Tools and Methods Used in Cybercrime Part 1 | Dr. Reshma Kadam

This video covers an introduction to cybercrime tools and methods, including reconnaissance, scanning, gaining access, and maintaining access.

Tools and Methods Used in Cybercrime Part 1 | Dr. Reshma Kadam
Reshma Patil
1.6K views โ€ข Jan 22, 2022
Tools and Methods Used in Cybercrime Part 1 | Dr. Reshma Kadam

About this video

This video contains information about:
Tools and Methods Used in Cybercrime,
- Introduction
- Reconnaissance
- Scanning
- Gaining Access
- Maintaining Access
- Covering Tracks
- Proxy Servers
- Purpose of Proxy Server
- Anonymizers
- Purpose of Anonymizers
- Example of Anonymizer
- Phishing
- How does Phishing Works?
- Example of Phishing

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

1.6K

Likes

28

Duration

42:36

Published

Jan 22, 2022

User Reviews

4.5
(1)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.