Cyber Security Tutorials 23 Lessons

Mobile Phone Security

The mobile phone has become so powerful that it has all the capabilities of a computer but in a small and compact size. Also, we rely on our phones for storing tons of personal as well as corporate data (if […]

    Buffer Overflow

    Buffer Overflow is basically a situation where an application or program tries to write data outside the memory buffer or beyond the buffer size and is not determined to store those data. This leads to buffer overrun or buffer overflow, which ultimately crashes a system or temporarily holds it for sometimes.

      Modern Encryption(Cryptography)

      Modern encryption is the key to advanced computer and communication security. This stream of cryptography is completely based on the ideas of mathematics such as number theory and computational complexity theory as well as concepts of probability. In this chapter, […]

        Data Leak Prevention

        Data leakage can be defined as the malicious practice of the transmission of data in an unauthorized manner to an external agent, destination or recipient with bad intention. Data leakage can be done by any internal organization's employee or any other person. Data leakage is also termed as "data theft - the slow and low approach" which creates a massive problem in the data security industry.

          Patch Management

          Patch management is the practice and process for ensuring that appropriate patches are installed on the system as well as upgrades for technologies and software are appropriately done. This management techniques can help a venture or an organization handle security changes efficiently.

            Cyber Forensics and Incident Handling

            Forensics is an essential part of cybersecurity, and any cyber incident has to solve through cyber forensics team who can find out the exact issue and how the mishap takes place. In this chapter, you will learn about the needs and objectives of cyber forensics and how to approach a crime or incident and some categories of incident handling.

              Scroll Back to Top