Your IP : 216.73.216.40


Current Path : /var/www/html/abhishek/templates/
Upload File :
Current File : /var/www/html/abhishek/templates/teaching.html

<body>

            	<h1>My Teaching Philosophy</h1>
            	<div class="text" align="justify">
                  <p>I believe in creating a stress free environment in the classroom and try to support my lectures with real time examples. I personally feel that the knowledge imparted to the students should help them to develop strong foundation in their subject. I try to follow more practical and logical way with substantive theoretical foundation. I believe in continuous improvement by critically evaluating my teaching style.<br>
I consider R&amp;D as one the very important aspect of academic tenure and therefore try to devote time in research activities and eventually get my work published in journals and international conference of repute.</p>
                  <p><strong><br>
                  Subjects Taught</strong>:</p>
                  <p><strong>2007</strong></p>
                  <ul>
                    <li>Fundamental of Information Security</li>
                    <li>Technical Risk Assesment</li>
                    <li>SOX</li>
                    <li>Security Architecture</li>
                  </ul>
                  <p><strong>2008</strong></p>
                  <ul>
                    <li>Identity and Access Management</li>
                    <li>Computer Forensics</li>
                    <li>Fundamental of Information Security</li>
                    <li>Technical Risk Assesment</li>
                  </ul>
                  <p><strong>2009</strong></p>
                  <ul>
                    <li>Computer Forensics</li>
                    <li>Fundamental of Information Security</li>
                    <li>Technical Risk Assesment</li>
                  </ul>
                  <p><strong>2010</strong></p>
                  <ul>
                    <li>Computer Forensics</li>
                    <li>Fundamental of Information Security</li>
                    <li>Technical Risk Assesment</li>
                  </ul>
                  <p><strong>2011</strong></p>
                  <ul>
                    <li>Fundamental of Information Security</li>
                    <li>Computer  &amp; Telecommunication Network</li>
				  </ul>
				  <p><strong>2012</strong></p>
                  <ul>
                    <li>Computer Forensics</li>
                    <li>Technical Risk Assesment</li>
                  </ul>
            	</div>
			

</body>