Ethical hacking workshop (One day)
Upcoming SlideShare
Loading in...5
×
 

Ethical hacking workshop (One day)

on

  • 2,165 views

 

Statistics

Views

Total Views
2,165
Views on SlideShare
1,618
Embed Views
547

Actions

Likes
0
Downloads
54
Comments
0

4 Embeds 547

http://securitylearn.wordpress.com 329
http://mrgeeksolutions.com 211
http://www.mrgeeksolutions.com 6
http://mrgeekim.com 1

Accessibility

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Ethical hacking workshop (One day) Ethical hacking workshop (One day) Document Transcript

  • Ethical Hacking & Information Security WorkshopOverview:IDC (Global market intelligence firm) predicts requirement of 1,88,000 security professionals bythe year 2012. Currently the number of security professionals in India is around 22,000.This workshop covers a wide range of security aspects ranging from basics of security to breakingthe networks. The main objective of the workshop is to teach about how to protect yourself fromthe menace of hacking and to educate the student about the career opportunities in InformationSecurity world. This workshop will give a complete understanding of the popular informationsecurity attacks and explains the techniques to counter them.Duration:One day event – 6 hoursBenefits:Participation certificate for the studentsConstant touch with the trainer for career guidance and doubts clarification1 http://www.securitylearn.net
  • Content:Introduction to Hacking & Ethical Hacking Overview of hacking Hacking Terminology Types of hackersSystem hacking Windows password algorithms Breaking windows password Key loggers Real world case studies Tools & Demos CountermeasuresNetwork Hacking Enumerating networks Buffer over flows Taking control on remote systems Real world case studies Introduction to secure code development practices Tools & Demos CountermeasuresWeb Application hacking Web application architectures Life cycle of web applications Man in the middle attacks SQL Injection Social Engineering attacks Phishing attacks Tools & Demos CountermeasuresEmail hacking Hub vs switch networks ARP Spoofing Stealing Email passwords CountermeasuresCareer Guidance 2 http://www.securitylearn.net
  • Presenter’s profile:Satish B:Information Security Professional with 6 years of experience in Penetration testing of webapplications and mobile applications. He has reported vulnerabilities in Facebook, LinkedIn andMicrosoft bing services. Presented papers in international conferences.Chaitanya K:Information Security Professional with 5 years of experience in Penetration testing of webapplications and mobile applications.ContactSatish BEmail: satishb3@securitylearn.net satishb3@hotmail.com 3 http://www.securitylearn.net