EVOLUTION-NINJA
Directory: /home/injayblues/www/Nparrots/public/subject_pdf
/
home
/
injayblues
/
www
/
Nparrots
/
public
/
subject_pdf
/
Directory Contents:
File:
1740497927ResumeRAJATHRAJEURSN (1).pdf
(34.7 KB)
File:
1740499407ResumeRANEESHRODRIGUES.pdf
(237.44 KB)
File:
1740639036certificate_2.pdf
(29.09 KB)
File:
1741003134_1740639036certificate_2.pdf
(29.09 KB)
File:
1741003863_1740639036certificate_2.pdf
(29.09 KB)
File:
1741004311_1740639036certificate_2.pdf
(29.09 KB)
File:
1741005725_1740639036certificate_2.pdf
(29.09 KB)
File:
1741100129certificate_6.pdf
(29.11 KB)
File:
1741101870vajra+resume new.pdf
(389.7 KB)
File:
1741102414vajra+resume new.pdf
(389.7 KB)
File:
1741102665vajra+resume new.pdf
(389.7 KB)
File:
1741102754vajra+resume new.pdf
(389.7 KB)
File:
1741102872vajra+resume new.pdf
(389.7 KB)
File:
1741150253certificate_2.pdf
(29.09 KB)
File:
1741150569certificate_2.pdf
(29.09 KB)
File:
1741152652Certificate.pdf
(3.64 MB)
File:
1741243665ppt-1 Introduction-cycbersecurity-cyberspace.pdf
(1.43 MB)
File:
1741243836ppt-2 Introduction-cybersecurity-Governance and legislation.pdf
(384.3 KB)
File:
1741254295Case Study_KM1_Identification & Classification of natural resources.pdf
(453.57 KB)
File:
1741254346KM-01.pdf
(1.08 MB)
File:
1741254584ppt-1 Introduction-cycbersecurity-cyberspace.pdf
(1.43 MB)
File:
1741254643ppt-2 Introduction-cybersecurity-Governance and legislation.pdf
(384.3 KB)
File:
1741323360ppt-3 Introduction to cybersecurity-cybersecurity_07-03-2025.pdf
(751.39 KB)
File:
1741775485RCM..pdf
(378.15 KB)
File:
1741780118ppt4_11_3_2025-security and biometric.pdf
(861.29 KB)
File:
1741868510KM-02.pdf
(597.47 KB)
File:
1742548927ppt5_12_03_2025 web content filters and protections.pdf
(607.4 KB)
File:
1742548986ppt6_13_03_2025 virus.pdf
(379.7 KB)
File:
1742549022ppt7_18_3_2025_identity_theft.pdf
(685.57 KB)
File:
1742549054ppt8_19_03_2025_phishing.pdf
(691.13 KB)
File:
1742552856KM -01_ICTBD.pdf
(369.91 KB)
File:
1743160604ppt9_20_03_2025_malware.pdf
(880.33 KB)
File:
1744008640ppt10_26_03_2025_social_eng.pdf
(505.67 KB)
File:
1744008716ppt11_01_04_2025_financial_fraud.pdf
(552.83 KB)
File:
1744096514ebook_CYBER SECURITY.pdf
(1.64 MB)
File:
1744197633KM-02.pdf
(597.47 KB)
File:
1744197680KM-02.pdf
(597.47 KB)
File:
1744198081KM-02 Sales Research.pdf
(706.11 KB)
File:
1744888946KM-02 Sales Research.pdf
(706.11 KB)
File:
1744955701KM-01-KT04-ppt12_02_04_2025_use_register_software.pdf
(895.56 KB)
File:
1744955771KM-01-KT04-ppt14_09_04_2025_data_encryption.pdf
(1009.99 KB)
File:
1744955844KM-01-KT04-ppt15_10_04_2025_use_strong_authentication.pdf
(497.3 KB)
File:
1744955887KM-01-KT05_KT06-ppt16_15_04_2025_change_password_and_back_up.pdf
(503.34 KB)
File:
1745287112KM-01-KT05_KT0501_KT0502-ppt17_16_04_2025_Security_on_social _networking_sites_and_mobile_devices.pdf
(524.09 KB)
File:
1745287147KM-01-KT06_KT0601-ppt18_17_04_2025_securing_operating_system.pdf
(677.96 KB)
File:
1745287184KM-01-KT06_KT0602-ppt19_17_04_2025_internet_security.pdf
(243.36 KB)
File:
1746433821KT0603-Securing-Email-Communications-Protecting-Your-Data.pdf
(423.8 KB)
File:
