• About Me
    • Awards & Recognitions
    • Tanmay's Information
    • Television
    • News Gallery >
      • आपलं महानगर
      • देशदूत
      • दैनिक दिव्य मराठी
      • दैनिक गांवकरी
      • लोकमत
      • पुढारी
      • सकाळ
      • Tarun Bharat
      • Lokmat Times
      • The Nashik Herald
      • दैनिक लोकनामा
    • Past Events >
      • YCMOU
      • FDP STTTP
      • PPDC
      • GCEKarad
      • KVIC
      • Kopykitab
      • Cyber Defender
      • Chandori
      • DACOE
      • Sanjivani Boot Camp
      • Sanjivani Capsule Course
      • Pune Vidyarthi Griha's College of Engineering, Nashik
      • Fake News
      • Government Polytechnic
      • Community Engagement Workshop – Cyber Sanskar | Tanmay S Dikshit
    • Radio
    • Tanmay's Initiative >
      • AI Digital Content Creation
      • Know the Risks
      • Purification Social Media
      • Mastering Digital Citizenship & Safety
      • Career Enhancement Program
      • Cyber Investigator
      • Phone Detox
      • Mastering Streaming
      • Social Activities
    • Join >
      • Industry Profile
      • Offer Letter >
        • Tasks List
  • Workshop
    • AI Cyber Master >
      • Program Instructions
    • Certified Ethical Hacker & Bug Bounty Security Researcher >
      • 1 Fundamentals Ethics >
        • Types & Skills of Hackers – Cyber Sanskar
        • Cyber Attaks Map
        • Malware
      • 2 Footprinting & Reconnaissance
      • 3 Vulnerability Analysis
      • 4 System Hacking Exploitation >
        • Physical Hacking
      • 5 Traffic Analysis >
        • Network Protocol Analyzer
      • 6 Malware Education
      • 7 Human Hacking
      • 8 Hacking Mobile Platforms
      • 9 Drone Hacking Security >
        • Cyber Career Pathway
    • Certified Cyber Security Specialist >
      • 1 Cyber Security Fundamentals
      • 2 Cyber Crime Attacks
      • 3 Password Security Authentication >
        • Password Analyzer
      • 4 Wi FI & OS Security >
        • WIFI
      • 5 Data Protection
      • 6 Email & Social Media Security >
        • Social Engineering
        • Social Media Crime
      • 7 Cyber Fraud >
        • Phishing Awareness
      • 8 Intrusion Prevention
    • Certified Cyber Crime Investigation >
      • 1 Cyber Crime Investigation >
        • System Information Dashboard
      • 2 Cyber Investigation Process >
        • Ports Guide
        • Sim Card Guide
        • Domain Hijacking Explained – Real Startup Case Study
      • 3 Digital Evidence Collection
      • 4 Email Investigation
      • 5 Social Media Investigation
      • 6 OSINT
      • 7 Mobile Investigation
    • Certified Cyber & Digital Forensics Examination >
      • 1 Investigation Guide >
        • Digital Evidence Education
        • Digital Devices
      • Chain of Custody Management System
      • Case Flow
      • 6 Data Recovery
      • Hardware & Networking >
        • Packet-data-journey
        • Browser Security
        • OS Command
    • Advanced Secure Communication Professional >
      • 1 Encryption Decryption
      • 2 Cryptography >
        • Cryptography
      • 3 Steganography
      • 4 Cryptanalysis
      • 5 Secure File Sharing
      • 7 Secure Encryption Lab
      • 8 Secure Encryption
    • Case Studies >
      • RTO Fraud
    • MoU & CoE >
      • Cyber Law >
        • Legal Sections Identifier
        • Cyber Offences Mapper
        • Cyber Policy
      • Cyber AquaShield >
        • Water Cyber Attacks
        • Infrastructure Security
        • Inter Departmental
        • Financial Administrative
      • Navjeevan Law College
      • Digital Skills Workshop
      • Internship
      • Apprenticeship
    • Placement
  • Contact Us
Cyber Sanskar
  • About Me
    • Awards & Recognitions
    • Tanmay's Information
    • Television
    • News Gallery >
      • आपलं महानगर
      • देशदूत
      • दैनिक दिव्य मराठी
      • दैनिक गांवकरी
      • लोकमत
      • पुढारी
      • सकाळ
      • Tarun Bharat
      • Lokmat Times
      • The Nashik Herald
      • दैनिक लोकनामा
    • Past Events >
      • YCMOU
      • FDP STTTP
      • PPDC
      • GCEKarad
      • KVIC
      • Kopykitab
      • Cyber Defender
      • Chandori
      • DACOE
      • Sanjivani Boot Camp
      • Sanjivani Capsule Course
      • Pune Vidyarthi Griha's College of Engineering, Nashik
      • Fake News
      • Government Polytechnic
      • Community Engagement Workshop – Cyber Sanskar | Tanmay S Dikshit
    • Radio
    • Tanmay's Initiative >
      • AI Digital Content Creation
      • Know the Risks
      • Purification Social Media
      • Mastering Digital Citizenship & Safety
      • Career Enhancement Program
      • Cyber Investigator
      • Phone Detox
      • Mastering Streaming
      • Social Activities
    • Join >
      • Industry Profile
      • Offer Letter >
        • Tasks List
  • Workshop
    • AI Cyber Master >
      • Program Instructions
    • Certified Ethical Hacker & Bug Bounty Security Researcher >
      • 1 Fundamentals Ethics >
        • Types & Skills of Hackers – Cyber Sanskar
        • Cyber Attaks Map
        • Malware
      • 2 Footprinting & Reconnaissance
      • 3 Vulnerability Analysis
      • 4 System Hacking Exploitation >
        • Physical Hacking
      • 5 Traffic Analysis >
        • Network Protocol Analyzer
      • 6 Malware Education
      • 7 Human Hacking
      • 8 Hacking Mobile Platforms
      • 9 Drone Hacking Security >
        • Cyber Career Pathway
    • Certified Cyber Security Specialist >
      • 1 Cyber Security Fundamentals
      • 2 Cyber Crime Attacks
      • 3 Password Security Authentication >
        • Password Analyzer
      • 4 Wi FI & OS Security >
        • WIFI
      • 5 Data Protection
      • 6 Email & Social Media Security >
        • Social Engineering
        • Social Media Crime
      • 7 Cyber Fraud >
        • Phishing Awareness
      • 8 Intrusion Prevention
    • Certified Cyber Crime Investigation >
      • 1 Cyber Crime Investigation >
        • System Information Dashboard
      • 2 Cyber Investigation Process >
        • Ports Guide
        • Sim Card Guide
        • Domain Hijacking Explained – Real Startup Case Study
      • 3 Digital Evidence Collection
      • 4 Email Investigation
      • 5 Social Media Investigation
      • 6 OSINT
      • 7 Mobile Investigation
    • Certified Cyber & Digital Forensics Examination >
      • 1 Investigation Guide >
        • Digital Evidence Education
        • Digital Devices
      • Chain of Custody Management System
      • Case Flow
      • 6 Data Recovery
      • Hardware & Networking >
        • Packet-data-journey
        • Browser Security
        • OS Command
    • Advanced Secure Communication Professional >
      • 1 Encryption Decryption
      • 2 Cryptography >
        • Cryptography
      • 3 Steganography
      • 4 Cryptanalysis
      • 5 Secure File Sharing
      • 7 Secure Encryption Lab
      • 8 Secure Encryption
    • Case Studies >
      • RTO Fraud
    • MoU & CoE >
      • Cyber Law >
        • Legal Sections Identifier
        • Cyber Offences Mapper
        • Cyber Policy
      • Cyber AquaShield >
        • Water Cyber Attacks
        • Infrastructure Security
        • Inter Departmental
        • Financial Administrative
      • Navjeevan Law College
      • Digital Skills Workshop
      • Internship
      • Apprenticeship
    • Placement
  • Contact Us

