Encompasses a broad range of topics covering many aspects of data workflow security concepts and practices vital to protecting critical networks. This four-course series focuses on the risks and mitigations associated with processing and moving files within critical systems. The topics covered are: Network Segmentation Information and Operation TCA and RM The Air Gap
The three interwoven elements of critical infrastructure (physical, cyber and human) are explicitly identified and should be integrated throughout the steps of the framework, as appropriate.
Various methods and platforms to advertise the business content. SEO marketing.
International Girls in ICT Day is a global movement aimed to motivate girls and women to consider science, technology, engineering, and math (STEM) subjects
Understanding and implying cisco security framwork
Understanding techniques and tools for digital forensics
Understanding the aspects of mobile devices and applications.
Training program for financial literacy in Pakistan
Applying Law to Emerging Cyber Dangers
Developing Ethical Hacking Tools with Python
EH with hardware gadgets techniques and methods.
Global implications of cyber threats, detection and preventive measures.
Technical aspects of wireless technology and standards.
Wireless threats, protocols, and vulnerabilities.
Identify entrepreneurial, transferable skills in market place and businesses.
Processes and elements of becoming technopreneur
oT aspects, impacts, importance and security
Develops, plans, and implements curriculum, lesson plans, and educational programs for student audiences within areas of expertise. Advises, tests, and teaches students audiences in a variety of academic subjects. Presents and reinforces learning concepts within a specified subject or subject area. Taught Mobile Application and Development & Computer Organization and Assembly Langauge
This role analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation. Personnel performing this role may unofficially or alternatively be called: Computer Forensic Analyst. Investigates a number of social media crimes, ranging from recovering file systems on computers that have been hacked or damaged to investigating crimes against children.
2022 | |
1 | Kainat Rizwan; Sehar Babar; Sania Nayab; Muhammad Kashif Hanif, "HarX: Real-time harassment detection tool using machine learning", 2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI), Venue: Sana'a, Yemen, (2022) |
2 | Kainat Rizwan, Dr. Mudassar Ahmad, Dr. Muhammad Asif Habib, "Cyber Automated Network Resilience Defensive Approach against Malware Images", 19th International Conference on Frontiers of Information Technology (FIT'22), Venue: COMSTECH, Islamabad, (2022) |
3 | Aroosa Manzoor, Mudassar Ahmad, Hamid Ali, Muhammad Asif Habib, Kainat Rizwan, "Prevention and Safety Strategies for Road Accidents by using Evolutionary Algorithms", 19th International Conference on Frontiers of Information Technology (FIT'22, Venue: COMSTECH, Islamabad, (2022) |
4 | Sidrah Kashif, Mudassar Ahmad, Muhammad Shahid, Muhammad Asif Habib, Kainat Rizwan, "Development of An Automated Accessibility Evaluation Plugin Tool for Mobile Applications", 19th International Conference on Frontiers of Information Technology (FIT'22), Venue: COMSTECH, Islamabad, (2022) |
1 | SEMINAR SPEAKER (Shield)Aspire Group of Colleges, Faisalabad (2022) |
2 | MEDALThe University of Faisalabad , Faisalabad (2020) |
3 | FAISALABAD STARTUP SUMMIT 2019 certificateThe University of Faisalabad , Faisalabad (2023) |
4 | 3RD ICECE ENERGY CONSERVATION 2019 certificateUET, Lahore (2019) |
5 | COMPUTRONIC WORLD IT certificateThe University of Faisalabad , Faisalabad (2018) |
6 | STUDENTS'S FESTIVAL 2018 certificateThe University of Faisalabad , Faisalabad (2018) |
7 | DISTINCTION CERTIFICATEGovt.Girls Degree College (2023) |