-
Identifying Fake Emails, Email Spoofing and Analyzing Email Headers
-
Email Security (Gmail , Corporate mail )
-
Internet Protocol Concepts
-
Investigating Internet Traces
-
WI-FI security
-
Data backup
-
Basic Office Network Security tips & tools
-
Net Banking Security tips
-
Social Networking Frauds
|
-
Basic Steps to conduct the IT security audit
-
Vulnerability Assessment and Penetration Testing
-
Monitoring employee activities on Computer
-
Key loggers and Phishing
-
Data Storage and Data Security
-
How to securely use Drop box & Google drive
-
Data Recovery from Hard disk , Pen drives, external hard disks & sim cards
|