webinar on cyber security & ethical hackinghow pc / laptop passwords are cracked. good practice:...
TRANSCRIPT
![Page 1: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious](https://reader033.vdocument.in/reader033/viewer/2022051815/603d18d392b2e070284caa46/html5/thumbnails/1.jpg)
Computer Society of India – Student Branch Shri Vishnu Engineering College For Women (A)
(Affiliated to JNUTK – Kakinada)
Vishnupur :: Bhimavaram
Webinar on
Cyber Security & Ethical Hacking
Welcome To
Speaker
Dr Sai SatishFounder & CEO of Indian Servers
Cyber Security Expert & Ethical Hacker
17.04.2020 (Friday)
2:00 PM – 3:30 PM
![Page 2: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious](https://reader033.vdocument.in/reader033/viewer/2022051815/603d18d392b2e070284caa46/html5/thumbnails/2.jpg)
Agenda of the webinar
1. Scope of Cyber Security
2. Data breaches
3. How can I secure online
4. How to choose career in security domain
![Page 3: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious](https://reader033.vdocument.in/reader033/viewer/2022051815/603d18d392b2e070284caa46/html5/thumbnails/3.jpg)
Polling from Participants (Q1)
![Page 4: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious](https://reader033.vdocument.in/reader033/viewer/2022051815/603d18d392b2e070284caa46/html5/thumbnails/4.jpg)
Polling from Participants (Q2)
![Page 5: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious](https://reader033.vdocument.in/reader033/viewer/2022051815/603d18d392b2e070284caa46/html5/thumbnails/5.jpg)
Polling from Participants (Q3)
![Page 6: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious](https://reader033.vdocument.in/reader033/viewer/2022051815/603d18d392b2e070284caa46/html5/thumbnails/6.jpg)
Participants Joined in Webinar - 168
Participants are SVECW Students from first year to final year from allbranches
![Page 7: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious](https://reader033.vdocument.in/reader033/viewer/2022051815/603d18d392b2e070284caa46/html5/thumbnails/7.jpg)
Topic: Is your data(email-ID) is breached or not
![Page 8: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious](https://reader033.vdocument.in/reader033/viewer/2022051815/603d18d392b2e070284caa46/html5/thumbnails/8.jpg)
Data breaches
![Page 9: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious](https://reader033.vdocument.in/reader033/viewer/2022051815/603d18d392b2e070284caa46/html5/thumbnails/9.jpg)
How PC / Laptop Passwords are cracked
![Page 10: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious](https://reader033.vdocument.in/reader033/viewer/2022051815/603d18d392b2e070284caa46/html5/thumbnails/10.jpg)
Good Practice: 2-step verificaiton
![Page 11: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious](https://reader033.vdocument.in/reader033/viewer/2022051815/603d18d392b2e070284caa46/html5/thumbnails/11.jpg)
Topic: Morphing of Tik-Tok Videos
![Page 12: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious](https://reader033.vdocument.in/reader033/viewer/2022051815/603d18d392b2e070284caa46/html5/thumbnails/12.jpg)
How to recognize malicious android apps in Mobile
![Page 13: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious](https://reader033.vdocument.in/reader033/viewer/2022051815/603d18d392b2e070284caa46/html5/thumbnails/13.jpg)
Discussed About
• Passwords, Type of passwords
• Security measures in social platforms
• Security measures to defend mobile / laptop live streaming (through camera)
• Safety browser settings in mobile / laptop
• Certifications & Career opportunities in thedomain of Cyber Security
![Page 14: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious](https://reader033.vdocument.in/reader033/viewer/2022051815/603d18d392b2e070284caa46/html5/thumbnails/14.jpg)
Webinar Hosting
Webinar Hosted & Facilitated byDr Sai SatishCEO- Indian Servers
Webinar Moderated & Organized byY.RamuCoordinator - CSI Student Branch – SVECW
Guided By: Leadership Team of SVECW
![Page 15: Webinar on Cyber Security & Ethical HackingHow PC / Laptop Passwords are cracked. Good Practice: 2-step verificaiton. Topic: Morphing of Tik-Tok Videos. How to recognize malicious](https://reader033.vdocument.in/reader033/viewer/2022051815/603d18d392b2e070284caa46/html5/thumbnails/15.jpg)
Thank You