Starting a new Lecture Notes Series on DAA Aktu Previous years question//B.Tech /B.voc/BCA//Design and analysis of algorithms
.png)
.png)
Youtube Lecture Playlist CreditsChannel Name: Edu Desire
So Let Us Start to This Journey of Learning
DAA Aktu Previous years question//B.Tech /B.voc/BCA//Design and analysis of algorithms By Lecture Notes together!
Lecture 1: Introduction to Cyber Security Course Playlist | Detailed Syllabus | AKTU | BCC301/BCC401
Lecture 2: What is Cyber Crime | Classifications of Cyber Crimes | Survival Mantra for the Netizens | AKTU//
Lecture 3: What is Social Engineering | Cyber Stalking | Cybercafe and Cybercrime | Attack Vector | AKTU
Lecture 4: Mobile and Wireless Device Introduction | Trends in Mobility | Credit Card Frauds in Mobile | AKTU//
Lecture 6: Attacks on Mobile/Cell Phones | Organisational Security Policies in Mobile Computing Era | AKTU
Lecture 7: Proxy Servers and Anonymizers | Phishing | Password Cracking | Keyloggers and Spywares | AKTU
Lecture 9: What are Backdoors and Its Types | What is Steganography and its Defferent Technique | AKTU
Lecture 10: DoS and DDoS Attacks | SQL Injection | Buffer Overflow Attack | Identity Theft (ID Theft) | AKTU
Lecture 11: Computer Forensics Science | Cyber Forensics and Digital Evidence | Digital Forensics Life Cycle
Lecture 12: Chain of Custody Concept | Network Forensics | Approaching a Computer Forensics Investigation