyber Security For Organization Proposal Powerpoint Presentation SlidesSlideTeam
Developing an attractive website for your business operations to generate more leads and profit for the company is no longer the only concern. There are various other factors in play. It is important to ensure that the website and software of your company are safe from any kind of malware. The main priority of any organization should be to build a defence system for its servers and data. Render your expert service to the clients and meet their requirements with this Cyber Security for Organization Proposal PowerPoint Presentation Slides. Utilize this PPT template to highlight your key deliverables such as uninterrupted server protection, secure organization information, network security, penetration testing, monitoring system vulnerabilities, and personnel training to avoid cyber attacks. Use this internet security PPT layout to talk about the whole process of project kick-off, planning, development, implementation, maintaining, and training for the cyber security services that your company adopts. Showcase the overall project cost that a client has to invest in availing your services as well as mention in detail the financial outlay according to each service and package. Grab the opportunity to educate your audience about the additional services that you provide like software development, cloud services, security, and networking by employing our electronic safeguard services PPT deck. Implement this visually-appealing security services PowerPoint theme to present an attractive business overview of your company and convey your mission, vision, objectives, and goals in an organized manner. Gain the trust of your clients by displaying your past achievements, awards, and client testimonials with this PPT design. You can take the assistance of this PowerPoint slide to inform the customer about your expertise in mobile app development, onsite developer, and business intelligence analytics. Download our ready-to-use computer security PPT graphic and promise the best security to your clients and make an everlasting impression on them. https://bit.ly/3fxyjMt
ICT eGuide: Switching foundation technology for better cyber securityNiamh Hughes
Since 2007, Solution IP have been creating operational efficiencies with our expansive foundation technology portfolio across voice, unified communications, cyber security, connectivity and network. Our engineers and ICT expert team design and deploy award-winning cloud technology and networks to solve UK business infrastructure challenges. Our clients switch for our expertise but stay for our exceptional managed service with 5* independently-rated support from our skilled in-house engineers and service desk.
Similar to Industrial training Presentation (IUKL+DESHCYBER) (20)
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
1. Presentation On Internship Training
Presenter
Md Mofijul Haque
ID -161916653
BITNT
Field Supervisor
Md Shoyeb Miah
Managing Director
Desh Cyber Limited
Academic Supervisor
DR. ELISHA TADIWA
NYAMASVISVA
Lecturer (IUKL)
3. OBJECTIVE OF THE STUDY
• To provide right information to the customers.
• To provide improve interaction with existing
and potential customers.
• To provide customer support always.
• To Repositioning the Company to a new target
market.
• To expose all company services to customers.
4. COMPANY PROFILE
As industry experts we are revolutionizing the industry with our cybersecurity services
and solutions. The ever-evolving cybersecurity landscape is constantly changing, and it is
impossible to stay up to date with these changes. Our team stays abreast with the
cybersecurity landscape so that we can provide the best and latest services and solutions
to help your business overcome these challenges.
We have the experience of delivering projects for a variety of industries: Telecom,
Healthcare, Financials and many more industries.
Our team has the credentials, skills, experience and understanding on how to analyze
your current cybersecurity state, the processes/tools utilized and provide a
roadmap/framework to handle cybersecurity threats. Not only do we architect your
solution, but we implement it from the ground up.
Our services and solutions will secure your environment from the ground up and guide
you to understand/monitor it from the top down thus allowing for the just in time decision
making to protect your environment.
5. SERVICES
SECURITY AS-A-
SERVICE
MDR & RESPONSE
INCIDENT RESPONSE
THREAT
INTELLIGENCE
SERVICES
COMPLIANCE AS-
A-SERVICE
ISO 27001
SWIFT CSP
PCI-DSS
SECURITY SOLUTION
ENDPOINT SECURITY
CLOUD SECURITY
IDENTITY & ACCESS
MANAGEMENT
Cyber Security Learning
Portal
Studemia
Introducing with
Automation
PowerBI & Kiss Flow
SIEM & SOC (Splunk)
Cisco Umbrella Security &
Many other Security Tools and Services
6. COMPANY MISSION
As a company and as individuals we value above all else
honesty, integrity, transparency, responsibility,
professionalism and mutual respect.
We hold ourselves accountable to our clients, employees,
shareholders and partners by honoring our commitments,
providing results and continually striving to provide the
highest quality cyber security services and solutions.
7. COMPANY VISION
Our clients are our highest priority. Our VISION is our commitment to the ongoing
improvement of the services and solutions we provide to our clients so that we can
exceed their expectations.
Our commitment and investment in our employees, we can commit to the delivery of
high standards and customer service.
Our MISSION is a testament to our core values: We help our clients by providing
protection and security solutions through introducing actionable security programs
giving our clients’ peace of mind knowing that their systems are secure.
8. COMPANY VALUES
At Desh Cyber, we have set ourselves strategic objectives
that will deliver us with long-term sustainability as a
business and remain a strong force in the industry.
To stay abreast with the cybersecurity challenges so that
we can deliver services and solutions to meet these
challenges.
9. KEY MANAGEMENT OF THE COMPANY
Shahin kamruzzaman
Technical Director
Md Harun Roshid
CEO,DeshCyber
Mahatab Hossain
Chief Technical
Officer
Md Shoyeb Miah
Managing Director
10. GIVEN TASK
Desh Cyber Limited company providing many services.
My task was to check the Bank and other Organizations Domain Such as DMARC, SPF,
DKIM & PORT 21 and Know more details about Phishing Attack, SIEM & SOC.
Connect with the customer.
Provide the best solution to them to prevent cyber attack to their organization.
Provide training for awareness against Phishing attack with KNOWBE4.
Provide Total Email Security Solutions with VAILMAIL &
Provide DNS, Email Authentication, VPN & Ransomware Security Solution with
CISCO UMBRELLA .
11. TASK CHALLENGE
CHALLENGES encountered during the training since this Industrial Training
was My First Industrial Training. There were quite a few problems that I
encountered.
The problems was a Technical Problems.
Technical problem is really less Knowing about the Depth of the
Security Tools. During my Bachelor Degree I had a little
knowledge about the tools. Basically How to use it practically in
real world & Present it to the Customer.
12. OVERCOME CHALLENGES
AS I said had little experience on it and My Supervisor
helped me to overcome it in a right way to solve it. He
always showed me the technical solutions when I face it .
I used to write down the questions I had regarding any
matter and would ask My supervisor later through Meeting
and Calls .
13. CONCLUSION
Internship has been such a great experience for me because was
exposed to the field of Cyber Security. It has given me wide knowledge
on how to take on different challenges in the Cyber Security Sector thus
helping me to enlighten my thinking and mind on how to overcome
them and also how to manage different resources in order to obtain
better results .