15
Computer Society of India – Student Branch Shri Vishnu Engineering College For Women (A) (Affiliated to JNUTK – Kakinada) Vishnupur :: Bhimavaram Webinar on Cyber Security & Ethical Hacking Welcome To Speaker Dr Sai Satish Founder & CEO of Indian Servers Cyber Security Expert & Ethical Hacker 17.04.2020 (Friday) 2:00 PM – 3:30 PM

Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious

Computer Society of India – Student Branch Shri Vishnu Engineering College For Women (A)

(Affiliated to JNUTK – Kakinada)

Vishnupur :: Bhimavaram

Webinar on

Cyber Security & Ethical Hacking

Welcome To

Speaker

Dr Sai SatishFounder & CEO of Indian Servers

Cyber Security Expert & Ethical Hacker

17.04.2020 (Friday)

2:00 PM – 3:30 PM

Page 2: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious

Agenda of the webinar

1. Scope of Cyber Security

2. Data breaches

3. How can I secure online

4. How to choose career in security domain

Page 3: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious

Polling from Participants (Q1)

Page 4: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious

Polling from Participants (Q2)

Page 5: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious

Polling from Participants (Q3)

Page 6: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious

Participants Joined in Webinar - 168

Participants are SVECW Students from first year to final year from allbranches

Page 7: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious

Topic: Is your data(email-ID) is breached or not

Page 8: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious

Data breaches

Page 9: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious

How PC / Laptop Passwords are cracked

Page 10: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious

Good Practice: 2-step verificaiton

Page 11: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious

Topic: Morphing of Tik-Tok Videos

Page 12: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious

How to recognize malicious android apps in Mobile

Page 13: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious

Discussed About

• Passwords, Type of passwords

• Security measures in social platforms

• Security measures to defend mobile / laptop live streaming (through camera)

• Safety browser settings in mobile / laptop

• Certifications & Career opportunities in thedomain of Cyber Security

Page 14: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious

Webinar Hosting

Webinar Hosted & Facilitated byDr Sai SatishCEO- Indian Servers

Webinar Moderated & Organized byY.RamuCoordinator - CSI Student Branch – SVECW

Guided By: Leadership Team of SVECW

Page 15: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious

Thank You