Cyber Journalism

(41 Reviews)


₹ 9999 ₹ 50000 Buy now
Cyber Journalism

About Course

Mobile Security Investigation & VAPT (Vulnerability Assessment and Penetration Testing) course provides a comprehensive overview of mobile device security and teaches you the skills needed to assess and secure mobile applications. You will learn about common mobile security threats and vulnerabilities, as well as the latest mobile security best practices.

Our expert instructors will guide you through the process of conducting mobile security investigations and VAPT assessments using industry-standard tools and techniques. You will learn how to identify security vulnerabilities and threats, assess risk, and develop and implement effective security controls.

The course covers a range of topics, including mobile device forensics, malware analysis, mobile app security, network security, and cloud security. You will also learn how to create comprehensive security reports and make recommendations for improving mobile security.

Whether you are a security professional looking to expand your skills or an IT professional responsible for securing mobile devices and applications, this course will provide you with the knowledge and skills needed to effectively secure mobile devices and protect against mobile security threats.

Course content

videoUnit 1 . Understanding Audio Start
videoUnderstanding Audio Journalism : Types Start
videoImportance of Sound and Spoken Word in Audio Journalism Start
videoUsing Sound Effectively in Audio Journalism Start
videoNews Services Division of AIR (All India Radio) Start
videoNews on Other Types of Radio Start
videoNews Podcasts: BBC, NPR, etc. Start
videoEthical Hacker Start
videoPenetration Testing Start
videoCyber Security Experts Start
videoSecurity Researchers Start
videoBug Bounty Hunters Start
videoCyber Lawyer Start
videoCyber Crime Investigator Start
videoCyber Forensics Expert Start
videoFundamental of Ethical Hacking Start
videoVirtualization Start
videoWindows Administration Tricks & Tips Start
videoGoogle Hacking Start
videoWebsite Hacking Start
videoKey Logger Attack Start
videoSpoofing Attack Start
videoMobile hacking via Spyware Start
videoMobile Security via Antivirus Start
videoMobile related Cyber Crime Start
videoSMS related cyber attack Start
videoCall related cyber crime Start
videoSystem Hacking Start
videoSecurity Related Dos Commands Start
videoPort Scanning Start
videoNetwork Scanning Start
videoVulnerability Scanning Start
videoWireshark Start
videoVulnerability Scanning Overview Start
videoDifferent types of Vulnerability Scanning Start
videoVulnerability scanning with Nessus Start
videoWeb Application Assessment Start
videoWeb application assessment with nikto Start
videoWeb Application Assessment with Burp Suite Start
videoVulnerability analysis with Metasploit framework Start
videoNetcat usage on TCP/UDP ports Start
videoNFS ,SMB ,SMTP enumeration Start
videoWebsite Investigation & Analysis Start
videoDomain Name Start
videoPort Scan Start
videoyour data is hacked ? Start
videoGoogle Search Queries Start
videosecret.jpg Start
videosecret.txt Start
videoVAPT Session 1 Start
videoVAPT Session 2 Start
videoVAPT Session 3 Start
videoUnit 2. Writing for the Ear Start
videoSimple, conversational, clutter-free writing Start
videoDifference between writing to be read and writing to be heard Start
videoWriting to suit the listeners' needs and consumption pattern Start
videoAddressing linearity of presentation in radio scripts Start
videoNews Based Programmes Start
Tanmay S Dikshit

Tanmay S Dikshit

Certified Pro

Course Instructor

Dr. Tanmay S Dikshit is Highly Energetic Speaker of BCI, IoT & Digital Device's Security and Graphology Science. ​He was awarded 2 State Award ( Government of Maharashtra ) & President Award ( Government of India ). 25+ Years Experience in Technology & International Professional Level 50+ Certification Completed. He is rhetorician and well versed trainer and accords training to Military personals, detectives and all the security forces in which cyber security is required. He is invited as spokesperson at reputed organizations, companies and educational Institutions/Universities to shed light on the major aspects of Cyber Security. He also organizes events, workshops & Awareness Campaigns regarding the same.

(41 Reviews)
See more