1746433866KT0604-Securing-the-Cloud-A-Comprehensive-Overview.pdf
(397 KB)
File:
1746433926KT0605-Securing-Network-Connections-An-Overview.pdf
(440.76 KB)
File:
1746433987KT0606-Firewalls.pdf
(740.89 KB)
File:
1746434062KT0607-Antivirus-programs.pdf
(566.88 KB)
File:
1746434102KT0608-Antispyware.pdf
(514.48 KB)
File:
1746613279KM -03 Stakeholder Relationships.pdf
(305.43 KB)
File:
1748019070KM-01-KT07-Understand-security-incidents-and-reporting.pdf
(465.61 KB)
File:
1748019112KT0702Disaster-Recovery-Protecting-Your-Business.pdf
(685.63 KB)
File:
1748019166252901-001-00-KM-02-Fundamentals-of-Network-Security-and-Defence-Network-Defender.pdf
(475.77 KB)
File:
1748019212KM-02-KT02-Network-Risk-and-Vulnerability-Management-Protecting-Your-Digital-Assets.pdf
(449.47 KB)
File:
1748019257KM-02-KT03-Network-Defense-Core-Principles.pdf
(406.67 KB)
File:
1748019297KM-02-KT04-Monitoring-for-breaches-and-attacks (1).pdf
(484.89 KB)
File:
1748019328KM-02-KT05-Network-Incident-Response-and-Management-A-Proactive-Approach.pdf
(467.75 KB)
File:
1749883476KM-02-KT0101 Governance and legislation.pdf
(449.26 KB)
File:
1749883546KM-02-KT0102 Security policy.pdf
(437.54 KB)
File:
1749883589KM-02-KT0103 Physical security (e.g. biometric authentication).pdf
(319.77 KB)
File:
1749883728KM-02-KT04-Monitoring-for-breaches-and-attacks (1).pdf
(484.89 KB)
File:
1749884089KM-02-KT0104 Web content filters.pdf
(378.13 KB)
File:
1749884179KM-02-KT0105 Need for protection of privacy and data.pdf
(8.15 MB)
File:
1750055283KM-02-KT02-KT0201 -Network-risk-and-vulnerability-management (1).pdf
(5.5 MB)
File:
1750055392KT0202-Knowledge-on-how-to-protect-detect-and-respond-to-network-attacks (1).pdf
(6.43 MB)
File:
1750055609KM-02-KT03- KT0301-Network security controls, protocols, and devices.pdf
(5.05 MB)
File:
1750055675KT0302-Physical-Security.pdf
(1.41 MB)
File:
1750055735KT0303-Host-Security.pdf
(1.06 MB)
File:
1750055890KT0304-Secure-Firewall-Configuration-and-Management.pdf
(1.46 MB)
File:
1750055948KT0305-Secure-IDS-configuration-and-management.pdf
(1.27 MB)
File:
1750056003KT0306-Secure-VPN-Configuration-and-Management.pdf
(831.54 KB)
File:
1750056065KT0307-Wireless-Network-Defense-Securing-the-Airwaves.pdf
(1.74 MB)
File:
1750056103KT0308-Data-Backup-and-Recovery-A-Comprehensive-Guide.pdf
(1.45 MB)
File:
1750056520KM-02-KT0401 Network traffic monitoring and analysis.pdf
(814.16 KB)
File:
1750056607KM-02-KT04-KT0402-Intricacies-of-network-traffic-signature-analysis-and-vulnerability-scanning.pdf
(1.26 MB)
File:
1750056863KM-02-KT05-Network-Incident-Response-Plan.pdf
(1.18 MB)
File:
1750057047KT0502-Incident-Response-A-Structured-Approach.pdf
(1.87 MB)
File:
1750057074KM-02-KT05-KT0503-Reporting-and-documentation.pdf
(1.27 MB)
File:
1750057106KM-02-KT05-KT0504-Lessons-learnt.pdf
(1.05 MB)
File:
1750467939KM-03-KT01-KT0101 Governance and legislation.pdf
(993.05 KB)
File:
1750467989KM-03-KT01-KT0102 Need for data protection.pdf
(1.38 MB)
File:
1750468035KM-03-KT01-KT0103 Computer network and defense fundamentals.pdf
(1.03 MB)
File:
1750468080KM-03-KT01-KT0104 Network security policy design and implementation.pdf
