podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
Harshita Jadhav
Shows
Be A Man, Yaar! with Nikhil Taneja
Zakir Khan - The Most Loved Launda
On this episode of Be A Man, Yaar! India’s Most-Loved Launda - Zakir Khan - reflects on his childhood, relationships, his views on the world and of-course, on comedy. FEATURING: Zakir Khan CREATED & HOSTED BY: Nikhil Taneja DIRECTED BY: Gabriel Ghoderao PRODUCED BY: Yuvaa Originals (Nikhil Taneja, Amritpal Bindra, Anand Tiwari) DIRECTOR OF PHOTOGRAPHY: Ihjaz Aziz EDITOR: Hemant Jena EXECUTIVE PRODUCER: Nirbhay Kumar CREATIVE PRODUCER: Richa Rungta & Suyash Agarwal ASSOCIATE PRODUCER: Sa...
2023-09-20
55 min
Be A Man, Yaar! with Nikhil Taneja
Vicky Kaushal -The Beeba Munda
On this episode of #BeAManYaar, India’s favourite Beeba Munda - Vicky Kaushal - talks about Katrina Kaif, life after marriage, growing up with insecurities and ‘inferiority complexes’ mental health, and the spectrum of modern day masculinity. This heartfelt conversation is available on Spotify. FEATURING: Vicky Kaushal CREATED & HOSTED BY: Nikhil Taneja SERIES DIRECTED BY: Gabriel Ghoderao EPISODE DIRECTED BY: Sakshi Gurnani PRODUCED BY: Yuvaa Originals (Nikhil Taneja, Amritpal Bindra, Anand Tiwari) DIRECTOR OF PHOTOGRAPHY: Rahul Joyanamm EDITOR...
2023-09-11
47 min
Harshita's DForen6 Show
TOP 5 COMPUTER FORENSICS CERTIFICATIONS ARE IN DEMAND
What Jobs Can You Get With a Computer Forensics Certifications? Computer Forensics Investigator. Computer Forensics Technician. Information Security Analyst. Information Systems Security Analyst. Forensic Computer Analyst. Security Consultant.
2022-01-03
14 min
Harshita's DForen6 Show
COMPUTER FORENSICS CAREER GUIDE : BRIDGING CRIMINAL JUSTICE & CIS
Computer forensics, also known as cyber forensics or digital forensics, is the investigation of digital data gathered as evidence in criminal cases. Law enforcement agencies and private firms fight cybercrime using computer forensics to track, locate and extract digital information needed for criminal investigations.
2021-08-19
16 min
Harshita's DForen6 Show
WHAT IS DIGITAL FORENSICS & WHY IS IT IMPORTANT?
Digital forensics has found valuable information that allows cyber security companies to develop technology that prevents hackers from accessing a network, website, or device. Hackers and hijackers are skilled at making their way into a person or business's device or network, but digital forensics have collected data
2021-05-26
17 min
Harshita's DForen6 Show
MALWARE ANALYST INTERVIEW QUESTIONS & ANSWERS FOR 2021
It is process of executing malware and analyzing its functionality and behavior. This analysis helps to know what malware does during its execution using debugger. It is a process of analyzing/reverse engineering assembly code.
2021-05-24
24 min
Harshita's DForen6 Show
DIGITAL FORENSICS PROCESS - ANALYSIS
The digital forensic process has the following five basic stages: Identification – the first stage identifies potential sources of relevant evidence/information (devices) as well as key custodians and location of data. ... Analysis – an in-depth systematic search of evidence relating to the incident being investigated.
2021-04-23
13 min
Harshita's DForen6 Show
APPLICATION OF SOCIAL MEDIA FORENSICS TO INVESTIGATE SOCIAL MEDIA CRIME
Social media forensics involves the application of cyber investigation and digital analysis techniques for: Collecting information from social networking platforms such as Facebook, Twitter, LinkedIn etc. Storing, ... Preserving the information for fighting a case in the court of law.
