1. Windows
  2. Wi-Fi(wireless fidelity)
  3. Wide Area Network (WAN)
  4. What things to do when bored on the Internet
  5. What is VPN?
  6. What is Virus?
  7. What Is Telnet?
  8. What is Ransomware?
  9. What is operating system?
  10. What is Network explain in detail
  11. What is Network sniffing?
  12. What is Network Enumeration?
  13. What is MAC Flooding?
  14. What is ip address
  15. Define FDD(floppy disk drive)
  16. What is E-commerce?
  17. What is DHCP ?
  18. what is cyber security
  19. What is Cowpatty?
  20. What is a Digital Wallet?
  21. What is a solid state drive (SSD)?
  22. What is a Browser?
  23. What is 4G?
  24. What are the advantage of INTERNET
  25. URL
  26. Types of router
  27. The OSI MODEL
  28. SOCIAL MEDIA
  29. Simple Mail Transfer Protocol (SMTP)
  30. Server
  31. Search engine
  32. Safeguarding Your Digital Wallet
  33. Risks Associated with Digital Wallets
  34. Protocol
  35. Popular Digital Wallets
  36. OPTICAL DISKS
  37. Online game
  38. Monitor
  39. JOYSTICK
  40. Definition – Internet Service Provider (ISP)
  41. CONTENTS (CCC)
  42. Introduction to Cyber Secure User
  43. HTTP
  44. How to Installation Windows for PC
  45. How can you avoid ARP poisoning?
  46. Host
  47. History of RAID
  48. History of GPS
  49. Contents
  50. Graphical User Interface (GUI)
  51. FTP
  52. Explain Whois
  53. Explain Sensitive Data?
  54. Explain in CUI and GUI
  55. DNS Types: 3 DNS Query Types
  56. Define Web page
  57. Define (World Wide Web) www
  58. DEFINE WEB DESIGN & WEB DEVELOPMENT
  59. DEFINE SMS
  60. Top 5 Rechest People
  61. Define Scanning.
  62. ARPANET
  63. What is Bit
  64. what is byte
  65. C Language
  66. Cloud storage
  67. Context Diagram
  68. Cyber Law
  69. Data modeling
  70. Database
  71. Database Administrator
  72. DBMS(Data Base Management System)
  73. Decryption
  74. Domain
  75. Explain programming language.
  76. Gateway
  77. Hotspot (WIFI)
  78. HTML
  79. INTRANET
  80. Meaning of AI
  81. Meaning of Program Algorithm
  82. Website Explain in detail.
  83. Microsoft Office
  84. Microwave transmission
  85. Network architecture
  86. Network Time Protocol (NTP)
  87. NFC (Near field communication)
  88. Normalization
  89. Number System
  90. Ping
  91. Plug-in
  92. Program Logic
  93. RDBMS
  94. Remote Desktop Protocol (RDP)
  95. Explain about ROBOT
  96. Satellite
  97. Search engines
  98. Secure Shell (SSH)
  99. Secure socket layer (SSL)
  100. SDLC (System Development Life Cycle)
  101. Transmission media
  102. System Analysis
  103. System
  104. Transmission Control Protocol/Internet Protocol(TCP/IP)
  105. Transmission Modes in Computer Networks
  106. TYPE “C”
  107. USB On-The-Go (OTG)
  108. What is an ATM?
  109. What is Antenna?
  110. What is encryption?
  111. What is frequency?
  112. What is multimedia
  113. What is Web Hosting?
  114. Contents scsu
  115. How to hack the Android Phone
  116. How to control someone else’s phone from your phone
  117. VGA(Video Graphics Array)
  118. HDMI (High-Definition Multimedia Interface)
  119. Father of computer
  120. Chipset
  121. Partition
  122. What is bus?
  123. Interface of hard disk
  124. PID ( product Identification number)
  125. Introduction of cyber security
  126. Understanding Data Security
  127. Operating system security
  128. Web Browser Concepts
  129. Electronic Mail
  130. Social Networking Services
  131. Mobile Device Security
  132. Cloud Computing And Associated Threats
  133. Communicating Securely Over Network Concepts
  134. Network Security Threats And Solutions
  135. Preparing For Unforeseen Threats
  136. Nepali video
  137. Hacker History
  138. CEH Interview Question
  139. Hindi video
  140. What are the different types of website?
  141. What is the importance of website?
  142. Viewing all TCP/UDP Connection and Listening Port
  143. Define 32 bit and 64 bit.
  144. Driver Pack Solution (DRP)
  145. COMPUTRES GAME
  146. Shortcut keyboard keys
  147. MAC Address(Media Access Control)
  148. What is looping?type of loop.
  149. What is an Array?importance of Array
  150. What is looping?
  151. What is Array?Different between Array and Array list.
  152. What is an operator?
  153. What is control statement?
  154. What is function? Advantage of function.
  155. What is memory?
  156. What is nested loop?
  157. What is pointer? Explain the meaning of each of the following declaration.
  158. What is string?
  159. What is structure in C++ programming
  160. Write a program to display the following: 1 12 123 1234 12345
  161. What is Technology?
  162. What are the different types of technology?
  163. What are the features of technology?
  164. What are the objectives of technology?
  165. What are the advantage & disadvantage of technology?
  166. Who is the father of technology?
  167. Who invented the first technology?
  168. When was the first technology invented?
  169. How long has technology been around?
  170. Why was technology created?
  171. Who started technology?
  172. Who made the first computer?
  173. Who invented technology?
  174. What are the 4 ages of information technology?
  175. What are the ages of technology?
  176. How technology changed our lives?
  177. How did technology shape human history?
  178. What is the oldest technology?
  179. Who invented time?
  180. Which country invented the most?
  181. Who is the most famous inventor?
  182. What are the 5 greatest inventions of all time?
  183. What was the first digital technology?
  184. Is technology making our lives easier?
  185. What technology has changed the world the most?
  186. The Top 10 Technology Companies
  187. Animation
  188. Biometrics
  189. Bridges
  190. Crimper
  191. Top 10 Companies Owned by Samsung
  192. Face recognition
  193. Fingerprint recognition
  194. The World’s Top 10 Hardware Companies
  195. Google (Global Organization of Oriented Group Language of Earth)
  196. Computer Hardware Troubleshooting Tools
  197. Hubs
  198. IP Terminology
  199. Iris recognition
  200. LAN Cable Tester
  201. LAN Cable Types
  202. World’s Top 10 Software Companies
  203. Light Meter
  204. Loopback Adapter
  205. Multimeter
  206. Network Issues
  207. Networking Devices
  208. OTDR (Optical Time Domain Reflectometer)
  209. Punch-Down Tool
  210. Retina recognition
  211. Smart Cards
  212. Software Troubleshooting Tools
  213. Spectrum Analyser
  214. Basics subnetting
  215. Switches
  216. Telephone
  217. Tone generator
  218. Troubleshooting Fibre Cable Issues
  219. Troubleshooting IP Address Conflicts
  220. Troubleshooting of bandwidth
  221. Troubleshooting Wired Connection
  222. Troubleshooting Wireless Connectivity
  223. What is signal? Define
  224. What is website?
  225. The 8 different types of websites and how to design them
  226. 12 Popular Types of Websites You Can Create
  227. What is the use of website in our daily life?
  228. What is the difference between webpage, website, web server, and search engine?
  229. Why having a website is important?
  230. Which is most visited website in world?
  231. Top 20 websites of  2020
  232. Internet Protocol (IP)Security
  233. Mobile Virus
  234. Protect your Android phone from a virus
  235. UPS (Uninterruptible power supply)
  236. Is technology taking over our lives?
  237. How did science and technology shape the world?
  238. What is the relationship between history and technology?
  239. Why is technology important in civilization?
  240. Which country invented technology?
  241. Where did digital technology come from?
  242. Has technology made the world a better place to live?
  243. Has technology made our life better or worse?
  244. Which country has the most advanced technology in the world?
  245. How does technology help the world?
  246. How technology has changed our lives in a bad way?
  247. How is science related to technology?
  248. What is a fact about technology?
  249. Network Troubleshooting Methodology
  250. What is future technology?
  251. How does technology affect us?
  252. Is technology good for kids?
  253. Is technology good for society?
  254. Network Troubleshooting Tips
  255. Who has the best & most advanced military technology in the world?
  256. How has technology helped the military?
  257. How fast is technology advancing statistics?
  258. Can we live without technology?
  259. What will happen without technology?
  260. Address Resolution Protocol (ARP) Poisoning 