(991.94 KB)
File:
1750468118KM-03-KT01-KT0105-Information-Security-Laws-and-Standards.pdf
(1.2 MB)
File:
1750468183KM-03-KT02-KT0201 Information security overview.pdf
(875.82 KB)
File:
1750468235KM-03-KT02-KT0202 Information security threats and attack vectors.pdf
(1.58 MB)
File:
1750468279KM-03-KT02-KT0203 Penetration testing concepts.pdf
(1.88 MB)
File:
1750468332KM-03-KT02-KT0203 Penetration testing concepts.pdf
(1.88 MB)
File:
1750468370KM-03-KT02-KT0204 Hacking concepts.pdf
(1.49 MB)
File:
1750468427KM-03-KT02-KT0205 Ethical-Hacking-concepts.pdf
(1.52 MB)
File:
1750468464KM-03-KT02-KT0206 Information-Security-Controls.pdf
(1.11 MB)
File:
1750468500KM-03-KT03-KT0301-Footprinting-concepts-and-objectives.pdf
(457.87 KB)
File:
1750468532KM-03-KT03-KT0302-Footprinting-uses.pdf
(432.92 KB)
File:
1750468579KM-03-KT03-KT0303-Types-of-footprinting.pdf
(1.23 MB)
File:
1750468620KM-03-KT03-KT0304-Passive-and-active-footprinting.pdf
(892.62 KB)
File:
1750468673KM-03-KT03-KT0306-Tools-tricks-and-techniques-for-information-gathering.pdf
(489.23 KB)
File:
1750468703KM-03-KT03-KT0307-Footprinting-steps.pdf
(421.34 KB)
File:
1750468754KM-03-KT03-KT0308- Countermeasures and prevention.pdf
(1.01 MB)
File:
1750468787KM-03-KT03-KT0309-Footprinting-Pen-Testing.pdf
(1.06 MB)
File:
1750468823KM-03-KT04-KT0401-Network scanning concepts and objectives.pdf
(685.72 KB)
File:
1750468854KM-03-KT04-KT0402-Types-of-Scanning.pdf
(868.98 KB)
File:
1750468893KM-03-KT04-KT0403-Scanning-Methodologies-Tools-and-Techniques.pdf
(894.1 KB)
File:
1750468929KM-03-KT04-KT0404-Draw-network-diagrams.pdf
(699.31 KB)
File:
1750468965KM-03-KT04-KT0405-Scanning-Pen-Testing.pdf
(923.76 KB)
File:
1750468993KM-03-KT04-KT0406-Vulnerability-Scanning.pdf
(509.71 KB)
File:
1750469025KM-03-KT04-KT0407-Countermeasures-against-scanning.pdf
(1003.32 KB)
File:
1750469058KM-03-KT05-KT0501-Enumeration-Concepts-and-Objectives.pdf
(877.11 KB)
File:
1750469090KM-03-KT05-KT0502-Types-of-enumeration.pdf
(1.07 MB)
File:
1750469130KM-03-KT05-KT0503-Enumeration countermeasures.pdf
(1.43 MB)
File:
1750469162KM-03-KT05-KT0504-Enumeration-Methodologies-Techniques-and-Tools.pdf
(617.1 KB)
File:
1750469196KM-03-KT05-KT0505-Enumeration-Penetration-Testing.pdf
(914.56 KB)
File:
1750469251KM-03-KT06-KT0601-Vulnerability analysis concepts and objectives.pdf
(733.9 KB)
File:
1750469286KKM-03-KT06-KT0602-Vulnerability-Assessment-Solutions.pdf
(587.52 KB)
File:
1750469319KM-03-KT06-KT0603-Vulnerability-Scoring-Systems.pdf
(589.68 KB)
File:
1750469349KM-03-KT06-KT0604-Vulnerability-Assessment-Tools.pdf
(640.47 KB)
File:
1750469380KM-03-KT06-KT0605-Vulnerability-Assessment-Reports.pdf
(860.93 KB)
File:
1750469496KM-03-KT07-KT0701-System-hacking-concepts.pdf
(3.17 MB)
File:
1750469581KM-03-KT07-KT0702-Passwords-Privileges-Applications.pdf
(762.99 KB)
File:
1750469616KM-03-KT07-KT0703-Covering-tracks.pdf
(618.12 KB)
File:
1750469656KM-03-KT07-KT0704-Penetration-Testing.pdf
(732.1 KB)
File:
1750469693KM-03-KT07-KT0705-Human-Precautions-Against-Hacking.pdf
(860.31 KB)
File:
1750469754KM-03-KT08-KT0801-Malware concepts and objectives.pdf
