SlideShare a Scribd company logo
1 of 14
“

THE REAL OPPORTUNITY FOR
SUCCESS LIES W
ITHIN THE
PERSON AND NOT IN HIS
PERSONALITY.
~ Akshay Jain

”
CYBER SECURITY
What is Ethical Hacking and How can we save ourselves
knowing about Cyber Security?

Akshay Jain
BCA Semester 4th Second Shift
36
TABLE OF CONTENTS
• What is Ethical Hacking?
• Ways of Invasion in your Personal Space?
• What is Cyber Security?
• How to be safe from hacking?
• How to deal if you are victimized?
• Q&A Session
WHO AM I REALLY?
I am Akshay Jain currently pursuing B.C.A. from JIMS, Rohini Sector 5,
Delhi. Apart from this I am a Internet Marketer. I speak in many Web
Seminars and Bloggers Meet also.
In history, I was experienced White Hat Hacker (Level 1) and Professional
Blogger too. I still run a Blogging Network of more than 5 Blogs privately
and Yeah, It’s really doing well.
I wish May God Bless You and Me for Future Ventures.

@MrFriendism

AkshayJain.me
WHAT IS ETHICAL HACKING?
Not Hacking Facebook Accounts, Then What?
Hacking is an unauthorized access to the Digital Property listed as follows
•Statistical Reports
•Your Work Plan
•Documentations
•Your Money
•Your Loving Computer, Laptops and Smartphones
SOME MYTHS TO BE FIXED
Most Unsecured Personalities on the Internet
•Government & Military Officials.
•Industrialist or Belongs to Corporate Sector.
•Celebrities and Religion Speakers.
•Common User (You, Me and All of us)
Most Secured Personalities on the Internet
•Hackers
•No One
•YOU. If you follow this presentation.
WAYS OF INVASION
• You: You are the one who invites them.
• Viruses: Turn your System more vulnerable to Trojans.
• Backdoor Trojans & Malwares: Destroys your control over the System.
• Key loggers and Spywares: Starts Sending information to the Attacker.
• Phishing: Just another way of hacking.
• Re-Victomization: Way of Victimizing a Victim Again. (Targeting Kids, Women,
Oldies and Non-Techy People)
WHAT IS CYBER SECURITY?
• Not a Rocket Science.
• Very Easy to Perform.
• Your Security lies in your Hands.
SAVE YOURSELF FROM INVASION
• Use HTTPS
• Check URL
• Use Incognito Browsers
• Avoid Public Wi-Fi
• Use Anti-Viruses with Internet Security
• Keep System Updated (Update Anti-Virus, OS, Drivers & Software Regularly)
• Don’t Just Download Everything for no Reason.
ARE YOU VICTIMIZED? DON’T WORRY
• Download Free Anti-Virus or Purchase Premium AV Packages.
• Delete un-necessary files.
• Remove External Devices (HDD, Webcams, Printers and Smartphones) .
• If Possible: Reformat your system completely.
DID YOU KNOW?
1. Microsoft makes the most vulnerable Software. (Internet Explorer and Windows
XP)
2. Android Phones, iPhones and MacBook are the most Secured Devices.
3. Kim Dotcom is the Richest Hacker & Going to Compete Elections in New Zealand.
4. Most of the Anti-Virus Companies makes their own Viruses.
5. Best AV Software: Kaspersky or ESET NOD 32 .
WON’T TAKE YOUR MORE TIME
• Ethical Hacking: Unauthorized access to your Digital Property.
• Govt., Mil., & Celebs are unsecured including us. Hackers are most secured.
• Virus, Trojans, Phishing or Re-Victimization can harm you.
• Cyber Security is Easy and lies in your hands.
• Use Anti-Virus, HTTPs and Try to be familiar with Incognito.
• Install Anti-Virus, Delete Files, Re-formant System.
Q & A SESSION
Ask Questions related to this presentations and I will clear your doubts in no-time.
THANK YOU
• I thank you all for sparing your time in listening to my esteemed presentation. I
personally thanks the lecturer for giving me this opportunity.
• I hope you liked my presentation.
• Don’t Forget to leave feedbacks.

@MrFriendism

AkshayJain.me

More Related Content

Viewers also liked

PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationSymantec
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)Tughral Yamin
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
A Discussion on Digital Archives: The Knowledge Creating Perspective
A Discussion on Digital Archives: The Knowledge Creating PerspectiveA Discussion on Digital Archives: The Knowledge Creating Perspective
A Discussion on Digital Archives: The Knowledge Creating PerspectiveDer Chao CHEN
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessLucy Denver
 
Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Enrique Martin
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Fakrul Alam
 
Digital strategy - security
Digital strategy - securityDigital strategy - security
Digital strategy - securityNansje
 
Funny miss la sen hand sketching
Funny miss la sen hand sketchingFunny miss la sen hand sketching
Funny miss la sen hand sketchingMiss La Sen house
 
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC Advisory Group
 
Industrial Cyber Security: What is Application Whitelisting?
Industrial Cyber Security: What is Application Whitelisting?Industrial Cyber Security: What is Application Whitelisting?
Industrial Cyber Security: What is Application Whitelisting?honeywellgf
 

Viewers also liked (18)

PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
A Discussion on Digital Archives: The Knowledge Creating Perspective
A Discussion on Digital Archives: The Knowledge Creating PerspectiveA Discussion on Digital Archives: The Knowledge Creating Perspective
A Discussion on Digital Archives: The Knowledge Creating Perspective
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Cyber security
Cyber securityCyber security
Cyber security
 
Digital strategy - security
Digital strategy - securityDigital strategy - security
Digital strategy - security
 
Funny miss la sen hand sketching
Funny miss la sen hand sketchingFunny miss la sen hand sketching
Funny miss la sen hand sketching
 
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
 
Industrial Cyber Security: What is Application Whitelisting?
Industrial Cyber Security: What is Application Whitelisting?Industrial Cyber Security: What is Application Whitelisting?
Industrial Cyber Security: What is Application Whitelisting?
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

Cyber Security Presentation - PDS Fourth Semester

  • 1. “ THE REAL OPPORTUNITY FOR SUCCESS LIES W ITHIN THE PERSON AND NOT IN HIS PERSONALITY. ~ Akshay Jain ”
  • 2. CYBER SECURITY What is Ethical Hacking and How can we save ourselves knowing about Cyber Security? Akshay Jain BCA Semester 4th Second Shift 36
  • 3. TABLE OF CONTENTS • What is Ethical Hacking? • Ways of Invasion in your Personal Space? • What is Cyber Security? • How to be safe from hacking? • How to deal if you are victimized? • Q&A Session
  • 4. WHO AM I REALLY? I am Akshay Jain currently pursuing B.C.A. from JIMS, Rohini Sector 5, Delhi. Apart from this I am a Internet Marketer. I speak in many Web Seminars and Bloggers Meet also. In history, I was experienced White Hat Hacker (Level 1) and Professional Blogger too. I still run a Blogging Network of more than 5 Blogs privately and Yeah, It’s really doing well. I wish May God Bless You and Me for Future Ventures. @MrFriendism AkshayJain.me
  • 5. WHAT IS ETHICAL HACKING? Not Hacking Facebook Accounts, Then What? Hacking is an unauthorized access to the Digital Property listed as follows •Statistical Reports •Your Work Plan •Documentations •Your Money •Your Loving Computer, Laptops and Smartphones
  • 6. SOME MYTHS TO BE FIXED Most Unsecured Personalities on the Internet •Government & Military Officials. •Industrialist or Belongs to Corporate Sector. •Celebrities and Religion Speakers. •Common User (You, Me and All of us) Most Secured Personalities on the Internet •Hackers •No One •YOU. If you follow this presentation.
  • 7. WAYS OF INVASION • You: You are the one who invites them. • Viruses: Turn your System more vulnerable to Trojans. • Backdoor Trojans & Malwares: Destroys your control over the System. • Key loggers and Spywares: Starts Sending information to the Attacker. • Phishing: Just another way of hacking. • Re-Victomization: Way of Victimizing a Victim Again. (Targeting Kids, Women, Oldies and Non-Techy People)
  • 8. WHAT IS CYBER SECURITY? • Not a Rocket Science. • Very Easy to Perform. • Your Security lies in your Hands.
  • 9. SAVE YOURSELF FROM INVASION • Use HTTPS • Check URL • Use Incognito Browsers • Avoid Public Wi-Fi • Use Anti-Viruses with Internet Security • Keep System Updated (Update Anti-Virus, OS, Drivers & Software Regularly) • Don’t Just Download Everything for no Reason.
  • 10. ARE YOU VICTIMIZED? DON’T WORRY • Download Free Anti-Virus or Purchase Premium AV Packages. • Delete un-necessary files. • Remove External Devices (HDD, Webcams, Printers and Smartphones) . • If Possible: Reformat your system completely.
  • 11. DID YOU KNOW? 1. Microsoft makes the most vulnerable Software. (Internet Explorer and Windows XP) 2. Android Phones, iPhones and MacBook are the most Secured Devices. 3. Kim Dotcom is the Richest Hacker & Going to Compete Elections in New Zealand. 4. Most of the Anti-Virus Companies makes their own Viruses. 5. Best AV Software: Kaspersky or ESET NOD 32 .
  • 12. WON’T TAKE YOUR MORE TIME • Ethical Hacking: Unauthorized access to your Digital Property. • Govt., Mil., & Celebs are unsecured including us. Hackers are most secured. • Virus, Trojans, Phishing or Re-Victimization can harm you. • Cyber Security is Easy and lies in your hands. • Use Anti-Virus, HTTPs and Try to be familiar with Incognito. • Install Anti-Virus, Delete Files, Re-formant System.
  • 13. Q & A SESSION Ask Questions related to this presentations and I will clear your doubts in no-time.
  • 14. THANK YOU • I thank you all for sparing your time in listening to my esteemed presentation. I personally thanks the lecturer for giving me this opportunity. • I hope you liked my presentation. • Don’t Forget to leave feedbacks. @MrFriendism AkshayJain.me