Special Capsule Webinar Course under the Guidance of
Dr. M A Jawale, Professor & Head, Department of Information Technology,
SRES Sanjivani College of Engineering, Kopargaon.

Coordination under Guidance of Devyani Bhamare
Assistant Professor, Dept of Information Technology, Sanjivani COE Kopargaon

Live Streaming Hands on Training & Course Material

Wednesday, 2 September 2020
Introduction of  Special Capsule Webinar

How to Used Live
Interactive Learning Management System
Hands on Practicals Laboratory
Presentation, Interactive Question & Answer sessions,
Live Case Studies etc.

Online Attendance
File Size: 5 kb
File Type: csv
Download File

Thursday, 3 September 2020
Data Storage Techniques

डेटा सुरक्षित राहण्यासाठी आपण कोणत्या पोल्डरचा वापर करणे आवश्यक आहे.
कॉम्बिनेशन = मॅजिक + हिडन + इनक्रेप्र्त
आपली फाइल सेफ आणि सुरक्षित राहावी म्हणून आपण काय करणे आवश्यक आहे.
फाईलचे एक्सटेंशन बदलणे आवश्यक आहे. 

Cryptography

Online Attendance
File Size: 26 kb
File Type: csv
Download File

Friday, 4 September 2020
Complete Step by Step Guide For Cyber Certification

Online Attendance
File Size: 33 kb
File Type: csv
Download File

Online Certification Feedback

Recognition Badge Pdf.rar
File Size: 13209 kb
File Type: rar
Download File

Saturday, 5 September 2020
Stenography

Saturday, 7 September 2020
Windows Admin Tips & Tricks

Online Attendance
File Size: 41 kb
File Type: csv
Download File

Saturday, 8 September 2020
Desktop & Laptop Security

Online Attendance
File Size: 48 kb
File Type: csv
Download File

Saturday, 9 September 2020
Desktop & Laptop Security

9 9 2020
File Size: 55 kb
File Type: csv
Download File

10 September 2020
Track The Sender's Identity
( WiFi, Email Header Analysis, Whats App )

10 9 2020
File Size: 62 kb
File Type: csv
Download File

11 September 2020
Email Accounts Security Tips & Tricks

11 9 2020
File Size: 70 kb
File Type: csv
Download File

Social Media Account Security Settings for Facebook & LinkedIn

12 September 2020
100% Discount for Udemy™  4 Online Courses

12 9 2020
File Size: 82 kb
File Type: csv
Download File

System Audit

14 September 2020
Career Opportunity in Cyber Reporter

15 September 2020
Cyber Awareness & Case Studies

16 September 2020
Real Time Case Studies by Adv. D S Rana, DIGP

16 9 2020
File Size: 87 kb
File Type: csv
Download File

17 September 2020
Cyber War Session by Brigadier Hemant Mahajan, YSM ( Rtd )

Cyber War & Network Forensics

17 9 2020
File Size: 89 kb
File Type: csv
Download File

18 September 2020
Freelancing Abroad

18 9 2020
File Size: 95 kb
File Type: csv
Download File

19 September 2020
Online Reputation via TV Actress

21 September 2020
Ensuring Data Integrity - Hashing

Live Forensics - Acquisition of Random Access Memory

Acquisition or Clone of Micro SD Card / HDD 

22 September 2020
Live Forensics - File Extension Mismatch Case Studies

Data Recovery

23 September 2020
Multimedia Forensics ( Audio Video & Image Analysis )

Forensics Application Indexing & Searching, Generating a Report

Mobile & Tab Forensics Analysis & Reports

24 September 2020
Cloud & Network Storage Techniques

24 September 2020
Build a Strong Online Profile & Offline Presence

Brain Computer Interface

  • About Me
    • Awards & Recognitions
    • Tanmay's Information
    • Television
    • News Gallery >
      • आपलं महानगर
      • देशदूत
      • दैनिक दिव्य मराठी
      • दैनिक गांवकरी
      • लोकमत
      • पुढारी
      • सकाळ
