Swashamtaa Foundation
Home
SEE WHAT STUDENTS HAVE TO SAY
EVENTS & WORKSHOPS
MONTHLY NEWSLETTER
BUY OUR BOOKS
MEDIA & GALLARY
Find Us
Swashamtaa Foundation
Home
SEE WHAT STUDENTS HAVE TO SAY
EVENTS & WORKSHOPS
MONTHLY NEWSLETTER
BUY OUR BOOKS
MEDIA & GALLARY
Find Us
CYBER SECURITY
Competency Level 1 to 8
Cybersecurity with IBM
Cybersecurity Projects
U2U Research
CyberARK Study & References
IBM Content
U2UAcademy
1 Sections
Landing Your First Job in Cybersecurity
1 Sections
What is the Dark Web? A Guide to the Dark Side of the Internet
1 Sections
What is Cyber Resilience?
1 Sections
Cybersecurity Architecture: Endpoints Are the IT Front Door - Guard Them
1 Sections
Cybersecurity Architecture: Networks
1 Sections
Building a Cybersecurity Framework
1 Sections
Cybersecurity Architecture: Data Security
1 Sections
Cybersecurity Architecture: Detection
1 Sections
Cybersecurity Threat Hunting Explained
1 Sections
Security Operations Center (SOC) Explained
1 Sections
What Is SIEM?
1 Sections
Understanding Hackers
1 Sections
Industry ++ Connect Project 1 -Text Encryption Using Various Algorithms
1 Sections
Industry ++ Connect Project 2 -Keylogger Software
1 Sections
Industry ++ Connect Project 3 -Image Encryption
1 Sections
Industry ++ Connect Project 4 -Network Traffic Analyzer
1 Sections
Industry ++ Connect Project 5 -Password Analyzer
1 Sections
Industry ++ Connect Project 6Graphical Password Authentication
1 Sections
Industry ++ Connect Project 7 Accelerating criminal investigations with Elastic Search
1 Sections
What is CyberSecurity
1 Sections
Cybersecurity for Beginners: Basic Skills
1 Sections
Cybersecurity for Beginners: How to use Wireshark
1 Sections
Cybersecurity in Protecting Our Digital Frontier
1 Sections
Cybersecurity Incident Response Realtime
1 Sections
Bash in 100 Seconds
1 Sections
Shell Scripting for Cybersecurity: Automate Hacking & Defense Tasks!
1 Sections
MITRE ATT&CK Collection Techniques Demonstrated on Cyberbit Range
1 Sections
Dynamic Privileged Access (DPA) Service Overview
1 Sections
Identity Lifecycle Management
1 Sections
Role Based Access
1 Sections
Intro to EPM Policies
1 Sections
How Hackers Steal Passwords: 5 Attack Methods Explained
1 Sections
What is the Dark Web? A Guide to the Dark Side of the Internet
1 Sections
Cybersecurity Explained in 3 Acronyms: CIA, PDR, & PPT
1 Sections
Cybersecurity Architecture: Endpoints Are the IT Front Door - Guard Them
1 Sections
Security Role Management Best Practices
10 Sections
Cybersecurity Essentials
+91-9632660924
contactus@swashamtaa.org
Bengaluru, Karnataka, India