-
Information Security Controls?
-
Introduction to IT Act, 2000
-
Types of Hackers
-
Types of virtualization
-
Setup VirtualBox and Virtual Machine in Mac
-
Linux File System Directories
- IP address
- ipv4
- ipv6
- MAC address
- IP v/s MAC
- TCP
- UDP
- 3-way handshake
- Ports and Protocols
- OSI model
- Switches
- Router
- HUB
- FireWall
- LAN
- WAN
- Computer Viruses
- Macro Virus
- Multipartite virus
- Overwrite virus
- Browser Hijacker
- Polymorphic virus
- Resident virus
- Trojan Horse
- Web Scripting Virus
- File Injecting virus
- Boot Sector Virus
- Malware
- Phishing attacks
- Cloud jacking
- MAN-IN-THE-MIDDLE attack