About Me
Awards & Recognitions
Tanmay's Information
Television
News Gallery
>
आपलं महानगर
देशदूत
दैनिक दिव्य मराठी
दैनिक गांवकरी
लोकमत
पुढारी
सकाळ
Tarun Bharat
Lokmat Times
The Nashik Herald
दैनिक लोकनामा
Past Events
>
YCMOU
FDP STTTP
PPDC
GCEKarad
KVIC
Kopykitab
Cyber Defender
Chandori
DACOE
Sanjivani Boot Camp
Sanjivani Capsule Course
Pune Vidyarthi Griha's College of Engineering, Nashik
Fake News
Government Polytechnic
Community Engagement Workshop – Cyber Sanskar | Tanmay S Dikshit
Radio
Tanmay's Initiative
>
AI Digital Content Creation
Know the Risks
Purification Social Media
Mastering Digital Citizenship & Safety
Career Enhancement Program
Cyber Investigator
Phone Detox
Mastering Streaming
Social Activities
Join
>
Industry Profile
Offer Letter
>
Tasks List
Workshop
AI Cyber Master
>
Program Instructions
Certified Ethical Hacker & Bug Bounty Security Researcher
>
1 Fundamentals Ethics
>
Types & Skills of Hackers – Cyber Sanskar
Cyber Attaks Map
Malware
2 Footprinting & Reconnaissance
3 Vulnerability Analysis
4 System Hacking Exploitation
>
Physical Hacking
5 Traffic Analysis
>
Network Protocol Analyzer
6 Malware Education
7 Human Hacking
8 Hacking Mobile Platforms
9 Drone Hacking Security
>
Cyber Career Pathway
Certified Cyber Security Specialist
>
1 Cyber Security Fundamentals
2 Cyber Crime Attacks
3 Password Security Authentication
>
Password Analyzer
4 Wi FI & OS Security
>
WIFI
5 Data Protection
6 Email & Social Media Security
>
Social Engineering
Social Media Crime
7 Cyber Fraud
>
Phishing Awareness
8 Intrusion Prevention
Certified Cyber Crime Investigation
>
1 Cyber Crime Investigation
>
System Information Dashboard
2 Cyber Investigation Process
>
Ports Guide
Sim Card Guide
Domain Hijacking Explained – Real Startup Case Study
3 Digital Evidence Collection
4 Email Investigation
5 Social Media Investigation
6 OSINT
7 Mobile Investigation
Certified Cyber & Digital Forensics Examination
>
1 Investigation Guide
>
Digital Evidence Education
Digital Devices
Chain of Custody Management System
Case Flow
6 Data Recovery
Hardware & Networking
>
Packet-data-journey
Browser Security
OS Command
Advanced Secure Communication Professional
>
1 Encryption Decryption
2 Cryptography
>
Cryptography
3 Steganography
4 Cryptanalysis
5 Secure File Sharing
7 Secure Encryption Lab
8 Secure Encryption
Case Studies
>
RTO Fraud
MoU & CoE
>
Cyber Law
>
Legal Sections Identifier
Cyber Offences Mapper
Cyber Policy
Cyber AquaShield
>
Water Cyber Attacks
Infrastructure Security
Inter Departmental
Financial Administrative
Navjeevan Law College
Digital Skills Workshop
Internship
Apprenticeship
Placement
Contact Us
Menu
Cyber Sanskar
About Me
Awards & Recognitions
Tanmay's Information
Television
News Gallery
>
आपलं महानगर
देशदूत
दैनिक दिव्य मराठी
दैनिक गांवकरी
लोकमत
पुढारी
सकाळ
Tarun Bharat
Lokmat Times
The Nashik Herald
दैनिक लोकनामा
Past Events
>
YCMOU
FDP STTTP
PPDC
GCEKarad
KVIC
Kopykitab
Cyber Defender
Chandori
DACOE
Sanjivani Boot Camp
Sanjivani Capsule Course
Pune Vidyarthi Griha's College of Engineering, Nashik
Fake News
Government Polytechnic
Community Engagement Workshop – Cyber Sanskar | Tanmay S Dikshit
Radio
Tanmay's Initiative
>
AI Digital Content Creation
Know the Risks
Purification Social Media
Mastering Digital Citizenship & Safety
Career Enhancement Program
Cyber Investigator
Phone Detox
Mastering Streaming
Social Activities
Join
>
Industry Profile
Offer Letter
>
Tasks List
Workshop
AI Cyber Master
>
Program Instructions
Certified Ethical Hacker & Bug Bounty Security Researcher
>
1 Fundamentals Ethics
>
Types & Skills of Hackers – Cyber Sanskar
Cyber Attaks Map
Malware
2 Footprinting & Reconnaissance
3 Vulnerability Analysis
4 System Hacking Exploitation
>
Physical Hacking
5 Traffic Analysis
>
Network Protocol Analyzer
6 Malware Education
7 Human Hacking
8 Hacking Mobile Platforms
9 Drone Hacking Security
>
Cyber Career Pathway
Certified Cyber Security Specialist
>
1 Cyber Security Fundamentals
2 Cyber Crime Attacks
3 Password Security Authentication