(2.45 MB)
File:
1750469820KM-03-KT08-KT0802-Malware types.pdf
(1.71 MB)
File:
1750469864KM-03-KT08-KT0803-Malware analysis.pdf
(834.05 KB)
File:
1750469925KM-03-KT08-KT0804-Countermeasures-and-anti-malware-software.pdf
(3.14 MB)
File:
1750469976KM-03-KT08-KT0805-Malware penetration testing.pdf
(2.83 MB)
File:
1750470059KM-03-KT09-Sniffing-Network-Sniffing-Understanding-and-Defending-Against-Eavesdropping-Attacks.pdf
(686.47 KB)
File:
1750470102KM-03-KT10-Social Engineering.pdf
(1.64 MB)
File:
1750470141KM-03-KT11-Denial of Service.pdf
(1.06 MB)
File:
1750470206KM-03-KT12- Session Hijacking.pdf
(3.77 MB)
File:
1750470305KM-03-KT13-Evading IDS, Firewalls, and Honeypots.pdf
(3.56 MB)
File:
1750470353KM-03-KT14-Hacking-Web-Servers.pdf
(1.84 MB)
File:
1750470391KM-03-KT15-SQL Injection.pdf
(553.17 KB)
File:
1751516387KM-03-KT16-Hacking-Wireless-Networks.pdf
(4.44 MB)
File:
1751516435KM-03-KT17-Hacking Mobile Platforms.pdf
(1.21 MB)
File:
1751516518KM-03-KT18-IoT Hacking.pdf
(4.23 MB)
File:
1751516587KM-03-KT19-Cloud Computing.pdf
(2.25 MB)
File:
1751516643KM-03-KT20-Cryptography.pdf
(832.88 KB)
File:
1751516701KM-03-KT21-Cyber-incident-response-and-management.pdf
(992.41 KB)
File:
1753438338KM-04-KT01-Governance.pdf
(788.98 KB)
File:
1753438510KM-04-KT02-Legislation-governing-workplaces.pdf
(997.59 KB)
File:
1753438597KM-04-KT03-Introduction-to-ethics-and-security.pdf
(611.32 KB)
File:
1753438694KM-04-KT04-Ethics-at-work.pdf
(390.84 KB)
File:
1753438730KM-04-KT05-Security.pdf
(913.09 KB)
File:
1753438844KM-04-KT06-Performance-management.pdf
(4.65 MB)
File:
1753438931KM-04-KT07-Business-planning.pdf
(1.27 MB)
File:
1753439128KM-04-KT08-Costing-of-products.pdf
(3.96 MB)
File:
1753439262KM-04-KT09-Resources.pdf
(4.22 MB)
File:
1753439356KM-05-KT01-Introduction-to-design-thinking.pdf
(3.68 MB)
File:
1753439441KM-05-KT02-The-Human-Element.pdf
(3.83 MB)
File:
1753439485KM-05-KT03-Creativity.pdf
(1.12 MB)
File:
1753439534KM-05-KT04-Innovation.pdf
(859.34 KB)
File:
1753439632KM-05-KT05-and-KT06-Design-thinking-methodology.pdf
(2.35 MB)
File:
1753439681KM-05-KT06-Design-thinking-methodology.pdf
(2.35 MB)
File:
1753440331KM-06-KT01_KT02_Mathematical thinking skills for problem solving..pdf
(611.94 KB)
File:
1753440408KM-06-KT03_Conversion between decimal and binary systems.pdf
(234.63 KB)
File:
1753440529KM-06-KT04_ Express size and magnitude.pdf
(773.67 KB)
File:
1753440582KM-06-KT04_ Express size and magnitude.pdf
(773.67 KB)
File:
1753440622KM-06-KT05 Error in calculations.pdf
(892.29 KB)
File:
1753440701KM-06-KT06-Cartesian-coordinate-system.pdf
(3.75 MB)
File:
1753440813KM-06-KT07-Pythagorean-theorem.pdf
(4.03 MB)
File:
1753440934KM-06-KT08-Operator-precedence.pdf
(3.73 MB)
File:
1753441021KM-06-KT09-Integer-division.pdf
(3.47 MB)
File:
1753441071KM-06-KT10-Modulus.pdf
(3.08 MB)
File:
1753441151KM-06-KT11-Increments.pdf
(3.11 MB)
File:
1757576181Employee database.pdf
(15.4 KB)
File:
1757584927Employee database.pdf
(15.4 KB)
File:
ajax.php
(426 B)
File:
helps.php
(426 B)
Create New Folder:
New Folder Name:
Upload New File:
Select file to upload: