CYBER NINJAS: ETHICAL HACKING & CYBER SECURITY
Schedule
Sat, 11 Jan, 2025 at 04:30 am to Sun, 12 Jan, 2025 at 11:30 am
UTC.000+0Location
Indian Institute Of Technology–Madras (IIT–Madras) | Chennai, TN
Advertisement
Check our previous workshop feedback/pics at https://www.instagram.com/techobytesAbout Techobytes Technologies: Techobytes Technologies is renowned for its training and workshops in various cutting-edge technologies. We are dedicated to nurturing young minds, providing them with insights into future technologies, and preparing them for promising careers and future endeavors.About Mechanica'24, MEA IIT Madras: Mechanica IIT Madras is the annual technical festival of the Mechanical Engineering department at IIT Madras, India. It's the largest departmental tech fest in the country, and is held in March. The festival offers a blend of technical excellence, creative brilliance, and inspiration through events, workshops, and competitions. It includes design competitions, workshops, keynote speeches, and other activities.Workshop Schedule:Workshop Date: 11th - 12th January 2025 (Saturday-Sunday)Workshop Time: 10 AM to 5 PMWorkshop Duration: 2 Days (14-16 Hours)Workshop Venue: IIT MADRASThe entire session will be covered in two partsTheory Session – Basic & Advanced.Practical Sessions – Basic & Advanced.TECHO WORKSHOP SERIES TOPICS (Each Workshop has 70-130 Seats only)Duration: 2 Days (14-16 HRS)Eligibility: Students and Working professionalsCourse ContentSession 1: Introduction to Ethical Hacking & Cyber Security ● Overview of ethical hacking● Understanding the role of cybersecurity in protecting individuals and organizations● Different types of hackers● Scope and limitations of ethical hackingSession 2: Footprinting and Reconnaissance ● Information gathering techniques ● Understanding OSINT ● WHOIS lookup ● Social engineering for reconnaissance ● Hands-on exercises and demonstrations Session 3: Scanning and Enumeration ● Network scanning techniques ● TCP & UDP Scanning Background ● Port scanning ● Service enumeration ● Vulnerability Identification with Nmap Session 4: Mobile Application Analysis ● Root detection and SSL pinning concepts ● Bypass root detection and ssl pinning in mobile apps ● Static analysis of android apps ● Android app dynamic analysis and attacks using burpsuite Session 5: Vulnerability Assessment ● Importance of vulnerability assessment● Tools for vulnerability scanning● Common vulnerabilities and exposures (CVEs)● Hands-On Exercise: Conducting a basic network scan and vulnerability assessmentSession 6: Exploitation and post-exploitation ● Malware & Exploits ● Metasploit framework ● Privilege escalation Techniques (Windows & Linux) ● Post-exploitation techniques ● Pivoting concept Day 2: Advanced Penetration Testing Techniques Session 7: Web application attacks ● Burpsuite configuration and basics of web request and response ● Intro to web app bug bounty ● Offensive web application attacks ● SQL injection ● File upload vulnerabilities ● Web app business logic bypas ● Authentication attacks ● broken access controls in web apps ● HTML injection and Cross site scripting ● phishing user data via vulnerable web apps ● OWASP Top 10 vulnerabilities ● CSRF, XSS and SSRF ● Authentication & Access Control Vulnerabilities ● Hands-On Exercise: Exploiting a vulnerable web application Session 8: Mobile Application Security ● Connecting Mobile Device to Burp Proxy● Common mobile app vulnerabilities● Basics of SSL Pinning● Reverse engineering mobile apps● Securing mobile applications● Hands-On Exercise: Assessing the security of a mobile applicationSession 9: Wireless Network Security ● Types of wireless networks ● Wi-Fi encryption protocols ● Wireless security threats ● Hands-On Exercise: Wireless network attacks Session 10: CTF (Capture the Flag) Challenges for Students. ● Intro to CTF challenges and live CTF solving session ● Live demonstrations and hands-on exercises with CTF Labs ● CTF Lab setup ● CTF challenges for student batches Session 11: Cybersecurity Best Practices ● Intro to SIEM and incident response ● Legal aspects of ethical hacking ● Continuous monitoring and improvement ● Building a career in ethical hacking ● Hands-On Exercise: Building a basic incident response plan Additionally, topics like iOT hacking concepts, Software Defined Radio (SDR), etc., will be discussed with students. The workshop will be interactive and include practical exercises, demonstrations, and hands-on labs to engage the students and provide them with real-world experiences in ethical hacking and cybersecurity along with career guidance. CERTIFICATION:Hardcopy of Certificate will be given to each participation after the workshop.Eligibility: OPEN TO ALL!! Any B.tech, B.E, M.B.B.S, BCA, MCA, MS, MD, B.sc IT, M.sc IT, Biomedical, Bio-Technoogy, BBA, MBA, B.A, hobbist and from any other stream can join the workshop.Benefits:-Hardcore Training from Industrial Experts for their particular domain.-Software-Hands-on Demonstration of the Latest Techniques & tools-Interactive Query Session-Globally recognized CertificationFee Details :Workshop Pass Drone : Rs. 2500/- only(Fee includes Registration, Training and certification along with Tax)For more details Please Contact:Team Techobytes
Advertisement
Where is it happening?
Indian Institute Of Technology–Madras (IIT–Madras), Chennai, IndiaEvent Location & Nearby Stays: