Ethical hacking workshop (Two days)

2,212 views
2,071 views

Published on

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
2,212
On SlideShare
0
From Embeds
0
Number of Embeds
328
Actions
Shares
0
Downloads
85
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Ethical hacking workshop (Two days)

  1. 1. Ethical Hacking & Information Security WorkshopOverview:IDC (Global market intelligence firm) predicts requirement of 1,88,000 security professionals bythe year 2012. Currently the number of security professionals in India is around 22,000.This workshop covers a wide range of security aspects ranging from basics of security to breakingthe networks. The main objective of the workshop is to teach about how to protect yourself fromthe menace of hacking and to educate the student about the career opportunities in InformationSecurity world. This workshop will give a complete understanding of the popular informationsecurity attacks and explains the techniques to counter them.Duration:One day event – 12 hoursBenefits:Participation certificate for the studentsConstant touch with the trainer for career guidance and doubts clarification1 http://www.securitylearn.net
  2. 2. Content:Introduction to Hacking & Ethical Hacking Overview of hacking Hacking Terminology Types of hackersSystem hacking Windows password algorithms Breaking windows password Key loggers Real world case studies Tools & Demos CountermeasuresNetwork Hacking Enumerating networks Buffer over flows Taking control on remote systems Real world case studies Introduction to secure code development practices Tools & Demos CountermeasuresWeb Application hacking Web application architectures Life cycle of web applications Man in the middle attacks SQL Injection Social Engineering attacks Phishing attacks Tools & Demos CountermeasuresEmail hacking Hub vs switch networks ARP Spoofing Stealing Email passwords Tracing emails Adding Read notifications to Emails Countermeasures 2 http://www.securitylearn.net
  3. 3. Wireless network hacking basics Introduction to Wireless networks Overview of wireless authentication mechanisms WEP vs WPA Tools & Techniques CountermeasuresCareer GuidancePresenter’s profile:Satish B:Information Security Professional with 6 years of experience in Penetration testing of webapplications and mobile applications. He has reported vulnerabilities in Facebook, LinkedIn andMicrosoft bing services. Presented papers in international conferences.Chaitanya K:Information Security Professional with 5 years of experience in Penetration testing of webapplications and mobile applications.ContactSatish BEmail: satishb3@securitylearn.net satishb3@hotmail.com 3 http://www.securitylearn.net

×