Télécommunications

History of Cyber Security | #shorts #viral

History of Cyber Security | #shorts #viral

This video belongs to History of Cyber Security.
Information Security In this type of cyber security, the main objective is to protect the data and protect it from digital attacks, whether it is stored data or flow, both are kept secure. August Kirchhoff is the father of computer security.

history of cyber security,
Who founded cyber security,
the history of cyber security 1969,
the 5 types of cyber security,
History of cyber security in India,
history of cyber security essay,
when was cyber security created,
the father of cyber security,

#inventiontalks #cybersecurity #informationsecurity #technology #wifi #cybercrime #internet #network #security #viral #invention #shortsfeed #trending #dailyupdates #youtubeindia #gkindian #history #youtubeshorts

This Video is Only For Education Purpose. No one was harmed in this video.
————————————————————————
We do NOT own the video materials; all credits belong to the respectful owner. In case of copyright issues, please get in touch with us immediately for further credit or clip deletion.

Disclaimer:-
Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for « fair use » for purposes such as criticism, comment, news, reporting, teaching, scholarship, and research.
Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational, or personal use tips the balance in favor of fairness.

Views : 82
cyber security

Source by InventionTalks

Mourad ELGORMA

Fondateur de summarynetworks, passionné des nouvelles technologies et des métiers de Réseautique , Master en réseaux et système de télécommunications. ,j’ai affaire à Pascal, Delphi, Java, MATLAB, php …Connaissance du protocole TCP / IP, des applications Ethernet, des WLAN …Planification, installation et dépannage de problèmes de réseau informatique……Installez, configurez et dépannez les périphériques Cisco IOS. Surveillez les performances du réseau et isolez les défaillances du réseau. VLANs, protocoles de routage (RIPv2, EIGRP, OSPF.)…..Manipuler des systèmes embarqués (matériel et logiciel ex: Beaglebone Black)…Linux (Ubuntu, kali, serveur Mandriva Fedora, …). Microsoft (Windows, Windows Server 2003). ……Paquet tracer, GNS3, VMware Workstation, Virtual Box, Filezilla (client / serveur), EasyPhp, serveur Wamp,Le système de gestion WORDPRESS………Installation des caméras de surveillance ( technologie hikvision DVR………..). ,

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *