Presentations
DUMPSTER DIVING.pptx
SOCIAL ENGINEERING.pptx
2. Database Security.pptx
crypto.ppt
Topics
21134033-Abbas-Identification-Theft.docx
1.3. identity theft
1.3. identity theft
1.6. SQL Injection.pdf
1.6. SQL Injection
1.6. SQL Injection
1.10. SOCIAL ENGINEERING.pdf
1.10. Social Engineering
1.10. Social Engineering
21134033-Abbas-Cross-Site-Scripting.docx
3.2. cross-site scripting
3.2. cross-site scripting
Brute Force Attack-21134030-Suruthi.G.docx
3.9. brute force attack
3.9. brute force attack
21134021-Moses_C_Dictionary_Attack.docx
3.10. dictionary attack
3.10. dictionary attack
4.8. Man-In-The-Middle.pdf
4.8. Men in the middle
4.8. Men in the middle
Study Materials
QA book
Question Bank
eBooks
IBM Materials
STU-IT Data Security-STUGUD.pdf
STU-IT Application Security-STUGUD.pdf
IBM Presentations
IDS011GU06.pdf
IDS011GU05.pdf
IDS011GU02.pdf
IDS011GU04.pdf
IDS011GU03.pdf
IDS011GU01.pdf
ITA011GU06.pdf
ITA011GU07.pdf
ITA011GU08.pdf
ITA011GU10.pdf
ITA011GU04.pdf
ITA011GU09.pdf
ITA011GU01.pdf
ITA011GU02.pdf
ITA011GU05.pdf
ITA011GU03.pdf
Online Videos (Tamil version)
Information Theft
Information Theft
Dumpster diving
Dumpster diving
Identity Theft
Identity Theft
Bank Fraud
Bank Fraud
Data Breach
Data Breach
Digital Theft
Digital Theft
Brute Force
Brute Force
Phishing Attack
Phishing Attack
Men in Middle
Men in Middle
Online Videos (Malayalam version)
Dumpster diving
Dumpster diving
Online Videos (Telugu version)
Dumpster diving
Dumpster diving
Online Videos (Hindi version)
Dumpster diving
Dumpster diving