- Courses & Classes
- Institutes, Colleges, Schools & Tutors
View 13 courses from 2 providers |
Location
:- Panaji
|
Active Filters : Duration : Upto 7 Days (Short Courses) | Delivery : Classroom | Provider Location : Panaji
Course Content: Course Content: • Introduction to Hospitality and Tourism Industry • Soft Skills • Personality Development • Grooming Sessions • Interview Training • Customer Service • Technical questions pertaining to Industry • Corporate culture • Announcement reading • Aptitude test Category: Hospitality And Hotel Management | NIHAM (National Institute of Hospitality & Aviation Management)Panaji (18th June road) NIHAM was incorporated in the year 2007 by our parent company Spectrum Careers. Our parent company is one of the premium and fastest growing recruitme... |
Course Content: This workshop is designed for business persons who use computers, the Internet, eCommerce, online banking and online share trading etc for commercial purposes. Topics include: • Cyber threats to your business • Hack-proofing your laptop and smartphone • Securing your website • Online Reputation Management • Cyber Law Availabil... Category: Computer & Technology Law | IT Security and Ethical Hacking | Asian School of Cyber LawsPanaji (Nevgi) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: The primary law for data privacy in India is the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 issued by the Central Government in exercise of the powers conferred by clause (ob) of subsection (2) of section 87 read with section 43A of the Information Technology Act, 2000. The data privacy rules define sensitive persona... Category: IT Security and Ethical Hacking | Computer & Technology Law | Asian School of Cyber LawsPanaji (Nevgi) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Computer security incident response has become an important component of information technology (IT) programs. Security-related threats have become not only more numerous and diverse but also more damaging and disruptive. New types of security-related incidents emerge frequently. Preventative activities based on the results of risk assessments can lower the number of incidents, but not all inciden... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsPanaji (Nevgi) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: The Information Technology Act and its allied rules, regulations, orders etc impose several obligations on corporates. Failure to comply with these obligations may be penalized with fines, compensation and even imprisonment. The primary law for data privacy in India is the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 i... Category: Computer & Technology Law | IT Security and Ethical Hacking | Asian School of Cyber LawsPanaji (Nevgi) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Windows forensics relates to legal evidence found in computers and digital devices running the Windows operating system. The goal of Windows Forensics is to examine these digital devices in a forensically sound manner and identify, preserve, recover, analyze and present relevant evidence. Topics include: • Windows Disks, Files and Partitions • Windows Boot Sequence... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsPanaji (Nevgi) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Linux forensics relates to legal evidence found in computers and digital devices running the Linux operating system. The goal of Linux Forensics is to examine these digital devices in a forensically sound manner and identify, preserve, recover, analyze and present relevant evidence. Topics include: • Linux Disks, Files and Partitions • Linux Boot Sequence • &... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsPanaji (Nevgi) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Mac forensics relates to legal evidence found in computers and digital devices running the Macintosh operating system. The goal of Macintosh Forensics is to examine these digital devices in a forensically sound manner and identify, preserve, recover, analyze and present relevant evidence. Topics include: • Macintosh File Systems • Macintosh Operating Systems •... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsPanaji (Nevgi) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: In many cyber crime cases, the use of the Facebook platform and Facebook App for mobiles needs to be investigated. Facebook Forensics involves forensic analysis and investigation of various activities like instant chats, wall comments, group events etc. Topics include: • Facebook Protocol Format • Forensics on Common Facebook Activities • Facebook Fore... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsPanaji (Nevgi) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Malware (malicious software) is designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to a computer system. In many cyber crime cases, the forensic analysis of malware is essential. Topics include: • Malware categories, Incident Prevention & Response • Volatile Data Collection & Examination on a Live Windows Syste... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsPanaji (Nevgi) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Applied Encryption is the application of cryptography to modern data protection and information security. In this workshop, you will first learn about how symmetric encryption, asymmetric encryption and digital signatures work in a real-world environment. You will then learn the practical methods of file encryption, disk encryption, full disk encryption and email encryption. Availability: T... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsPanaji (Nevgi) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: Nowadays almost all crimes (cyber and conventional) involve some usage of mobile devices such as cell phones and tablets. Mobile devices such as cell phones contain important digital evidence such as: • Phonebook/Contact information, • Text messages, • Dialled, incoming, and missed call logs, • Electronic mail, • Photos, • &nbs... Category: IT Security and Ethical Hacking | Asian School of Cyber LawsPanaji (Nevgi) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |
Course Content: The Indian economy is the fourth largest economy of the world on the basis of Purchasing Power Parity (PPP). It is one of the most attractive destinations for business and investment opportunities due to huge manpower base, diversified natural resources and strong macro-economic fundamentals. Financial Law includes the law relating to: 1. Securities (including Shares, Debentures and Bonds, ... Category: Company Law | Corporate And Securities Law | Asian School of Cyber LawsPanaji (Nevgi) Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy La... |