SlideShare a Scribd company logo
1 of 12
Download to read offline
www.kryptora.com 1
1.1 Time Duration 4Hrs. Demonstrations to students
2.1 Authorized Certificate for each participant of seminar.
2.2 Goodies will be distributed during seminar.
3.1 T-shirts or Hoddie will we given to coordinating team with our company logo and your institute logo.
3.2 Certificate of Coordination will be given after successful conduction of the seminar to coordinators.
4.1 We search for shining techno minds. May be they are sitting in your college, i.e. Such minds with strong skills set will be
considered for our internship program, under the impact of our expert’s team.
4.2 We are Team Worker; we work in collaboration. Interns can also expect a funded research project, depending upon the quality
and market reputation for output of that project.
www.kryptora.com 2
5.1 Posters/or Banners/or Pamphlets will be provided or college can design for promotional purpose. This can be
done on the basis of Communication between both Parties. Therefore, Payment will be made accordingly.
6.1 Sponsorship will be given to college, for conducting the seminar as a part of acknowledgement of using college
Infrastructural facilities.
6.2 College name will be published on our website as a part of marketing on Social Media.
7.1 Learn/practice about Information Security latest techniques and countermeasures directly from experienced
certified professionals from EC Council, USA and Cyber Law certified.
7.2 Learn & Interact with Information Security Expert.
7.3 Receive unparalleled hands-on education training on the art of Information security with personal one-on-one
attention during hands-on session each day of seminar.
7.4 10% Theory and 90% total live demonstrations by our trainers on latest Information Security Techniques &
Tools.
7.5 Discussing cybercrime case studies.
7.6 Future assistance to every student regarding any query of seminar demonstrations or any other technical
assistance.
www.kryptora.com 3
7.7 Special Discount to every participant for
a. Class room training (25 days)
b. Advanced level workshops and boot camp conducted by us.
We want following assistance from college to conduct seminar in smooth flow:-
8.1 Technical Infrastructure Facilities
a. A Seminar hall/or Auditorium /or Lab having an enough capacity to accommodate all participants comfortably and voice
should not echo there.
b. A Projector setup with stereo jack cord and audio public address system; with proper visibility for every student who all are
accommodated. If student’s no. is more and projector view is demised than there is requirement of another projector
accordingly so, as to give proper visibility to rest students.
c. An Internet Connection (min. 1MPBS speed) for the resource person (Without proxy if possible).
d. Two Wireless Microphones (Collar Mic. Preferred for speaker).
e. Internet Connection for every student during Practice session.
f. Laptops are recommended for students for practice, Charging point in Hall for every student’s laptop and if it’s a
Computer Lab, students should be allotted systems to practice on them (Managed accordingly to the situation)
g. P roper Electricity, during the seminar.
www.kryptora.com 4
8.2.1 Accommodation to our visiting team members in your college guest house or any other good place. (Min. 1 or
2 member and rest acc. to the conversation b/w both parties and no. of students)
8.2.2 Pick and drop facility from nearest railway station/ bus-stand/ or airport.
8.3 Publicity & Logistics Support
8.3.1 Soft copy of student’s database with name, contact no., email, branch/stream and year should be given to us.
8.3.2 Min. strength of 80 students required to conduct seminar successfully.
8.3.3 Specially designed seminar posters (provided by us) to be dispatched to engineering colleges across the region of
your institute along with the festival posters and to be put up in the campus. As per seminar, marketing point.
8.3.4 Three to four specially appointed coordinators (Student and Faculty) having the knowledge of the subject, to
promote, publicize, handle local student queries etc. for our seminar to be conducted at the college.
8.3.5 Support to our team to interact with college students to provide them proper awareness regarding the seminar
program and to increase the participation.
www.kryptora.com 5
Introduction to Information SecurityModule 1:
Module 3:
Module 2:
Module 4:
Module 5:
Module 6:
Module 7:
Module 8:Call Masking Social Engineering (FB hacking etc)
Hacking Humans Mind
SQL Injection (Basic)System Security Bypass
Google Dorking Brute
Introduction Python
www.kryptora.com 6
Rs. 200/participant (inclusive of all taxes)
- Software / Tutorial toolkit per participant (as mentioned in Clause 2)
- Goodies worth 1500+ will be distributed during seminar
- Special Discount to every participant for Class room training or any other advanced level workshops /
bootcamp conducted by us and offer for internship program accordingly.
The amount shall be paid as under:-
- Appropriate Amount to be handed over to team on the first day of the seminar
a. Mode of Payment can be Cheque /Demand Draft/Cash
b. Proper Invoice will be provided.
c. Appropriate Sponsorship Amount to be handed over to the College on the first day of the seminar
www.kryptora.com 7
We ensure that you will find our seminar program extremely beneficial for your students. Such type of 3 days program not only give
exposure to student regarding Information Security but It will make them learn, creating awareness for daily life and add-on in their
Curriculum Vitae.
If students want to make career in Information Security, our seminar and training are very helpful for such international certification
like C|EHTM , E|CSATM, CISSP, OSCP etc.. As such types of topics are not part of our standard study curriculum, so it is a high
booster for every participant.
As per the report, “The number of trained Information Security Professionals in India only accounts to 556 compared to 1.25 lakh
in China and 91,080 in the U.S “ *(Link is provided at the bottom of this page, for the reference check).If you are looking as career
perspective so, Information security is having very good opportunities for people who choose this domain.
If you have any queries kindly get back to us. We are looking forward to a quick and positive response from you and a long term
association with your esteemed organization.
This is a general Proposal; rest all other specific details with name/seal/sign. will be mentioned in Memorandum of Understanding
(MOU) which will be signed b/w parties.
www.kryptora.com 8
Thanks & Regards,
Kryptora InfoTech Pvt. Ltd.
If you have any queries, kindly contact us on: +91-8210109116
Or directly contact us: +91 -7503897545, +91-9149104872
Contact Person: Mr. Rakesh Sharma
Email: info@krypsec.com, Contact@kryptora.com
www.kryptora.com 9
Information Cyber Security, awareness and knowledge is very important for every computer user. Information Cyber Security
career is very bright. The number of trained Information Security Professionals in India only accounts to 556 compared to 1.25 lakh
in China and 91,080 in the U.S. India require no. of cyber security professionals.
Students will have an add-on into their resume/cv; they have more than introductory knowledge of Networking, Database, website
etc. no matter from which branch they belong or what profession they go for. If they use computer, definitely it will be a great
exposure.
Not only as a career, students can safeguard themselves from being trapped in to hands of offensive minds. eg. Martial Arts are a
science of Self Defense not attacking others.
Our trainers, who are coming for seminar program, are certified professionals and highly experienced for Bootcamp
training delivery (Rest read in Clause 10).
No prerequisites required from student side except interest. Student of any branch can go for this Seminar. Students are highly
benefited by training quality and advantages as… (Refer to clause 2 and 7). Because of our quality training and quality business with
every institute, we recommend ourselves. (Infra etc... support required from Coll. Side: ref. clause 8)
www.kryptora.com 10
Contact Us
Corporate Office:
E-48, Ground Floor, Sector 3
Noida, UP
Pin Code: 201301
Contact Details: +91-7503897545,
+91- 9149104872
www.kryptora.comwww.kryptora.com 12

