Cyber Security Study Materials

Footprinting and Reconnaissance Lecture Note

❖ Recognize the role of search engines in footprinting ❖ Understand the role of financial Websites in footprinting ❖ Understand competitive intelligence and its need. ❖ Understand DNS enumeration. ❖ Understand Whois ❖ Learn different types of DNS records

Entrepreneurship II 2021 (CSS 511, CPT 517)

Theory Meaning and Prospects of Entrepreneurship and Entrepreneurs Concept of Wealth Entrepreneur Opportunity Practical Real-life practical examples of Entrepreneur Activities (Business & Creativity) Student grouping (class population / 5) = 5 in a group Identification of entrepreneur areas/skills / problems/applications in Computer Science & Cyber Security Science (High Tech)  Group proposal writing  Proposal defense  Project Implementation  Project Exhibition & Submission  

CSS 524 PENETRATION TESTING II

THE INTERNATIONAL STANDARD FOR PENETRATION TESTING CUSTOMERS AND LEGAL AGREEMENTS CUSTOMERS AND LEGAL AGREEMENTS PENETRATION TESTING PLANNING SCHEDULING INFORMATION GATHERING EXTERNAL AND INTERNAL NETWORK PENETRATION TESTING ROUTER PENETRATION TESTING FIREWALL PENETRATION TESTING WIRELESS NETWORKS PENETRATION TESTING PASSWORD CRACKING PENETRATION TESTING SOCIAL ENGINEERING PENETRATION TESTING PDA AND CELL PENETRATION TESTING

An Introduction to Deep Learning IBM Developer

Machine learning versus deep learning Deep learning and human brain Artificial neural network Shallow neural network Deep neural networks Challenges in deep learning