On successful completion of this course, student will be able to: Define Data and Multimedia Technique Security; Apply Data and Multimedia Technique Security on multi-platform; Evaluate Data Forensic and Mitigation Strategies.
- History of Secret Writing;
- Four Easy Data Hiding Exercise;
- Multimedia Data Hiding;
- Data Hiding Among Android Mobile Device;
- Apple iOS Data Hiding;
- Operating System Data Hiding;
- Virtual Data Hiding;
- Data Hiding in Network Protocol;
- Forensic and Anti-Forensic;
- Mitigation Strategies;
- Summary and Review.
Published at : Updated