More Related Content

Similar to Ethical Hacking Seminar

Addressing the digital skills crisis
Addressing the digital skills crisisAddressing the digital skills crisis
Addressing the digital skills crisisSean Coyne
 
Acadgild learning proposal
Acadgild learning proposalAcadgild learning proposal
Acadgild learning proposalPradeep Saboji
 
Proposal for IT Security Team
Proposal for IT Security TeamProposal for IT Security Team
Proposal for IT Security TeamRishabh Gupta
 
Introduction-to-Cybersecurity-Apponix.pptx
Introduction-to-Cybersecurity-Apponix.pptxIntroduction-to-Cybersecurity-Apponix.pptx
Introduction-to-Cybersecurity-Apponix.pptxAshutoshB5
 
Curriculum Vitae_Aye Aye Maung Final
Curriculum Vitae_Aye Aye Maung FinalCurriculum Vitae_Aye Aye Maung Final
Curriculum Vitae_Aye Aye Maung FinalAye Maung
 
Internship in-chennai-for-eie-in-ethical-hacking
Internship in-chennai-for-eie-in-ethical-hackingInternship in-chennai-for-eie-in-ethical-hacking
Internship in-chennai-for-eie-in-ethical-hackingroshneyarul
 
142.8 Digital and Tech solutions PRF3
142.8 Digital and Tech solutions PRF3142.8 Digital and Tech solutions PRF3
142.8 Digital and Tech solutions PRF3Jordan Cooper
 
