0% found this document useful (0 votes)
16 views2 pages

Book 1

Uploaded by

MIM Thamseer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views2 pages

Book 1

Uploaded by

MIM Thamseer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Task No Task Name

1 Dividing 4 groups
2 Named a group leder
3 Topic Selection
4 We created a Whatsapp group
5 The topic is Cybersecurity
6 Divided the topic in to subtopic
7 We Gave subtopic to group member

8 1 person took 1 subject

9 Each Member Getherd information in Thair categoris


10 We send information to the whatssapp
11 our leader gave some instructer for us
12 Creating a excel task table
status
Duty taken over by
Completed/Pending/on Prograss
Classmate Completed
Group Member Completed
Inshaf (Group leader) Completed
Inshaf (Group leader) Completed
Group Member Completed
Group Member Completed
Group Member Completed
Intoduction: Navo
Overview of cyber-threat landscape - Dewmi
Cybersecruty Frameworks and standards-Inshaf
Security Awarness Training-Rakshana Completed
Case study and excemple- Fazni
conclusion-Thamseer
Group Member Completed
Group Member Completed
Inshaf (Group leader) Completed
Group Member Completed

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy