Found 2,558 presentations matching your search
Cyber Security Audit
Network Penetration Testing, simply known as Network Pentesting is like testing for your network’s...
PPT by Jyoti Ranjan Nayak
The slides by Torry Harris Integration Solutions explores how telecommunication companies (telcos) c...
Discover how Generative AI (GenAI) is transforming the telecommunications industry with this insight...
all-ibm-cloud-architecture-icons-October2019.pptx
It is the presentation on cloud computing
JDKZ
Cloud Computing
simple case study in order to design smart home management system
cyber attack report
This presentation gives you an overview of stages of digital forensics and where should you look for...
this is a digital forensics presentation
This slide deck offers an overview of Amazon EKS Anywhere, highlighting how it simplifies Kubernetes...
Join us for a detailed examination of the cybersecurity posture of Travelblog.org, where we uncover ...
Google Cloud Official Icons and Solution Architectures.pptx
Computer networking refers to interconnected computing devices that can exchange data and share reso...
Mobile Device Management (MDM) provides IT administrators with centralized control over all corporat...
zero lecture
A Session Border Controller (SBC) is a critical component in modern VoIP and unified communication n...
Overlay network
Hacking
Basics of cyber security, introduction, for BE electronics and communication students
Introduction of Cyber Crime, Hacking, Ethical Hacking, Tools, and Steps