Back

I'm in my 2nd yr and I need opinions About my elective on whether i should choose ai or cyber security?

Avanish

Full Stack Android D...ย โ€ขย 3m

Cyber security

3 replies1 like
Replies (3)

More like this

Recommendations from Medial

Devak K

Hey I am on Medialย โ€ขย 2m

How AI Security Works To Prevent Cyber Attacks | Digitdefence Learn how AI security utilizes machine learning and predictive analytics to detect and prevent cyberattacks in real-time, enhancing system protection. https://digitdefence.com/

0 replies3 likes

gray man

I'm just a normal gu...ย โ€ขย 2d

Pakistan-based cyber groups have reportedly launched coordinated attacks on several Indian defence websites, compromising login credentials and gaining unauthorized access to sensitive information related to defence personnel. According to NDTV, th

See More
0 replies10 likes
Image Description

Inactive

AprameyaAIย โ€ขย 9m

Even Cyber Outage can't stop bull run ๐Ÿฅถ

1 replies2 likes

Zew Jana

Nothing is impossibl...ย โ€ขย 1m

Can a virtual window like citrix fix cyber threat..?

0 replies3 likes

Devak K

Hey I am on Medialย โ€ขย 2m

How Cyber Forensic Solves Digital Crimes | Digitdefence Cyber forensics helps solve digital crimes by tracing hackers, recovering lost data, and analyzing malware to support investigations and legal proceedings.

0 replies1 like

Tanay Shandilya

Cyber Risk โ€ข Web Dev...ย โ€ขย 1y

Hi everyone, I am looking out for web development opportunities (Immediate Joiner). I have worked in web dev for about 2 years in my career. For the past 3-4 years I have been working as a cyber risk and cloud security consultant. Visit my profile f

See More
0 replies4 likes
Image Description
Image Description

Aakash kashyap

Building JalSeva and...ย โ€ขย 6m

Rashmika Mandanna become Indiaโ€™s Cyber Safety Ambassador ๐Ÿคก Your thoughts? ๐Ÿ’ฌ

15 replies9 likes
Image Description
Image Description

Surya

Productย โ€ขย 6m

๐Ÿšจ Cyber Threats Are Evolving โ€“ Hereโ€™s What You Need to Know ๐Ÿšจ Hackers are getting creative with new tactics and tools. Here are the latest threats and solutions to protect your business! ๐Ÿ‘‡ ๐Ÿ”นJPHP Malware (Pronsis Loader) - Rare language: Bypa

See More
7 replies1 like
Anonymous
Image Description

Looking for some real cyber field problems that needed to be solved.

3 replies1 like
Image Description
Image Description

Sheikh Ayan

Founder of VistaSec:...ย โ€ขย 3m

IoT Hacking Hardware Devices โ€“ Understanding Security Risks IoT devices are everywhereโ€”from smart homes to industrial automation. But how secure are they? IoT hacking hardware plays a crucial role in security research, penetration testing, and ethic

See More
3 replies2 likes

Download the medial app to read full posts, comements and news.