from

Presentations

DUMPSTER DIVING.pptx
SOCIAL ENGINEERING.pptx
2. Database Security.pptx
crypto.ppt

Topics

21134033-Abbas-Identification-Theft.docx

1.3. identity theft

1.6. SQL Injection.pdf

1.6. SQL Injection

1.10. SOCIAL ENGINEERING.pdf

1.10. Social Engineering

Data Masking-21134030-Suruthi.G.docx

2.5. Data Masking

21134021-Moses_C-Data_Erasure.docx

2.6. Data Erasure

21134021-Moses_C-IBM_Guardium.docx

2.7. IBM Infosphere Guardium

21134033-Abbas-Cross-Site-Scripting.docx

3.2. cross-site scripting

Brute Force Attack-21134030-Suruthi.G.docx

3.9. brute force attack

21134021-Moses_C_Dictionary_Attack.docx

3.10. dictionary attack

4.8. Man-In-The-Middle.pdf

4.8. Men in the middle

Study Materials

QA book

Question Bank

eBooks

IBM Materials

STU-IT Data Security-STUGUD.pdf
STU-IT Application Security-STUGUD.pdf

IBM Presentations

IDS011GU06.pdf
IDS011GU05.pdf
IDS011GU02.pdf
IDS011GU04.pdf
IDS011GU03.pdf
IDS011GU01.pdf
ITA011GU06.pdf
ITA011GU07.pdf
ITA011GU08.pdf
ITA011GU10.pdf
ITA011GU04.pdf
ITA011GU09.pdf
ITA011GU01.pdf
ITA011GU02.pdf
ITA011GU05.pdf
ITA011GU03.pdf

Online Videos (Tamil version)

Information Theft

Dumpster diving

Identity Theft

Bank Fraud

Data Breach

Digital Theft

Brute Force

Phishing Attack

Men in Middle

Online Videos (Malayalam version)

Dumpster diving

Online Videos (Telugu version)

Dumpster diving

Online Videos (Hindi version)

Dumpster diving