• About Me
    • Awards & Recognitions
    • Tanmay's Information
    • Television
    • News Gallery >
      • आपलं महानगर
      • देशदूत
      • दैनिक दिव्य मराठी
      • दैनिक गांवकरी
      • लोकमत
      • पुढारी
      • सकाळ
      • Tarun Bharat
      • Lokmat Times
      • The Nashik Herald
      • दैनिक लोकनामा
    • Past Events >
      • YCMOU
      • FDP STTTP
      • PPDC
      • GCEKarad
      • KVIC
      • Kopykitab
      • Cyber Defender
      • Chandori
      • DACOE
      • Sanjivani Boot Camp
      • Sanjivani Capsule Course
      • Pune Vidyarthi Griha's College of Engineering, Nashik
      • Fake News
      • Government Polytechnic
      • Community Engagement Workshop – Cyber Sanskar | Tanmay S Dikshit
    • Radio
    • Tanmay's Initiative >
      • AI Digital Content Creation
      • Know the Risks
      • Purification Social Media
      • Mastering Digital Citizenship & Safety
      • Career Enhancement Program
      • Cyber Investigator
      • Phone Detox
      • Mastering Streaming
      • Social Activities
    • Join >
      • Industry Profile
      • Offer Letter >
        • Tasks List
  • Workshop
    • AI Cyber Master >
      • Program Instructions
    • Certified Ethical Hacker & Bug Bounty Security Researcher >
      • 1 Fundamentals Ethics >
        • Types & Skills of Hackers – Cyber Sanskar
        • Cyber Attaks Map
        • Malware
      • 2 Footprinting & Reconnaissance
      • 3 Vulnerability Analysis
      • 4 System Hacking Exploitation >
        • Physical Hacking
      • 5 Traffic Analysis >
        • Network Protocol Analyzer
      • 6 Malware Education
      • 7 Human Hacking
      • 8 Hacking Mobile Platforms
      • 9 Drone Hacking Security >
        • Cyber Career Pathway
    • Certified Cyber Security Specialist >
      • 1 Cyber Security Fundamentals
      • 2 Cyber Crime Attacks
      • 3 Password Security Authentication >
        • Password Analyzer
      • 4 Wi FI & OS Security >
        • WIFI
      • 5 Data Protection
      • 6 Email & Social Media Security >
        • Social Engineering
        • Social Media Crime
      • 7 Cyber Fraud >
        • Phishing Awareness
      • 8 Intrusion Prevention
    • Certified Cyber Crime Investigation >
      • 1 Cyber Crime Investigation >
        • System Information Dashboard
      • 2 Cyber Investigation Process >
        • Ports Guide
        • Sim Card Guide
        • Domain Hijacking Explained – Real Startup Case Study
      • 3 Digital Evidence Collection
      • 4 Email Investigation
      • 5 Social Media Investigation
      • 6 OSINT
      • 7 Mobile Investigation
    • Certified Cyber & Digital Forensics Examination >
      • 1 Investigation Guide >
        • Digital Evidence Education
        • Digital Devices
      • Chain of Custody Management System
      • Case Flow
      • 6 Data Recovery
      • Hardware & Networking >
        • Packet-data-journey
        • Browser Security
        • OS Command
    • Advanced Secure Communication Professional >
      • 1 Encryption Decryption
      • 2 Cryptography >
        • Cryptography
      • 3 Steganography
      • 4 Cryptanalysis
      • 5 Secure File Sharing
      • 7 Secure Encryption Lab
      • 8 Secure Encryption
    • Case Studies >
      • RTO Fraud
    • MoU & CoE >
      • Cyber Law >
        • Legal Sections Identifier
        • Cyber Offences Mapper
        • Cyber Policy
      • Cyber AquaShield >
        • Water Cyber Attacks
        • Infrastructure Security
        • Inter Departmental
        • Financial Administrative
      • Navjeevan Law College
      • Digital Skills Workshop
      • Internship
      • Apprenticeship
    • Placement
  • Contact Us
Cyber Sanskar
  • About Me
    • Awards & Recognitions
    • Tanmay's Information
    • Television
    • News Gallery >
      • आपलं महानगर
      • देशदूत
      • दैनिक दिव्य मराठी
      • दैनिक गांवकरी
      • लोकमत
      • पुढारी
      • सकाळ
      • Tarun Bharat
      • Lokmat Times
      • The Nashik Herald
      • दैनिक लोकनामा
    • Past Events >
      • YCMOU
      • FDP STTTP
      • PPDC
      • GCEKarad
      • KVIC
      • Kopykitab
      • Cyber Defender
      • Chandori
      • DACOE
      • Sanjivani Boot Camp
      • Sanjivani Capsule Course
      • Pune Vidyarthi Griha's College of Engineering, Nashik
      • Fake News
      • Government Polytechnic
      • Community Engagement Workshop – Cyber Sanskar | Tanmay S Dikshit
    • Radio
    • Tanmay's Initiative >
      • AI Digital Content Creation
      • Know the Risks
      • Purification Social Media
      • Mastering Digital Citizenship & Safety
      • Career Enhancement Program
      • Cyber Investigator
      • Phone Detox
      • Mastering Streaming
      • Social Activities
    • Join >
      • Industry Profile
      • Offer Letter >
        • Tasks List
  • Workshop
    • AI Cyber Master >
      • Program Instructions
    • Certified Ethical Hacker & Bug Bounty Security Researcher >
      • 1 Fundamentals Ethics >
        • Types & Skills of Hackers – Cyber Sanskar
        • Cyber Attaks Map
        • Malware
      • 2 Footprinting & Reconnaissance
      • 3 Vulnerability Analysis
      • 4 System Hacking Exploitation >
        • Physical Hacking
      • 5 Traffic Analysis >
        • Network Protocol Analyzer
      • 6 Malware Education
      • 7 Human Hacking
      • 8 Hacking Mobile Platforms
      • 9 Drone Hacking Security >
        • Cyber Career Pathway
    • Certified Cyber Security Specialist >
      • 1 Cyber Security Fundamentals
      • 2 Cyber Crime Attacks
      • 3 Password Security Authentication >
        • Password Analyzer
      • 4 Wi FI & OS Security >
        • WIFI
      • 5 Data Protection
      • 6 Email & Social Media Security >
        • Social Engineering
        • Social Media Crime
      • 7 Cyber Fraud >
        • Phishing Awareness
      • 8 Intrusion Prevention
    • Certified Cyber Crime Investigation >
      • 1 Cyber Crime Investigation >
        • System Information Dashboard
      • 2 Cyber Investigation Process >
        • Ports Guide
        • Sim Card Guide
        • Domain Hijacking Explained – Real Startup Case Study
      • 3 Digital Evidence Collection
      • 4 Email Investigation
      • 5 Social Media Investigation
      • 6 OSINT
      • 7 Mobile Investigation
    • Certified Cyber & Digital Forensics Examination >
      • 1 Investigation Guide >
        • Digital Evidence Education
        • Digital Devices
      • Chain of Custody Management System
      • Case Flow
      • 6 Data Recovery
      • Hardware & Networking >
        • Packet-data-journey
        • Browser Security
        • OS Command
    • Advanced Secure Communication Professional >
      • 1 Encryption Decryption
      • 2 Cryptography >
        • Cryptography
      • 3 Steganography
      • 4 Cryptanalysis
      • 5 Secure File Sharing
      • 7 Secure Encryption Lab
      • 8 Secure Encryption
    • Case Studies >
      • RTO Fraud
    • MoU & CoE >
      • Cyber Law >
        • Legal Sections Identifier
        • Cyber Offences Mapper
        • Cyber Policy
      • Cyber AquaShield >
        • Water Cyber Attacks
        • Infrastructure Security
        • Inter Departmental
        • Financial Administrative
      • Navjeevan Law College
      • Digital Skills Workshop
      • Internship
      • Apprenticeship
    • Placement
  • Contact Us

State Level Workshopon
Recent Trends in Data Science & IoT

21st & 22nd September 2022

Dr. Tanmay S Dikshit Cyber & Document FORENSICS Expert CEH, ECSA, DCL, B.Voc, PGDCL, MJMC by Tanmay S Dikshit
BCI by Tanmay S Dikshit

ai ml based video course
​udemy ​Premium Instructor
Explore a variety of Cyber E Books
​amazon kindle author
Educational Access
Data Science & IoT
File Size: 1415 kb
File Type: pdf
Download File

Cyber E Book.pdf
File Size: 64851 kb
File Type: pdf
Download File

Integrated Approach of Science & Technology in Cyber Security

🧠🔐 राष्ट्रीय विज्ञान दिन – सायबर जागरूकतेचा संदेश !
सायबर युगात गुन्हेगार ओळखणे अवघड झाले आहे – समाजात सायबर सजगतेची गरज अधिक तीव्र झाली आहे !

🎤 "सायबर गुन्हेगार समोर असतानाही त्याला ओळखता येत नाही – त्यामुळे सामाजिक जागरूकता आवश्यक आहे."
– सायबर सुरक्षा विशेषज्ञ तन्मय दीक्षित,

राष्ट्रीय विज्ञान दिनानिमित्त यशवंतराव चव्हाण महाराष्ट्र मुक्त विद्यापीठात आयोजित ऑनलाईन व्याख्यानात मार्गदर्शन 🙌

📅 दिनांक – २८ फेब्रुवारी
🎓 आयोजक – वास्तुकला, विज्ञान व तंत्रज्ञान विद्याशाखा

👥 प्रमुख उपस्थिती – डॉ. जयदीप निकम, डॉ. सुनंदा मोरे, डॉ. चेतना कमळस्कर

💻 व्याख्यानात विद्यापीठातील अधिकारी, प्राध्यापक, विद्यार्थी आणि कर्मचाऱ्यांचा मोठा सहभाग !
​
#CyberSecurity #NationalScienceDay #TanmayDikshit #CyberSanskar #DigitalAwareness #YCMOU #CyberCrime #OnlineSafety #ScienceDay2025 #NashikEvents
​https://www.mymahanagar.com/maharashtra/nashik/security-expert-tanmay-dixit-stated-that-cyber-criminals-should-be-found-in-nashik/408567/
News Tanmay S Dikshit Security Expert Stated that Cyber Criminals should be found in Nashik.pdf
File Size: 808 kb
File Type: pdf
Download File

  • About Me
    • Awards & Recognitions
    • Tanmay's Information
    • Television
    • News Gallery >
      • आपलं महानगर
      • देशदूत
      • दैनिक दिव्य मराठी
      • दैनिक गांवकरी
      • लोकमत
      • पुढारी
      • सकाळ
      • Tarun Bharat
      • Lokmat Times
      • The Nashik Herald
      • दैनिक लोकनामा
    • Past Events >
      • YCMOU
      • FDP STTTP
      • PPDC
      • GCEKarad
      • KVIC
      • Kopykitab
      • Cyber Defender
      • Chandori
      • DACOE
      • Sanjivani Boot Camp
      • Sanjivani Capsule Course
      • Pune Vidyarthi Griha's College of Engineering, Nashik
      • Fake News
      • Government Polytechnic
      • Community Engagement Workshop – Cyber Sanskar | Tanmay S Dikshit
    • Radio
    • Tanmay's Initiative >
      • AI Digital Content Creation
      • Know the Risks
      • Purification Social Media
      • Mastering Digital Citizenship & Safety
      • Career Enhancement Program
      • Cyber Investigator
      • Phone Detox
      • Mastering Streaming
      • Social Activities
    • Join >
      • Industry Profile
      • Offer Letter >
        • Tasks List
  • Workshop
    • AI Cyber Master >
      • Program Instructions
    • Certified Ethical Hacker & Bug Bounty Security Researcher >
      • 1 Fundamentals Ethics >
        • Types & Skills of Hackers – Cyber Sanskar
        • Cyber Attaks Map
        • Malware
      • 2 Footprinting & Reconnaissance
      • 3 Vulnerability Analysis
      • 4 System Hacking Exploitation >
        • Physical Hacking
      • 5 Traffic Analysis >
        • Network Protocol Analyzer
      • 6 Malware Education
      • 7 Human Hacking
      • 8 Hacking Mobile Platforms
      • 9 Drone Hacking Security >
        • Cyber Career Pathway
    • Certified Cyber Security Specialist >
      • 1 Cyber Security Fundamentals
      • 2 Cyber Crime Attacks
      • 3 Password Security Authentication >
        • Password Analyzer
      • 4 Wi FI & OS Security >
        • WIFI
      • 5 Data Protection
      • 6 Email & Social Media Security >
        • Social Engineering
        • Social Media Crime
      • 7 Cyber Fraud >
        • Phishing Awareness
      • 8 Intrusion Prevention
    • Certified Cyber Crime Investigation >
      • 1 Cyber Crime Investigation >
        • System Information Dashboard
      • 2 Cyber Investigation Process >
        • Ports Guide
        • Sim Card Guide
        • Domain Hijacking Explained – Real Startup Case Study
      • 3 Digital Evidence Collection
      • 4 Email Investigation
      • 5 Social Media Investigation
      • 6 OSINT
      • 7 Mobile Investigation
    • Certified Cyber & Digital Forensics Examination >
      • 1 Investigation Guide >
        • Digital Evidence Education
        • Digital Devices
      • Chain of Custody Management System
      • Case Flow
      • 6 Data Recovery
      • Hardware & Networking >
        • Packet-data-journey
        • Browser Security
        • OS Command
    • Advanced Secure Communication Professional >
      • 1 Encryption Decryption
      • 2 Cryptography >
        • Cryptography
      • 3 Steganography
      • 4 Cryptanalysis
      • 5 Secure File Sharing
      • 7 Secure Encryption Lab
      • 8 Secure Encryption
    • Case Studies >
      • RTO Fraud
    • MoU & CoE >
      • Cyber Law >
        • Legal Sections Identifier
        • Cyber Offences Mapper
        • Cyber Policy
      • Cyber AquaShield >
        • Water Cyber Attacks
        • Infrastructure Security
        • Inter Departmental
        • Financial Administrative
      • Navjeevan Law College
      • Digital Skills Workshop
      • Internship
      • Apprenticeship
    • Placement
  • Contact Us