      • Tarun Bharat
      • Lokmat Times
      • The Nashik Herald
      • दैनिक लोकनामा
    • Past Events >
      • YCMOU
      • FDP STTTP
      • PPDC
      • GCEKarad
      • KVIC
      • Kopykitab
      • Cyber Defender
      • Chandori
      • DACOE
      • Sanjivani Boot Camp
      • Sanjivani Capsule Course
      • Pune Vidyarthi Griha's College of Engineering, Nashik
      • Fake News
      • Government Polytechnic
      • Community Engagement Workshop – Cyber Sanskar | Tanmay S Dikshit
    • Radio
    • Tanmay's Initiative >
      • AI Digital Content Creation
      • Know the Risks
      • Purification Social Media
      • Mastering Digital Citizenship & Safety
      • Career Enhancement Program
      • Cyber Investigator
      • Phone Detox
      • Mastering Streaming
      • Social Activities
    • Join >
      • Industry Profile
      • Offer Letter >
        • Tasks List
  • Workshop
    • AI Cyber Master >
      • Program Instructions
    • Certified Ethical Hacker & Bug Bounty Security Researcher >
      • 1 Fundamentals Ethics >
        • Types & Skills of Hackers – Cyber Sanskar
        • Cyber Attaks Map
        • Malware
      • 2 Footprinting & Reconnaissance
      • 3 Vulnerability Analysis
      • 4 System Hacking Exploitation >
        • Physical Hacking
      • 5 Traffic Analysis >
        • Network Protocol Analyzer
      • 6 Malware Education
      • 7 Human Hacking
      • 8 Hacking Mobile Platforms
      • 9 Drone Hacking Security >
        • Cyber Career Pathway
    • Certified Cyber Security Specialist >
      • 1 Cyber Security Fundamentals
      • 2 Cyber Crime Attacks
      • 3 Password Security Authentication >
        • Password Analyzer
      • 4 Wi FI & OS Security >
        • WIFI
      • 5 Data Protection
      • 6 Email & Social Media Security >
        • Social Engineering
        • Social Media Crime
      • 7 Cyber Fraud >
        • Phishing Awareness
      • 8 Intrusion Prevention
    • Certified Cyber Crime Investigation >
      • 1 Cyber Crime Investigation >
        • System Information Dashboard
      • 2 Cyber Investigation Process >
        • Ports Guide
        • Sim Card Guide
        • Domain Hijacking Explained – Real Startup Case Study
      • 3 Digital Evidence Collection
      • 4 Email Investigation
      • 5 Social Media Investigation
      • 6 OSINT
      • 7 Mobile Investigation
    • Certified Cyber & Digital Forensics Examination >
      • 1 Investigation Guide >
        • Digital Evidence Education
        • Digital Devices
      • Chain of Custody Management System
      • Case Flow
      • 6 Data Recovery
      • Hardware & Networking >
        • Packet-data-journey
        • Browser Security
        • OS Command
    • Advanced Secure Communication Professional >
      • 1 Encryption Decryption
      • 2 Cryptography >
        • Cryptography
      • 3 Steganography
      • 4 Cryptanalysis
      • 5 Secure File Sharing
      • 7 Secure Encryption Lab
      • 8 Secure Encryption
    • Case Studies >
      • RTO Fraud
    • MoU & CoE >
      • Cyber Law >
        • Legal Sections Identifier
        • Cyber Offences Mapper
        • Cyber Policy
      • Cyber AquaShield >
        • Water Cyber Attacks
        • Infrastructure Security
        • Inter Departmental
        • Financial Administrative
      • Navjeevan Law College
      • Digital Skills Workshop
      • Internship
      • Apprenticeship
    • Placement
  • Contact Us