  261. Brute Force
  262. Configuration Vulnerabilities/Weakness
  263. Deauthentication Attack
  264. Denial of Service (DoS) Attack
  265. Insider Threats
  266. IP Spoofing
  267. Logic Bomb
  268. Man-in-the-middle Attack
  269. Network Threats/Attacks
  270. Network Vulnerabilities
  271. Ransomware
  272. Security Policy Vulnerabilities/Weakness
  273. Session Hijacking
  274. Sniffing
  275. Social Engineering
  276. Understanding Network Security
  277. Viruses, Worms and Trojan Horses
  278. VLAN Hopping
  279. Wireless Threats
  280. What is hyperlink?
  281. Adapter Card
  282. All-in-One PC
  283. CMOS
  284. Benefits of a Computer Network
  285. Cooling System and Fan
  286. Define Scanning
  287. Firmware and Chipset
  288. Motherboard
  289. Mouse
  290. Printer 
  291. STORAGE DEVICE
  292. Tablet
  293. 1.     What is Megapixel/MP
  294. What is screen resolution?
  295. very small computer
  296. What is BGP?
  297. What is CCTV CAMERA?
  298. Internet Control protocol (ICMP)
  299. File Transfer protocol (FTP)
  300. Simple Mail Transfer protocol (SMTP)
  301. Latest 2020 folding mobile
  302. Drone camera
  303. What do you mean by Ethical Hacking?
  304. What is DDoS Attack?
  305. What are the types of DDoS attacks?
  306. What is SQL injection?
  307. What is Footprinting?
  308. Contents CEH (CERTIFIED ETHICAL HACKER)
  309. Types of Hacker
  310. Phase of Hacking
  311. Hacking
  312. What is Enumeration
  313. Social Engineering
  314. Process of Social Engineering
  315. General/Basic Computer or PC shortcut key
  316. The Most Useful Mac Keyboard Shortcuts to Know
  317. Windows Shortcut Keys
  318. Keyboard Shortcuts and System Commands for File Explorer
  319. Keyboard Shortcuts for Finder
  320. How to Create a Windows Shortcut Key
  321. MS Excel shortcut keys
  322. Why is Data Protection So Important?
  323. DEFINITION OF CYBER SECURITY
  324. Notepad shortcut keys
  325. COMMON CYBER SECUTITY THREATS
  326. Ms Word shortcut keys
  327. MS Paint shortcut keys
  328. MS Access shortcut keys
  329. MS PowerPoint shortcut keys
  330. Digital Wallet – Future of Payment
  331. MS Outlook shortcut keys
  332. What is Data
  333. Mozilla Firefox shortcut keys
  334. DIFFERENT BETWEEN DATA & INFORMATION
  335. What is Data Security?
  336. Data Security Threats
  337. What are the Importance of Data Security
  338. What are the Main Elements of Data Security?
  339. Securing Windows 10
  340. Security of Mac OS X
  341. Securing of Linux (Ubuntu)
  342. Instant Messaging
  343. Child Online Safety
  344. Electronic Mail (Email)
  345. Email Security:
  346. E-mail Security Measures
  347. Encryption
  348. Social Networking Services
  349. Social Networking Security Threats
  350. Facebook Security
  351. Twitter Security
  352. Instagram Security
  353. Mobile Device Security
  354. Securing iPhone and iPad Devices
  355. Mobile Antivirus
  356. Google Chrome shortcut keys
  357. Mobile Security Tools
  358. Knowing mobile device threats
  359. Mobile Phone Antivirus
  360. Securing Android Device
  361. SECURING WINDOWS PHONE DEVICES
  362. What is Cloud Computing?
  363. Issues Related to Cloud Privacy
  364. Cloud Computing Services  
  365. Understanding Different Networking Concepts
  366. Identifying Different Types of Networks
  367. Setting up a Wireless Network
  368. Wireless Network Security Threats and Control Measures
  369. Network Security Threats
  370. Types of Network Security Threats
  371. Other Security Threats
  372. What is Backup?
  373. Cloud Backup Service Providers
  374. Backing Up and Restoring Data in Windows 10
  375. DOS Command Shell Keyboard Shortcuts
  376. What is a Digital Wallet?
  377. Popular Digital Wallets
  378. Risks Associated with Digital Wallets
  379. Internet Explorer shortcut keys
  380. Safeguarding Your Digital Wallet
  381. Tally shortcut keys
  382. Function Performed by the Operating System
  383. Identity theft
  384. Human Based Social Engineering Techniques
  385. Basic techniques of scanning.
  386. Introducing Physical Security
  387. What Is the Cloud?
  388. About Windows Enumeration
  389. Linux Basic
  390. Enumeration with SNMP
  391. System Hacking
  392. Password Cracking
  393. Default password databases
