1 Information Security basics 2 Ethical Hacking 3 Social engineering attacks 4 Security tools (Practical) 5 IT risk management 6 Security Policy Design 7 Security frameworks and models 8 Cyber Forensics and Incident handling
Registration is limited: first come first basis
|
Prof. Asif Rampurawala And Sohrab Ardeshar Vakharia
|