2021-04-23
22 min
Harshita's DForen6 Show
DATA BREACH INCEDANCE RESPONSE PLAN
All enterprises should have a data breach incident response plan in place to help minimize the damage caused by a cyber-attack. ... The plan should include a list of processes that should be executed in the event of a breach and should also provide a clear guideline as to what actually constitutes a security incident.
2021-04-23
11 min
Harshita's DForen6 Show
INVESTIGATION OF FINANCIAL FRAUDS & CYBER CRIME
A primary effect of cybercrime is financial; cybercrime can include many different types of profit-driven criminal activity, including ransomware attacks, email and internet fraud, and identity fraud, as well as attempts to steal financial account, credit card or other payment card information.
2021-04-23
14 min
Harshita's DForen6 Show
MULTIMEDIA FORENSICS
Multimedia Forensics includes a set of scientific techniques recently proposed for the analysis of multimedia signals (audio, videos, images) in order to recover probative evidences from them; in particular, such technologies aim to reveal the history of digital contents: ... retrieving information from multimedia signals.
2021-04-17
11 min
Harshita's DForen6 Show
DATA BREACH
A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment. Other terms for this phenomenon include unintentional information disclosure, data leak, information leakage and also data spill.
2021-04-12
12 min
Harshita's DForen6 Show
CYBER SECURITY INTERVIEW QUESTIONS
The digital world is surrounded by cyber-attacks, this requires a well-trained army of cyber warriors who can foresee, detect and restrict the threats. The demand for Cyber Security Professionals far exceeds the supply - creating exciting opportunities for individuals who are willing to re-skill themselves for a career in cybersecurity. It’s also expected that the Cybersecurity labour crunch is expected to hit 3.5 million unfilled jobs by the end of 2021, and also the number of open positions will triple over the next five years. This means the career opportunities for cybersecurity professionals are very promising right now. Having said that, clear...
2020-10-15
33 min
Harshita's DForen6 Show
FORENSICS OF CLOUD MACHINE LEARNING PLATFORM - BASICS
Cloud computing changes the traditional characteristics of how data – and potential evidence – are stored and retrieved. In the cloud, evidence can reside in different geo- graphical locations on servers that are shared by multiple customers and that are under the control of different cloud service providers.
2020-09-15
10 min
Harshita's DForen6 Show
JTAG CHIP-OFF ISP FORENSICS - TOOLS & CHALLENGES
In the field of mobile-device forensics, the practices of “chip-off” and “JTAG” ... challenge examiners, creating the requirement for alternative means of data recovery. ... Further, considering that commercial tools most often connect to the device. ISP benefits the examiner who faces the challenges of tightening budgets, yet ... And just like with JTAG and Chip-Off, your agency can still use its current line-up of forensic analysis software to recover that 'smoking gun' piece of evidence.
2020-09-15
14 min
Harshita's DForen6 Show
MAPPING DIGITAL CRIME WITH CYBER ACTS
Cyber crime, or computer-oriented crime, is a crime that involves a computer and a network. ... such intrusions are part of an organized effort by cyber terrorist foreign intelligence services, or other groups to map ... In developing countries, such as the Philippines, laws against cyber crime are weak or sometimes nonexistent.
2020-09-15
21 min
Harshita's DForen6 Show
ROBOTS SECURITY & BLOCKCHAIN SWARM
Swarm robotics is seen as an area where the combination of block chain and AI can benefit the technology. The field consists of several physical robots working together in a “swarm” to perform tasks or operations.
2020-09-15
06 min
Harshita's DForen6 Show
ARVR & DIGITAL EVIDENCES
Permission to make digital or hard copies of all or part of this work for visualization of information in the context of the physical environment. The localized AR annotation and visualization capability. An ... In the current literature, there is variety of virtual reality applications proposed for various forensic science problems.
2020-09-15
09 min
Harshita's DForen6 Show
MALWARE ANALYSIS USING DEEP EXPLOIT, REMNUX & CUCKOOBOX
Malware analysis helps responders understand the extent of a malware-based incident and rapidly identify additional hosts or systems that could be affected. Actionable information from malware analysis can help an organization more effectively mitigate vulnerabilities exploited by malware and help prevent additional compromise.
2020-09-02
05 min
Harshita's DForen6 Show
ESTABLISHING DIGITAL FORENSICS LABS - INDIA & USA (STANDARDS)
Digital forensics investigations have a variety of applications. The most common is to support or refute a hypothesis before criminal or civil courts. Criminal cases involve the alleged breaking of laws that are defined by legislation and that are enforced by the police and prosecuted by the state, such as murder, theft and assault against the person. Civil cases on the other hand deal with protecting the rights and property of individuals (often associated with family disputes) but may also be concerned with contractual disputes between commercial entities where a form of digital forensics referred to as ediscovery may be invo...
2020-09-02
11 min
Harshita's DForen6 Show
FORENSICS PSYCHOLOGY OF AUTONOMOUS SYSTEMS
Forensic psychology is the branch of psychology concerned with the production and application of psychological knowledge and principles within the legal process.
2020-09-02
06 min
Harshita's DForen6 Show
COMPUTER FORENSICS INTERVIEW QUESTIONS
Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. ... Evidence from computer forensics investigations is usually subjected to the same guidelines and practices of other digital evidence.
2020-09-02
12 min
Harshita's DForen6 Show
AUTOMATION OF MALWARE FORENSIC TRIAGE IN SOC
Triage is the assessment of a security event to determine if there is a security incident, its priority, and the need for escalation. As it relates to potential malware incidents the purpose of triaging may vary.
2020-09-02
06 min
Harshita's DForen6 Show
COMPUTER FORENSICS CERTIFICATIONS
Cyber security is fast becoming a necessary component to all businesses and agencies. The demand for tech gurus who can solve crimes is growing all the time as hackers from home and abroad seek to crack servers and networks in the United States. Why not work to thwart them with a computer forensics certification? Though this is not an easy credential to add to your resume, it will be worth the hard work and effort when you have the gratification of busting cyber bad guys. You will also qualify for a broad range of jobs and your salary will likely...
2020-07-30
14 min
Harshita's DForen6 Show
COMPUTER FORENSICS : MULTIMEDIA & CONTENT FORENSICS
Multimedia Forensics includes a set of scientific techniques recently proposed for the analysis of multimedia signals (audio, videos, images) in order to recover probative evidences from them; in particular, such technologies aim to reveal the history of digital contents: ... retrieving information from multimedia signals.
2020-07-30
12 min
Harshita's DForen6 Show
DATA RECOVERY TOOLS
In computing, data recovery is a process of salvaging (retrieving) inaccessible, lost, ... Replacement boards often need this information to effectively recover all of the data.
2020-07-30
20 min
Harshita's DForen6 Show
EVIDENCE COLLECTION & DATA SEIZURE
Collection, preservation, and securing evidence is critical from the time it is collected. Completion of chain of custody documentation is also critical. The chain of custody form must contain information about the evidence collected and must remain with the evidence until it is released to law enforcement.
2020-07-27
19 min
Harshita's DForen6 Show
INTRODUCTION TO MOBILE FORENSICS
The mobile forensics process aims to recover digital evidence or relevant data from a mobile device in a way that will preserve the evidence in a forensically sound condition. ... Following correct methodology and guidelines is a vital precondition for the examination of mobile devices to yield good results
2020-07-16
29 min
Harshita's DForen6 Show
DIGITAL FORENSICS- HISTORY, PROCESS, TYPES, CHALLENGES
Digital Forensics is the preservation, identification, extraction, and documentation of computer evidence which can be used in the court of law Process of Digital forensics includes 1) Identification, 2) Preservation, 3) Analysis, 4) Documentation and, 5) Presentation Different types of Digital Forensics are Disk Forensics, Network Forensics, Wireless Forensics, Database Forensics, Malware Forensics, Email Forensics, Memory Forensics, etc. Digital forensic Science can be used for cases like 1) Intellectual Property theft, 2) Industrial espionage 3) Employment disputes, 4) Fraud investigations.
2020-07-15
13 min
Harshita's DForen6 Show
Harshita's DForen6 Show (Trailer)
2020-07-14
00 min
Harshita's DForen6 Show
AN INTRODUCTION TO COMPUTER FORENSICS
Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
2020-07-14
16 min