  394. Manual Password Cracking
  395. Automated Password Cracking
  396. Types of scanning
  397. Photoshop Keyboard Shortcuts for Mac and PC
  398. Illustrator MAC OS shortcut keys
  399. Adobe Dreamweaver shortcut keys
  400. Flash CS5 Shortcuts: Mac
  401. Adobe Flash shortcut keys
  402. Adobe CorelDraw shortcut keys
  403. Corel Painter (Mac) keyboard shortcuts
  404. Adobe PageMaker 7.0 shortcut keys
  405. Adobe PageMaker 6.5 shortcut keys
  406. Amazing Technology
  407. Adobe PageMaker shortcut keys
  408. HTML Color Codes
  409. Full list of ASCII characters, letters, symbols and signs with descriptions:
  410. Different types of symbol
  411. How do you use mouse keys?
  412. Which function key is for mouse?
  413. How do I turn on my mouse key without a mouse?
  414. Use Mouse Keys to move the mouse pointer
  415. Can I use my keyboard as a mouse?
  416. What is the shortcut key to open screen?
  417. How do I use my numpad as a mouse?
  418. How to unlock the cursor on a laptop?
  419. What is onscreen keyboard?
  420. What is the use of on screen keyboard?
  421. How to turn on the onscreen keyboard?
  422. What is the shortcut key for virtual keyboard?
  423. What is the shortcut for on screen keyboard?
  424. How to get the onscreen keyboard without a keyboard?
  425. Shortcut key for hiding in showing a virtual keyboard​
  426. How did you get the onscreen keyboard on your Sony Smart TV?
  427. How to take screenshots on laptops?
  428. Shortcut key to take a screenshot in Windows 10?
  429. How to use the Print Screen key?
  430. What is the shortcut to take a screenshot in Windows 7 laptop?
  431. Where is screenshot saved in laptop?
  432. How to take a screenshot on laptop without Print Screen button?
  433. How to take a screenshot on Windows computer?
  434. What is Print Screen key?
  435. Tally ERP 9 Short-cut Function keys combination
  436. What is VAT?
  437. How to Calculate VAT ?
  438. What is the formula for VAT in Excel?
  439. How to take 20% off a price?
  440. How many types of VAT are there?
  441. What percentage is VAT?
  442. What type of tax is VAT?
  443. How is VAT tax calculated?
  444. About Swastik software
  445. What is Tax?
  446. Types of Tax
  447. Why is tax so important?
  448. What is the role of tax?
  449. How to calculate tax?
  450. How to calculate tax on a total?
  451. What is window ?
  452. What is Ms-Excel ?
  453. What is Notepad ?
  454. What is MS Paint ?
  455. What is MS Access ?
  456. What is Ms PowerPoint ?
  457. mobile phone / small computer 
  458. Unix and Linux Enumeration.
  459. LDAP and Directory Services Enumeration.
  460. Enumeration Using NTP.
  461. SMTP Enumeration.
  462. Enumerating DNS using dnsenum
  463. Performing flag scan using hping3
  464. Basic techniques of scanning.
  465. Defining a Computer
  466. Desktop computers
  467. Laptop
  468. Various PC Components
  469. Motherboard
  470. CPU(central processing unit)
  471. Storage Device
  472. Power Supply
  473. Firmware and Chipset
  474. BIOS
  475. Computer Case from Factors
  476. Monitor
  477. Keyboard
  478. Printer
  479. Scanner
  480. Touchscreen
  481. Input/Output Devices
  482. Computer Motherboard Components
  483. Front Panel Connectors
  484. Jumper Pins
  485. CPU Socket
  486. Power Connectors
  487. Fan Connectors
  488. Bus Architecture
  489. Chipset
  490. RAM/Memory Slot
  491. System firmware
  492. Expansion Card Slots
  493. Delivery drone
  494. DISPLAY
  495. Audio
  496. Network
  497. PS/2
  498. Bluetooth
  499. Radio Frequency
  500. Sound Card
  501. Video Card
  502. USB Card
  503. Modem Card
  504. Storage Card
  505. Game Pad
  506. Barcode Reader
  507. Wireless / Cellular Card
  508. Exploring Output Devices
  509. Port
  510. Motion Sensor
  511. Touchpad
  512. Smart Card Reader
  513. Digital Camera
  514. Microphone
  515. Webcam
  516. Speaker
  517. Display Device
  518. Smart TV
  519. Exploring Different Expansion cards
  520. Protocol
  521. Primary Network Types.
  522. Removing Device
  523. Exploring physical connection and its characteristics
  524. Important Terms Associated with Network
  525. Exploring I/O devices
  526. Set Top Box
  527. Exploring Common Input Devices
  528. Other Important Protocols
  529. What is MS Outlook ?
  530. What is MS DOS ?
  531. What is Tally ?
  532. What is Chrome ?
  533. What is Firefox ?
  534. Comparison between Internet Explorer, Mozilla Firefox and Google Chrome Web Browsers
  535. What is Internet Explorer ?
  536. What is Adobe Photoshop ?
  537. What is Adobe Illustrator ?
  538. What is Adobe Dreamweaver ?
  539. What is Adobe Flash ?
  540. What is Adobe Corel Draw ?
  541. What is Adobe Page Maker ?
  542. What is Color code ?
  543. What is Chat Symbol ?
  544. What Ascii Code ?
  545. What is ascii code used for?
  546. What is ascii code explain with example?
  547. What is ascii value of A to Z?
  548. Is ascii 128 or 256?
  549. What are the disadvantages of Ascii?
  550. Who invented ascii?
  551. 10 Reasons to Use Color
  552. What is the use of Page Maker?
  553. What are the features of DTP?
  554. Which software is used in DTP?
  555. What is PageMaker in DTP?
  556. What DTP stands for?
  557. Which is the most popular DTP software?
  558. What is DTP ?
  559. What is the use of Corel Draw?
  560. How do I power an image in Corel Draw?
  561. What is power clip ?
  562. What is the use of PowerClip in CorelDRAW explain it?
  563. What is the use of Adobe Dreamweaver ?
  564. What is the use of Adobe Flash ?
  565. What is the use of Adobe Illustrator ?
  566. What is the use of Adobe Photoshop ?
  567. Describing Storages
  568. Primary Storage
  569. Secondary Storage
  570. Tertiary Storage
  571. Exploring RAM and its Types
  572. Dynamic RAM (DRAM)
  573. Static RAM (SRAM)
  574. SDRAM
  575. Memory Modules
  576. RAM Configurations
  577. Compatibility Issues Related to RAM
  578. Other Storage Devices
  579. Optical Drives and Media Capacity
  580. Magnetic Hard Disk Drives
  581. Solid State Drives (SSD)
  582. Flash Memory
  583. Installing and Configuring Storages
  584. Virtualization
  585. Virtualization Software
  586. Supported Platform
  587. Types of Footprinting
  588. Using Ping in windows command line
  589. What Is a Wireless Network?
  590. Mobile OS Models and Architectures
  591. Goals of Mobile Security
  592. Device Security Models
  593. Countermeasures
  594. What is the use of Internet Explorer ?
  595. What is the use of Firefox ?
  596. Top 5 reasons in using Google Chrome
  597. What is the use of Google Chrome ?
  598. Advantages and Disadvantages of Google Chrome
  599. What is the use of Tally ?
  600. What are the advantages of tally?
  601. Why is tally important?
  602. What is the use of MS DOS ?
  603. Features of MS Access
  604. What is the use of MS Outlook ?
  605. What is the use of MS PowerPoint ?
  606. What are the different uses of Microsoft PowerPoint?
  607. What is the use of MS Access ?
  608. What are the features of MS Paint?
  609. What is Microsoft Word used for?
  610. What are the core values of Microsoft?
  611. What is the mission of Microsoft?
  612. What is the use of Notepad ?
  613. What is the use of MS Excel ?
  614. Why Excel is important?
  615. What is web search engine ?
  616. What is a search engine?
  617. How search engines work ?
  618. What is a search engine algorithm?
  619. What are the most popular search engines ?
  620. Is DuckDuckGo owned by Google?
  621. Which search engine is safest?
  622. What is illegal on the internet?
  623. Can a Google search be illegal?
  624. What are the benefits of website?
  625. What is Facebook ?
  626. What is the main purpose of Facebook?
  627. What are the disadvantages of Facebook?
  628. What are the top 10 benefits of Facebook?
  629. What is difference between Facebook and Facebook Lite?
  630. What is Facebook Lite ?
  631. What is Instagram ?
  632. What is the main purpose of Instagram?
  633. What is difference between Instagram and Facebook?
  634. Why Is Instagram so popular ?
  635. Why did Mark Zuckerberg buy Instagram?
  636. Who is the CEO of Instagram?
  637. Installing a Storage Device
  638. Understanding Processors
  639. AMD Processors and Sockets
  640. Intel Processors and Sockets
  641. CPU Architecture
  642. Characteristics of CPU
  643. Cooling Systems
  644. Installing and Upgrading CPU
  645. Upgrading an Intel CPU
  646. Upgrading an AMD CPU
  647. What is a BIOS and UEFI?
  648. BIOS Component Information
  649. BIOS System Setup Utilities
  650. BIOS Built-in Diagnostics and Monitoring
  651. Monitoring
  652. Securing and Upgrading Firmware
  653. Using nslookup in windows command line
  654. Process of System hacking
  655. Using Refog keylogger
  656. Rootkits
  657. PCs Used in Businesses
  658. Standard Client 
  659. Thin Client
  660. Workstation
  661. Home Use PCs
  662. Home Server
  663. Gaming PC
  664. Importance of Power Supply
  665. Electricity Circuits
  666. Identifying Power Supply
  667. Connector Types
  668. Subjects Class 12
  669. Subject Class 11
  670. Subject Class 10
  671. CONTENTS CLASS 11
  672. Trojans
  673. Behaviour of Trojans Infected Target
  674. Types of Trojans
  675. Working of a Trojan
  676. Tools for Creating Trojans
  677. Infection Techniques
  678. Honeypot Attacks 
  679. Firewall
  680. Honeypot
  681. Cryptography
  682. Session Hijacking
  683. IP Spoofing
  684. DNS Spoofing
  685. Network Session Hijacking
  686. TCP/IP Session Hijacking
  687. UDP Session Hijacking
  688. Introducing of SQL INJECTION
  689. Botnet
  690. Steps for performing DDoS Attack
  691. Web Applications
  692. Web Server
  693. Buffer Overflow
  694. Denial-of-Service Attack
  695. Effects of the Denial of Service
  696. Web Application Testing using Tools
  697. Uses of Internet
  698. WPscan
  699. Web Application Attack Phase
  700. Web Browser
  701. URL(Uniform Resource Locator)
  702. Messenger Services
  703. What is printer?
  704. Types of Printers
  705. Digital Signature
  706. Non-Impact Printers
  707. 3D Printer
  708. Virtual Printer
  709. Printing a Test Page
  710. Hash Functions
  711. Managing the Print Spooler
  712. Concept of Protocol
  713. Inkjet Printer Problems
  714. Secure Sockets Layer (SSL)
  715. Upgrading Printers
  716. Switched Network Sniffing
  717. ARP Poisoning
  718. MAC Spoofing
  719. Impact Printers
  720. Detecting Sniffing Attacks
  721. Setting Browser Properties
  722. Inkjet Printer Problems
  723. Packet Analysis
  724. Sniffing Tools
  725. Using a Sniffer
  726. Setup Network Connection
  727. Type of sniffing
  728. IPsec
  729. Active Sniffing Techniques
  730. ARP Spoofing
  731. Steps Involved in Session Hijacking
  732. Type of Session Hijacking
  733. Email
  734. Steganography
  735. Uses of Email
  736. Steganography Process
  737. Web Based Email and POP Email
  738. Methods of Session Hijacking
  739. Terms Associated With Steganography
  740. Watermarking
  741. Steganalysis
  742. Using Quickstego
  743. Steganography using tools
  744. Steganalysis Attacks
  745. Steganography Methods
  746. Session Hijacking tools
  747. DDoS Tools
  748. What Is the Impact of Social Engineering?
  749. Types of Phishing Attacks
  750. Social Engineering Toolkit (SET)
  751. Prevention of Social Engineering
  752. Phishing Process
  753. 25-pair cable
  754. Apache Web Server
  755. 66 Block Connector
  756. Internet Information Server (IIS)
  757. 100-pair cable
  758. 110 Block Connector
  759. Demarc Extension
  760. Demarc
  761. Intermediate Distribution Frame
  762. Main Distribution Frame
  763. Vulnerabilities of Web Servers and Applications
  764. Patch Panels
  765. Searching Engine
  766. DNS(Domain Name Servers)
  767. Website
  768. Web page
  769. Internet
  770. Web Browser
  771. Smart Jack
  772. Vertical and horizontal cross connects
  773. Wiring Distribution Components
  774. Introduction of malware
  775. Categories of Malware
  776. Viruses
  777. Kinds of Viruses
  778. Worms
  779. The Functioning of Computer Worms
  780. Spyware
  781. Methods of Spyware Infection
  782. Adware
  783. Scareware
  784. Ransomware
  785. Sniffing
  786. Tools which are used for sniffing are known as sniffer
  787. computer full form
  788. History of Computers
  789. Characteristics of Computer
  790. Risks of E-Governance
  791. Benefits of E-Governance
  792. E-Governance
  793. Scope of E-Governance
  794. Concept of Data Processing
  795. Stage of Data Processing 
  796. Advantages of Networking
  797. Architectural Model
  798. Bandwidth
  799. Basic of Networking
  800. Broadband over Power Line
  801. Characteristics of a Network
  802. Coaxial Cable
  803. Common Cable Properties
  804. Complicated and Expensive Network Software
  805. Costly and Complex Wiring
  806. Crossover Cable
  807. Data Rate
  808. Disadvantages of Networking
  809. Distance
  810. Duplex
  811. Enhancing Communication
  812. Ethernet
  813. Exploring CSMA/CD
  814. Fast Ethernet
  815. Fiber Distributed Data Interface (FDDI)
  816. Fiber Optic Cable
  817. Frequency 
  818. Gigabit Ethernet
  819. Improving Person-to-Person Communication
  820. Introduction network cabling
  821. Introduction to networking
  822. Introduction type of networking
  823. Lack of Data Security and Privacy
  824. Local Area Network (LAN)
  825. Media Converters
  826.  Metropolitan Area Network (MAN)
  827. Multi-Mode Fiber
  828. Need for Networking
  829. Network Cable Types
  830. Network Topology
  831. Networking cables
  832. NIC (Network interface card)
  833. Noise Immunity
  834. NOS (Network Operating System)
  835. Protocol
  836. Repeaters
  837. Screened Twisted-Pair Cable
  838. Serial Cables
  839. Server Crashing
  840. Sharing Files
  841. Sharing Resources
  842. Shielded Twisted-Pair Cable
  843. Single-Mode Fiber
  844. Standard Ethernet
  845. Straight-Through Cable
  846. Thicknet
  847. Thinnet
  848. Token Bus
  849. Token Ring
  850. Twisted-Pair Cable
  851. Unshielded Twisted-Pair Cable
  852. Wide Area Network (WAN)
  853. Wiring Standards
  854. 568A
  855. 568B
  856. The Physical layer
  857. The Data Link layer
  858. The Network layer
  859. The Transport layer
  860. The Session layer
  861. The Presentation layer
  862. The Application layer
  863. Wireless Network
  864. Wireless Security Standard
  865. Computer Based Social Engineering
  866. Kali Linux Command
  867. Mi Note 8 has good 6GB RAM or 4GB RAM.
  868. Advantages of Wireless Networking
  869. Disadvantages of Wireless Networking
  870. Discussing NAT
  871. Discussing Software Requirements to Setup a Wireless Network
  872. DNAT (Dynamic NAT)
  873. Domain Name Space
  874. Exploring Different Layers of TCP/IP Protocol Suite
  875. Exploring Different Types of Wireless networking Models
  876. Exploring Different Types of Wireless Networks
  877. Exploring DNS
  878. Exploring Hardware Requirements to Setup a Wireless Network
  879. Exploring IPv6 Addressing
  880. Exploring the Need for IPv6
  881. HomeRF
  882. IEEE 802.11
  883. IEEE 802.11a
  884. IEEE 802.11b
  885. IEEE 802.11g
  886. IEEE 802.11n
  887. IEEE 802.16 (WiMAX)
  888. IEEE 802.16a (WIMAX)
  889. Introduction (TCP/IP)
  890. Mobile Computing
  891. Name Space
  892. Network Models
  893. Role of a Server in Networking
  894. SNAT (Static NAT)
  895. The AP Wireless Networking Model
  896. The Application Layer
  897. The Application server
  898. The Bluetooth Technology
  899. The Client/Server Architecture
  900. The Client/Server Network
  901. The Database Server
  902. The File Server
  903. The FTP Server
  904. The Hybrid Network
  905. The Internet Layer
  906. The IR Technology
  907. The MAC Address Filtering Technology
  908. The Mail Server
  909. The Network Interface Layer
  910. The P2P Wireless Networking Model
  911. The Peer-to-Peer Network
  912. The Print Server
  913. The Proxy Server
  914. The Radio Waves Technology
  915. The SSID Technology
  916. The Three-Tier Architecture
  917. The Transport Layer
  918. The Two-Tier Architecture
  919. The Web Server
  920. The WEP Technology
  921. The WPA 2 Technology
  922. The WPA Technology
  923. Troubleshooting Problems of a Wireless Network
  924. Types of Servers
  925. Understanding Different Wireless Technologies
  926. Understanding the Basics of Wireless Networking
  927. Understanding the IP Address
  928. Understanding Wireless Network Security
  929. Wireless Access Point
  930. Wireless Antennae
  931. Wireless Bridge
  932. Wireless Networking Standards
  933. Wireless Repeater
  934. WLAN
  935. WPAN
  936. WWAN
  937. Wireless Adapter
  938. Introduction wireless networking
  939. Exploring Different Layers of TCP/IP Protocol Suite
  940. Content Principles of Accounting-XI
  941. Introduction of troubleshooting tools
  942. Protocol Analyzer
  943. Throughput Tester
  944. Connectivity Software
  945. Enabling Telnet in Windows 7
