Workshop on ETHICAL HACKING
Do You Think That Your Facebook Password’s Are Safe? How Do You Know If The Transactions That You Do Are Safe Or Not? What If Someone Is Monitoring Your Gmail Accounts? What Are You Going To Do Then? Have You Ever Thought About It? Well No Need To Worry!!!
Enter Into The World Of Hacking As Ethical Hackers.
Enter At Your Own Risk…
Overview of the Workshop
One day Workshop on Ethical Hacking and Cyber Security. The focus of the workshop is to teach you how to protect yourself from the menace of hacking. During the workshop, the primary aim is to introduce you to the current popular attacks and explain the techniques to counter them.
- → Passion to learn new things
- → Knowledge of How to use Computer & Internet
After the Workshop:
- → Assurance of changing your point of view towards a Computer and its Security
- → Will develop a Hacking Maniac inside you
- → At least 95% Security as a normal user in your digital life.
- → Tools for each student (Need to carry Pendrive/Harddisk)
- → Participation Certificate
- Introduction to Information Security and Ethical Hacking
- → Introduction
- → Why we need Information Security?
- → Ethical Hacking – Introduction
- → Types of Hackers – White Hat, Black Hat and Grey Hat
- → Cyber Crime and their effects
- → Conclusion
- Networking & Web Architecture :
- → Introduction to Networks
- → Why do we need Networking?
- → Types of Network – LAN, MAN, WAN
- → Internet Protocol Address (IP Address)
- → Internet Protocol version
- → Internet Protocol Types
- → Proxy Servers with Live Examples
- → Virtual Private Networks with Live Examples
- → Internet Service Provider(ISP) and IANA(Internet Assigned Numbers Authority)
- → Domain Name System Server
- → Open System Interconnections Model
- Getting Started with ETHICAL HACKING :
- → Blinking an LED
- → Blinking multiple LEDs
- → Switches and LEDS
- → Debouncing in Switch
- → Overcoming Debouncing problem
- → PWM explained using LED.
- Information Gathering :
- → Digital Foot Printing
- → Information Gathering using different techniques
- → Website Details or Domain Details
- → Web Server Details and History
- Malware Analysis :
- → Operating System Login Bypass
- → Introduction to Virus, Worms and Trojans
- → How to Create Virus and making it fully undetectable
- → How to create Trojans and making it fully undetectable
- → Antivirus – Bypassing
- → Safeguarding systems from Malware
- Email Hacking and Security :
- → Phishing Attack with Live demo
- → Social Engineering using
- → True story behind Fake mails and mailers
- → How to Identify Fake Emails?
- → Key Loggers and their use
- → Email Encryption
- → Security Measures For Email
- Hack using Google :
- → Introduction to Client – Server Model
- → Website Security Generic Misconceptions
- → Introduction to Structured Query Language (SQL) with Examples
- IDirectory Listing and Full Path Vulnerabilities
- SQL Injections Techniques
- Authentication Bypass
- Cross Site Scripting (XSS) on Live Websites
- Session Hijacking on Live Websites
- Cookie Grabbing for Hacking Social Accounts
- → Reverse Engineering
- → Reverse Engineering – An Introduction
- → Brief View of Assembly Code
- → EXE File Cracking , Software Cracking , Game Cracking
- Linux Operating System :
- → Basic Terminologies of Linux
- → Operating System Detection
- → How to detect Open Port & Service
- → How to hack Android Phone with Live Demo
- → Metasploit Framework (msfconsole) with Exploits and Payloads
- → Exploitation of various OS
- → Man in the Middle Attack
- Website Hacking | Vulnerability Assessment | Pentesting :
- → Use Google for Hacking websites
- → How to do advanced search on Google?
- → How to find Vulnerabilities on websites using Google?
- → Google Dorks
- Wireless Security :
- → Introduction to Wireless Technology
- → Introduction to Kali 2.0
- How to hack/crack password of WEP(Wired Equivalent Privacy)
- How to hack/crack password WPA/WPA2(Wi-fi Protected Access)
- → How to Safeguard Your Wi-Fi?
A Fee of Rs:1000 /- Will Be Collected During the Respective day of the event. All the above components would be provided during the program to participants in groups of 3 to 5. All the components have to be returned at the end of the workshop.
- → Certifications will be provided.
- → Tea and snacks will be provided during Break
- → Lunch timing 1PM to 2PM
- → Seats are served on first come basis