[go: up one dir, main page]

0% found this document useful (0 votes)
33 views1 page

Cyber Security

The document discusses an introductory cyber security course covering topics like canary tokens, target audiences, and prerequisites. It provides a link to learn about canary tokens and how they can be used to detect unauthorized access to files or emails.

Uploaded by

muhammad saad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views1 page

Cyber Security

The document discusses an introductory cyber security course covering topics like canary tokens, target audiences, and prerequisites. It provides a link to learn about canary tokens and how they can be used to detect unauthorized access to files or emails.

Uploaded by

muhammad saad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Cyber Security

SECTION-1:

Lec-1: Welcome

Lec-2: Introduction to instructor, instructor’s website link.

Lec-3: Canary Tokens

https://www.stationx.net/canarytokens/

 You can create a word file / pdf file check, that if someone opens it, you get an email alert.
 You can send an email to somebody with a juicy heading to entice any possible hacker. If that link is
opened, then you get an email alert. You may also attach an image that does the same.

Lec-4: Target Audience

PRE-REQUISITES:

Basic OS understanding, networks, be able to download and install software, technically minded.

Lec-5: Study Recommendations

You might also like