  946. Resolving Names with the Hosts Table
  947. Secure Shell Better Than Telnet
  948. The Address Resolution Protocol
  949. The ARP Utility
  950. The ipconfig Command
  951. The nbtstat Utility
  952. The nslookup Utility
  953. The pathping Command
  954. The ping Command
  955. The route Command
  956. The Traceroute Utility
  957. Understanding Telnet Utility
  958. Using –r Option
  959. Using –e option netstat
  960. Using -p Option
  961. Using -a Option
  962. Using –a Option
  963. Using -c Option
  964. Using –e option
  965. Using -r Option
  966. Using –s option
  967. Using -S Option
  968. Using -R Option
  969. Using –n option netstat
  970. Windows ARP Table
  971. Computer speed and Measurements Unit
  972. Application of computer
  973. Boolean function and logic function
  974. Functions of Operating System
  975. Logic gates
  976. AND Gate
  977. OR Gate
  978. NOT gate
  979. NAND Gate
  980. NOR Gate
  981. XOR Gate
  982. XNOR Gate
  983. Universal gates
  984. PEN DRIVE
  985. Memory Card
  986. USB PORTS
  987. First generation computer
  988. Second generation computer
  989. Third generation computer
  990. Fourth generation computer
  991. Fifth generations computer
  992. Generation of Computer
  993. Basis principle of computers
  994. Computer Architecture and Computer Organization
  995. Light pen
  996. OCR (Optical Character Recognition)
  997. Trackball
  998. External Storage Device
  999. What is Software Vulnerabilities
  1000. Serial port
  1001. Parallel port
  1002. What is Vulnerabilities
  1003. what is Exploits
  1004. exploitation is to gain access
  1005. exploitation in denying access
  1006. Graphic card
  1007. National and Global Security
  1008. Database Query Languages
  1009. what is web exploits
  1010. Ghost Phisher Installation Method or Features
  1011. Basic Termux command
  1012. Basic Kali Linux Command
  1013. What is Steganography? explain in Process
  1014. Passive Sniffing Techniques
  1015. kali Linux Top 10 Tool .
  1016. Terms Associated with Wireless Technology
  1017. Site Cloning Using Social Engineering Toolkit
  1018. History of computer mechanical calculating era, mechanical era, Electronic era
  1019. On the basis of brand , IBM PC IBM compatible and apple Machine
  1020. UNIX
  1021. Fire Wire or IEEE 1394
  1022. Magnetic ink Character Recognition (MICR)
  1023. Microprocessor components of Microprocessor
  1024. Software
  1025. System software 
  1026. Application software 
  1027. Computer virus 
  1028. Setup Network Connection
  1029. Concepts of System Buses
  1030. Word processor
  1031. Type of word processing
  1032. Basic terms of word processing
  1033. What is a web app?
  1034. What is web service?
  1035. What is the different between web coding and web development?
  1036. What is JQuery Mobile?
  1037. What is different between Web site and Web service?
  1038. Define term java?
  1039. Define term XML
  1040. Explain the hierarchy of HTML document.
  1041. What do you mean by Image Map?
  1042. What is cookie?
  1043. What is a mobile web App?
  1044. What is Apache Tomcat?
  1045. What is a mobile web App?
  1046. What is a cascading style sheet?
  1047. What do you mean by java Beans?
  1048. What is silverlight? Why it is introduced?
  1049. What is Deep Zoom technology in silverlight?
  1050. What is the use of the MediaPlayer server control in ASP.NET?
  1051. What is the functionality provided by the silverlight server control in ASP.NET?
  1052. What is the role of customizers?
  1053. What is a servlet?
  1054. Different between the ServletContext and ServeltConfig objects.
  1055. What is session?
  1056. List the session tracking techniques.
  1057. How cookies are used to track a session?
  1058. Privacy Policy
  1059. What is a compiler?
  1060. Recovery System
  1061. Setup Network Connection
  1062. What is a mobile web App?
  1063. What is a servlet?
  1064. History of computer. Generation of computer
  1065. Components of a computer
  1066. What is an Input Device?
  1067. What is Pointing Devices?
  1068. What is mouse? Types of Mouse.
  1069. What is Graphics Tablet
  1070. What is MICR(Magnetic ink Character Recognition)
  1071. Output Devices
  1072.