Cyber Security | Trap Door

Cyber Security workshop addressed about Information Security concerns wherein the students get to know the importance and need to secure their systems and sensitive data. To counter any form of cyber crime information security professional and experts plays the prime role which makes information security a backbone of IT industry.  This workshop addressed about the technical know-how in the students in order to maximize them with benefits and knowledge and improve their skills and excellence in this field of IT. Our highly trained professionals and experts will impart all the needful to equip students to counter the potential attacks.


Prerequisites:-

Can access computer system and make use of internet to perform search over Google.

Need to Prepare?

Prior programming experience is not required.

Tools Expected:-

Windows OS based PC, Internet Connection, Notebook and Pen

Tools Provided (for the session):-

Software, Hacking tools and Reference Materials.

Concepts:-

Operating System, Logic creation, Short Keys, Programming, Keywords etc.

Summary:-

This workshop will be addressed about how to protect yourself from the menace of hacking and build future systems. It ended up with, making you aware of the current shortcomings which gives rise to bad security systems.

Project:-

E-Mail attacks, Windows OS attacks, Target web server,Reverse Engineering,Enumerating Wireless Network

Commitment:-

2 Days (7 hours each)

Agenda:-

Day 1
Session 1-  (03:30 hrs)
Introduction to Ethics and Hacking
  • Hacking History- How It All Began
  • Need For Ethical Hacking
  • Why We Require Ethical Hackers
  • Types Of Hackers
  • Steps In Ethical Hacking
  • Scopes In Hacking
Windows OS Hacking
  • To exploit the vulnerabilities of windows using live devices and Universal Serial Bus (USB).
Steganography
  • What is Steganography?
  • Hiding data behind Images, PDFs, Audio and Videos files

 

Session 2- (02:30 hrs)
Networking Tweaks
  • Enumerating Wireless Network
  • Network and its types LANs, WANs & WLANs
  • Basic Structure of Internet
  • Web Server As a Target
  • What is a Server?
  • What is an IP Address?
  • What is a domain name?
  • IP-Domain Relation
  • Client-Server Relationship Model
  • Internet networking
  • Basic explanation of exploitation of loopholes
Virtualization and System Cloning

 

Session Recap
Day 2
Session 1- (03:30 hrs)
Understanding Attacks & Reverse Engineering
  • Trojans & Viruses
  • What is phishing?
  • Preparation for phishing
  • Batch Programming & Scripting
  • Website and Database Hacking Attacks
  • Mobile and VOIP Hacking
  • Facebook Hacking and Security
  • Credit Card Fraud and Cases
  • How to protect your system from attacks

 

Session 2- (02:30 hrs)
Attacks on E-mail
  • What is Email Forging?
  • How to generate a Fake Mail?
  • How to detect a fake Email?
  • Introduction to cyber laws
  • IT Acts, Rules and Regulation
  • Case Study
Session Recap

Zonal Round of SkillThon

  • Competition
  • Certificate distribution and acknowledgement