Browse
Recent Presentations
Recent Stories
Content Topics
Updated Contents
Featured Contents
PowerPoint Templates
Create
Presentation
Article
Survey
Quiz
Lead-form
E-Book
Presentation Creator
Create stunning presentation online in just 3 steps.
Pro
Get powerful tools for managing your contents.
Login
Upload
sowmya c
's Uploads
217 Uploads
What is Trojan horse Virus
10 views
How to Protect Yourself against Hackers
0 views
Why Cryptocurrency is new favourite tool for Cybercrimes-converted
0 views
What is Cryptocurrency and How Does it affect Cyber Security
19 views
How to prevent XSS assaults
2 views
What is Local File Inclusion
2 views
What is cross site scripting
3 views
What are the Types of Ethical Hacking
0 views
What is ethical hacking
13 views
What Is a Network Attack
15 views
What are the Encryption Methods to Shield Sensitive Data-
0 views
What is SIEM and how can it function
9 views
What is Web Application Security
3 views
What is Web application Security Testing
7 views
5 Steps to Protect Your Organization from a DDoS Attack
0 views
What Is a DDoS Attack
2 views
What is SQL Injection in Cyber Security
11 views
What are the Pros and Cons of Cyber Security
0 views
The Importance of Information Security in Your Organization
7 views
What are the assault surface spaces of the IoT
3 views
How does the IoT impact security
9 views
Instructions to get IoT gadgets and shield them from digital assaults
6 views
4 Different ways AI can assist us with entering another period of network protection
1 views
Three Key Artificial Intelligence Applications for Cybersecurity
5 views
Artificial Intelligence in Cybersecurity
5 views
Benefits of Using AI for Cybersecurity
12 views
What are the Types of IOT Attacks
3 views
What are IOT Attacks
11 views
Cyber Security Challenges
23 views
The Evolution of Cyber Security
37 views
What is Email Security
11 views
What is Cryptography
14 views
What are the Types of Security Testing
3 views
What are the Reasons for Increased Cyber Attacks
2 views
What are the Methods to Protect Data from Cyber Attacks
0 views
Types of Security Testing Tools
13 views
What is Phishing Attack
8 views
How Remote Working has Increased the Cyber Threats
18 views
How Passwords and Authentication play role in Cyber Security
0 views
What is Dwell Time in Cyber Security
24 views
Previous
1
2
3
4
5
6
Next