>
Password Analyzer
4 Wi FI & OS Security
>
WIFI
5 Data Protection
6 Email & Social Media Security
>
Social Engineering
Social Media Crime
7 Cyber Fraud
>
Phishing Awareness
8 Intrusion Prevention
Certified Cyber Crime Investigation
>
1 Cyber Crime Investigation
>
System Information Dashboard
2 Cyber Investigation Process
>
Ports Guide
Sim Card Guide
Domain Hijacking Explained – Real Startup Case Study
3 Digital Evidence Collection
4 Email Investigation
5 Social Media Investigation
6 OSINT
7 Mobile Investigation
Certified Cyber & Digital Forensics Examination
>
1 Investigation Guide
>
Digital Evidence Education
Digital Devices
Chain of Custody Management System
Case Flow
6 Data Recovery
Hardware & Networking
>
Packet-data-journey
Browser Security
OS Command
Advanced Secure Communication Professional
>
1 Encryption Decryption
2 Cryptography
>
Cryptography
3 Steganography
4 Cryptanalysis
5 Secure File Sharing
7 Secure Encryption Lab
8 Secure Encryption
Case Studies
>
RTO Fraud
MoU & CoE
>
Cyber Law
>
Legal Sections Identifier
Cyber Offences Mapper
Cyber Policy
Cyber AquaShield
>
Water Cyber Attacks
Infrastructure Security
Inter Departmental
Financial Administrative
Navjeevan Law College
Digital Skills Workshop
Internship
Apprenticeship
Placement
Contact Us
IAF CJD 3
by Dr. Tanmay S Dikshit
2nd CJD @ IAF
by Dr. Tanmay S Dikshit
About Me
Awards & Recognitions
Tanmay's Information
Television
News Gallery
>
आपलं महानगर
देशदूत
दैनिक दिव्य मराठी
दैनिक गांवकरी
लोकमत
पुढारी
सकाळ
Tarun Bharat
Lokmat Times
The Nashik Herald
दैनिक लोकनामा
Past Events
>
YCMOU
FDP STTTP
PPDC
GCEKarad
KVIC
Kopykitab
Cyber Defender
Chandori
DACOE
Sanjivani Boot Camp
Sanjivani Capsule Course
Pune Vidyarthi Griha's College of Engineering, Nashik
Fake News
Government Polytechnic
Community Engagement Workshop – Cyber Sanskar | Tanmay S Dikshit
Radio
Tanmay's Initiative
>
AI Digital Content Creation
Know the Risks
Purification Social Media
Mastering Digital Citizenship & Safety
Career Enhancement Program
Cyber Investigator
Phone Detox
Mastering Streaming
Social Activities
Join
>
Industry Profile
Offer Letter
>
Tasks List
Workshop
AI Cyber Master
>
Program Instructions
Certified Ethical Hacker & Bug Bounty Security Researcher
>
1 Fundamentals Ethics
>
Types & Skills of Hackers – Cyber Sanskar
Cyber Attaks Map
Malware
2 Footprinting & Reconnaissance
3 Vulnerability Analysis
4 System Hacking Exploitation
>
Physical Hacking
5 Traffic Analysis
>
Network Protocol Analyzer
6 Malware Education
7 Human Hacking
8 Hacking Mobile Platforms
9 Drone Hacking Security
>
Cyber Career Pathway
Certified Cyber Security Specialist
>
1 Cyber Security Fundamentals
2 Cyber Crime Attacks
3 Password Security Authentication
>
Password Analyzer
4 Wi FI & OS Security
>
WIFI
5 Data Protection
6 Email & Social Media Security
>
Social Engineering
Social Media Crime
7 Cyber Fraud
>
Phishing Awareness
8 Intrusion Prevention
Certified Cyber Crime Investigation
>
1 Cyber Crime Investigation
>
System Information Dashboard
2 Cyber Investigation Process
>
Ports Guide
Sim Card Guide
Domain Hijacking Explained – Real Startup Case Study
3 Digital Evidence Collection
4 Email Investigation
5 Social Media Investigation
6 OSINT
7 Mobile Investigation
Certified Cyber & Digital Forensics Examination
>
1 Investigation Guide
>
Digital Evidence Education
Digital Devices
Chain of Custody Management System
Case Flow
6 Data Recovery
Hardware & Networking
>
Packet-data-journey
Browser Security
OS Command
Advanced Secure Communication Professional
>
1 Encryption Decryption
2 Cryptography
>
Cryptography
3 Steganography
4 Cryptanalysis
5 Secure File Sharing
7 Secure Encryption Lab
8 Secure Encryption
Case Studies
>
RTO Fraud
MoU & CoE
>
Cyber Law
>
Legal Sections Identifier
Cyber Offences Mapper
Cyber Policy
Cyber AquaShield
>
Water Cyber Attacks
Infrastructure Security
Inter Departmental
Financial Administrative
Navjeevan Law College
Digital Skills Workshop
Internship
Apprenticeship
Placement
Contact Us