Professional Documents
Culture Documents
Workshop.
Our aim is to address the students apprehensions and anxieties regarding their career prospects in Ethical
Hacking & Information Security. It is a One-Stop Workshop for all manner of career related queries. We
have lined up the countrys best names in the fields of education and skill-building to help the students along
in their transition from students to professionals, and answer any career-related questions or doubts they may
have, to their utmost satisfaction.
Workshop Dates: 9th & 10th April 2016
Workshop Venue: Indian Institute of Technology Delhi
Top Features
2 days long workshop with Prize winning Competitions
Hundred plus delegates expected from all across North India
Agenda of WAC | Ethical Hacking Workshop
Day 1
o Session 1: Concept of Hacking
o Session 2: Hacking Emails and Social Networks
o Session 3: Google Hacking
o Session 4: Web Application Penetration Testing
o Session 5: Basics of Secure Programming
Day 2
o Session 6: World of Digital Virtualization
o Session 7: Hacking and Securing Windows Systems
o Session 8: Malware: Attack, Detect and Defend
o Session 9: Software Cracking: Product Key Generation
WAC | Ethical Hacking Workshop Benefits | What do I stand to gain?
Specialized Training from Domain Expert
Software Kit with Videos
Certification on participation from Vortex IIT Delhi
How much do I have to pay?
Standard Pass: Rs. 1,500/- per student (Inclusive of all applicable taxes)
Standard Pass with Lunch: Rs. 2,000/- per student (Inclusive of all applicable taxes)
About the Partner Organizers | Kyrion Digital Securities
Kyrion Digital Securities, Flagship Company of Kyrion Group, is working towards the vision to develop India
as a Cyber Secured Country. It is a leading player in India to provide Ethical Hacking & IT Security Training
to all possible audience. With an outreach to over 80,000 students and over a 1000 major colleges, Kyrion
Digital Securities is a well known and trusted brand in the education and information security business.
Website: http://www.kyrion.in
Whom should I contact for registration?
Sujata
0-9555-9444-66
workshop@vortex-iitd.com
Detailed Module
Duration
15 Hours
01 Hours
Introduction
Security can't be guaranteed. As Clint Eastwood once said, "If you want a
guarantee, buy a toaster." The only secure system is one that's unplugged,
turned off, and in a locked room.
As it's not practical to leave our systems turned off, we need to understand
the risks to our systems and prepare ourselves to defend them. Preparation
begins with understanding and that's where awareness comes in.
With all the news stories about hackers, botnets, and breaches involving
personal information, it's easy for the security message to sound over-used
and tired. It's easy for people to say, "It won't happen here." Yet, studies
and surveys repeatedly show that: the human factor (what employees do or
don't do) is the biggest threat to information systems and assets.
The best way to achieve a significant and lasting improvement in
information security is not by throwing more technical solutions at the
problem it's by raising awareness and training and educating everyone
who interacts with computer networks, systems, and information.
Module Structure
Loophole+, Ethical Hacking and Penetration Testing workshop, aims to
educate users of digital media of the threats, risks and privacy concerns that
go with using them. The other goal of this training module is to expose
issues and vulnerabilities to drive the digital media industry to create
solutions to these problems.
Duration: 30 minutes
(based on GT101: Foundation of Information Security)
Session Management
Session ID Generation
Session Handling
o Regeneration of Session Tokens
o Session Validation
o Session Bruteforcing
Session Termination
o Secure Logout
o Browser Remember Password
Recognizing Phishing Websites
Google Hacking
Duration: 30 minutes
(based on GT121: Google Best Friend of a Hacker)
Recovering Techniques
Corrupt Partitions
Corrupt File System
Media Errors
Overwritten Damage
Data Acquisition
OS Volume Information
Disk Imaging
Duration: 60 minutes
(based on GT117 - Data Recovery and Backup)
Duration: 60 minutes
(based on Password Cracking and Product Key Generation)
Duration: 30 minutes
(based on GT116: Vulnerabilities in Mobile & VOIP Security)
Requirements
Computer Device (Bring Your Own Device)
Windows Operation System
Working CD/DVD Drive
Removable Storage Media (Pen Drives 1GB)
Battery Backup for 60 minutes
www.kyrion.in