- Courses & Classes
- Institutes, Colleges, Schools & Tutors
View 33 courses from 1 providers |
Location
:- Nevgi, Panaji
|
Course Content: This advanced course covers Mac Security & Forensics. Category: IT Security and Ethical Hacking | Asian School of Cyber LawsNevgi, Panaji Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: This is an advanced level course on Cyber Security.. Category: IT Security and Ethical Hacking | Asian School of Cyber LawsNevgi, Panaji Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: This workshop is designed for business persons who use computers, the Internet, eCommerce, online banking and online share trading etc for commercial purposes. Topics include: • Cyber threats to your business • Hack-proofing your laptop and smartphone • Securing your website • Online Reputation Management • Cyber Law Availabil... Category: Computer & Technology Law | IT Security and Ethical Hacking | Asian School of Cyber LawsNevgi, Panaji Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: The primary law for data privacy in India is the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 issued by the Central Government in exercise of the powers conferred by clause (ob) of subsection (2) of section 87 read with section 43A of the Information Technology Act, 2000. The data privacy rules define sensitive persona... Category: IT Security and Ethical Hacking | Computer & Technology Law | Asian School of Cyber LawsNevgi, Panaji Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Computer security incident response has become an important component of information technology (IT) programs. Security-related threats have become not only more numerous and diverse but also more damaging and disruptive. New types of security-related incidents emerge frequently. Preventative activities based on the results of risk assessments can lower the number of incidents, but not all inciden... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsNevgi, Panaji Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: The Information Technology Act and its allied rules, regulations, orders etc impose several obligations on corporates. Failure to comply with these obligations may be penalized with fines, compensation and even imprisonment. The primary law for data privacy in India is the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 i... Category: Computer & Technology Law | IT Security and Ethical Hacking | Asian School of Cyber LawsNevgi, Panaji Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Windows forensics relates to legal evidence found in computers and digital devices running the Windows operating system. The goal of Windows Forensics is to examine these digital devices in a forensically sound manner and identify, preserve, recover, analyze and present relevant evidence. Topics include: • Windows Disks, Files and Partitions • Windows Boot Sequence... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsNevgi, Panaji Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Linux forensics relates to legal evidence found in computers and digital devices running the Linux operating system. The goal of Linux Forensics is to examine these digital devices in a forensically sound manner and identify, preserve, recover, analyze and present relevant evidence. Topics include: • Linux Disks, Files and Partitions • Linux Boot Sequence • &... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsNevgi, Panaji Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Mac forensics relates to legal evidence found in computers and digital devices running the Macintosh operating system. The goal of Macintosh Forensics is to examine these digital devices in a forensically sound manner and identify, preserve, recover, analyze and present relevant evidence. Topics include: • Macintosh File Systems • Macintosh Operating Systems •... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsNevgi, Panaji Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: In many cyber crime cases, the use of the Facebook platform and Facebook App for mobiles needs to be investigated. Facebook Forensics involves forensic analysis and investigation of various activities like instant chats, wall comments, group events etc. Topics include: • Facebook Protocol Format • Forensics on Common Facebook Activities • Facebook Fore... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsNevgi, Panaji Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Malware (malicious software) is designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to a computer system. In many cyber crime cases, the forensic analysis of malware is essential. Topics include: • Malware categories, Incident Prevention & Response • Volatile Data Collection & Examination on a Live Windows Syste... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsNevgi, Panaji Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Applied Encryption is the application of cryptography to modern data protection and information security. In this workshop, you will first learn about how symmetric encryption, asymmetric encryption and digital signatures work in a real-world environment. You will then learn the practical methods of file encryption, disk encryption, full disk encryption and email encryption. Availability: T... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsNevgi, Panaji Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Nowadays almost all crimes (cyber and conventional) involve some usage of mobile devices such as cell phones and tablets. Mobile devices such as cell phones contain important digital evidence such as: • Phonebook/Contact information, • Text messages, • Dialled, incoming, and missed call logs, • Electronic mail, • Photos, • &nbs... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsNevgi, Panaji Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: The Indian economy is the fourth largest economy of the world on the basis of Purchasing Power Parity (PPP). It is one of the most attractive destinations for business and investment opportunities due to huge manpower base, diversified natural resources and strong macro-economic fundamentals. Financial Law includes the law relating to: 1. Securities (including Shares, Debentures and Bonds, ... Category: Company Law | Corporate And Securities Law | Asian School of Cyber LawsNevgi, Panaji Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Cyber Law is the law governing computers and the Internet. In today's highly digitalized world, almost everyone is affected by cyber law. • All transactions in shares are in demat form. • All companies depend upon technology. • Government forms are now filed online. • Credit cards usage is booming. • E-commerce is growing rapidly. • Most people are using email, ... Category: Diploma in Cyber Law | Computer & Technology Law | IT Security and Ethical Hacking | Asian School of Cyber LawsNevgi, Panaji Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Introduction The Information Technology Act and its allied rules, regulations, orders etc impose several obligations on corporates. Failure to comply with these obligations may be penalized with fines, compensation and even imprisonment. This advanced program enables you to carry out Information Technology Act Compliance Audits. On admission, you will receive: • Courseware & refer... Category: IT Security and Ethical Hacking | Computer & Technology Law | Asian School of Cyber LawsNevgi, Panaji Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Cyber Crime costs the world more than Rs. 57,000,000,000,000 every year. Companies and Governments need skilled cyber security professionals to contain this US $ 114 billion annual cost. This advanced program prepares you for a career in Cyber Security. The Information Technology Act and its allied rules, regulations, orders etc impose several obligations on corporates. Failure to comply with thes... Category: IT Security and Ethical Hacking | Computer & Technology Law | Asian School of Cyber LawsNevgi, Panaji Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Cyber Law is the law governing computers and the Internet. In today's highly digitalized world, almost everyone is affected by cyber law: • All transactions in shares are in demat form. • All companies depend upon technology. • Government forms are now filed online. • Credit cards usage is booming. • E-commerce is growing rapidly. • Most people are using email, ... Category: Computer & Technology Law | IT Security and Ethical Hacking | Asian School of Cyber LawsNevgi, Panaji Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Cyber Law is the law governing computers and the Internet. In today's highly digitalized world, almost everyone is affected by cyber law: • All transactions in shares are in demat form. • All companies depend upon technology. • Government forms are now filed online. • Credit cards usage is booming. • E-commerce is growing rapidly. • Most people are using email, ... Category: PGP in Cyber Law | Computer & Technology Law | IT Security and Ethical Hacking | Asian School of Cyber LawsNevgi, Panaji Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Cyber Crime costs the world more than Rs. 57,000,000,000,000 every year. Companies and Governments need skilled digital forensic investigators to contain this US $ 114 billion annual cost. As per Ministry of Human Resources Development estimates - India needs 2.5 lakh cyber experts and professionals to effectively tackle cyber crimes. (Source: Times of India Feb 10, 2011). "Taking into acco... Category: IT Security and Ethical Hacking | Computer & Technology Law | Asian School of Cyber LawsNevgi, Panaji Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |