14.7 C
Seattle
Sunday, July 3, 2022

Masters of Computer Science

Technoblade – Popular YouTuber dies of Cancer at the age of 23

One of the most popular video creators; YouTube Star Technoblade die on the 31st of June, 2022. His age was just 23. The reason behind his death is cancer....

Registration of Industry can be done online now in Nepal

Registration of new industries, renewal, and approval of domestic and foreign investment can be...

SMS Delivery Rate in Nepal. Smart Telecom’s service is the worst.

SMS Delivery Success Rate of Smart Telecom is found very low. Smart Telecom has...

Chiranjibi Adhikari announced his candidacy for President of CAN Federation

Chiranjibi Adhikari has announced his candidacy for the post of president of the CAN...

IT Olympiad Nepal – Nationwide Quiz Contest 2022 to be organized

IT Olympiad Nepal is organizing the Nationwide Quiz Contest 2022. The quiz contest will represent...

Multi-stakeholder Discussion on Cyber ​​Security Policy and Process is going to happen in Nepal

According to the press release released by Center for Cyber Security Research and Innovation, an event related to Cyber Security is going to be...

Digital Forensics Syllabus | MCS | Lincoln University College

Forensic Science:  Basic concepts on computer forensics, objectives and benefits Key concepts of enterprise theory of investigation (ETI) Fuse computer network attack analysis with...

Technoprenuership Syllabus | MCS | Lincoln University College

Understanding Technopreneurship: Concept of technopreneurship Technopreneur Vs Entrepreneur Traits and characteristics of technopreneur Importance of technopreneurship Successful global and local technopreneurs Challenges in technopreneurship Idea, Innovation...

Social Engineering Explained in Simple Way

Social engineering is the art of convincing people to reveal confidential informationCommon targets of social engineering include help desk personnel, technical support executives, system...

What is Sniffing?

Network Sniffing Sniffing is a process of monitoring and capturing all data packets passing through a given network using sniffing tools.It is a form of...

Malware Threats in Cyber Security. What actually it is?

Malware Overview Malware is a malicious software that damages or disables computer systems and gives limited or full control of the systems to the malware...

System Hacking. Here is how your system can be hacked

What is system hacking? System hacking is defined as the compromise of computer systems and software to access the target computer and steal or misuse...

Cyber Security Vulnerability Assessment

Vulnerability analysis is the next phase of Ethical hacking to identify the security holes or vulnerabilities in your system or network.A vulnerability assessment is...

Enumeration in Cyber Security! Everything that you need to understand.

What is Enumeration? In the enumeration phase, attacker creates active connections to system and performs directed queries to gain more information about the target.Attackers use...

Scanning Networks in Cyber Security

Network Scanning Concepts Network scanning refers to a set of procedures for identifying hosts, ports, and services in a network.Network scanning is one of the...

8 Types of Keyword to Optimize the Content

The first step to a good SEO campaign is to identify keywords. If there are no relevant keywords in the content, Google may not...

What is Data Visualization, what are its impacts and what is the need for it?

What is data visualization? Data visualization is the presentation of data and information in graphical format.Elements like maps, charts, graphs are used extensively for data...

Cyber Security Syllabus | MCS | Lincoln University College

Introduction to Ethical Hacking Overview of Current Security TrendsElements of Information SecurityInformation Security Threats and Attack VectorsHacking Concepts, Types and PhasesEthical Hacking Concepts and ScopeInformation...

Digital Marketing Syllabus | MCS | Lincoln University College

Introduction to Digital Marketing: Importance of digital marketingHow can digital marketing be the ultimate tool for success for businesses?How to conduct a competitive analysisCase studies...

- A word from our sponsors -

Follow us

HomeMasters of Computer Science
Facebook Comments