0% found this document useful (0 votes)
8 views

C FakepathC FakepathC FakepathCpassiv Inf Sec

Uploaded by

burzuyevrcb5
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

C FakepathC FakepathC FakepathCpassiv Inf Sec

Uploaded by

burzuyevrcb5
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

1.

Importance of security meanings

2. Virus programms

3. Cybercrimes

4. Security protocols

5. Fundamentals, design and analysis

6. Human aspects and ceremonies in protocols.

7. Mobile platform security.

8. Biometric Systems

9. Antivirus programs

10. Reverse engineering

11. Ethical and Unethical Hacking

12. Wireless vulnerabilities

13. Privacy

14. Software assurance

15. Security tools

16. Cyber Policy and Laws

17 Medical software

18 . Physical security

19 .Sniffing

20. Network Vulnerability Tools.

21. Operating systems security

22. Database Security

23. Intrusion detection

24. Hybrid policies

25.Auditing

You might also like