Information Technology Program: JCU Singapore
Information Technology Program: JCU SingaporeInformation Technology Program: JCU Singapore
Information Technology Program: JCU SingaporeJcu Singapore
 
Internship in-chennai-for-eie-in-ccna
Internship in-chennai-for-eie-in-ccnaInternship in-chennai-for-eie-in-ccna
Internship in-chennai-for-eie-in-ccnachitravasanth
 
Cybersecurity Courses, Tools and Tactics.pdf
Cybersecurity Courses, Tools and Tactics.pdfCybersecurity Courses, Tools and Tactics.pdf
Cybersecurity Courses, Tools and Tactics.pdfWestwp
 
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docThowfeekFayees
 
Internship in-chennai-for-mca-windows-application
Internship in-chennai-for-mca-windows-applicationInternship in-chennai-for-mca-windows-application
Internship in-chennai-for-mca-windows-applicationmythili_sweety3092
 
NUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information SessionNUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information Sessionengtsze
 
Internship in-chennai-for-eee-in-website-designing
Internship in-chennai-for-eee-in-website-designingInternship in-chennai-for-eee-in-website-designing
Internship in-chennai-for-eee-in-website-designingsofiyasofi
 
Internship in-chennai-for-eee-in-ccna
Internship in-chennai-for-eee-in-ccnaInternship in-chennai-for-eee-in-ccna
Internship in-chennai-for-eee-in-ccnachitravasanth
 
Dice live training program
Dice live training programDice live training program
Dice live training programAli Raza Anjum
 
Pinkle makhijani supermarket billing system vb project
Pinkle makhijani supermarket billing system vb projectPinkle makhijani supermarket billing system vb project
Pinkle makhijani supermarket billing system vb projectPinkleMakhijani
 
Self Paced Computer Based Training Media and Methods
Self Paced Computer Based Training Media and MethodsSelf Paced Computer Based Training Media and Methods
Self Paced Computer Based Training Media and MethodsFarnazSha2
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docxrtodd599
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docxrtodd599
 

Similar to Ethical Hacking Seminar (20)

Addressing the digital skills crisis
Addressing the digital skills crisisAddressing the digital skills crisis
Addressing the digital skills crisis
 
Acadgild learning proposal
Acadgild learning proposalAcadgild learning proposal
Acadgild learning proposal
 
Proposal for IT Security Team
Proposal for IT Security TeamProposal for IT Security Team
Proposal for IT Security Team
 
Introduction-to-Cybersecurity-Apponix.pptx
Introduction-to-Cybersecurity-Apponix.pptxIntroduction-to-Cybersecurity-Apponix.pptx
Introduction-to-Cybersecurity-Apponix.pptx
 
Curriculum Vitae_Aye Aye Maung Final
Curriculum Vitae_Aye Aye Maung FinalCurriculum Vitae_Aye Aye Maung Final
Curriculum Vitae_Aye Aye Maung Final
 
Internship in-chennai-for-eie-in-ethical-hacking
Internship in-chennai-for-eie-in-ethical-hackingInternship in-chennai-for-eie-in-ethical-hacking
Internship in-chennai-for-eie-in-ethical-hacking
 
142.8 Digital and Tech solutions PRF3
142.8 Digital and Tech solutions PRF3142.8 Digital and Tech solutions PRF3
142.8 Digital and Tech solutions PRF3
 
Information Technology Program: JCU Singapore
Information Technology Program: JCU SingaporeInformation Technology Program: JCU Singapore
Information Technology Program: JCU Singapore
 
Internship in-chennai-for-eie-in-ccna
Internship in-chennai-for-eie-in-ccnaInternship in-chennai-for-eie-in-ccna
Internship in-chennai-for-eie-in-ccna
 
Cybersecurity Courses, Tools and Tactics.pdf
Cybersecurity Courses, Tools and Tactics.pdfCybersecurity Courses, Tools and Tactics.pdf
Cybersecurity Courses, Tools and Tactics.pdf
 
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
 
Internship in-chennai-for-mca-windows-application
Internship in-chennai-for-mca-windows-applicationInternship in-chennai-for-mca-windows-application
Internship in-chennai-for-mca-windows-application
 
NUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information SessionNUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information Session
 
Internship in-chennai-for-eee-in-website-designing
Internship in-chennai-for-eee-in-website-designingInternship in-chennai-for-eee-in-website-designing
Internship in-chennai-for-eee-in-website-designing
 
Internship in-chennai-for-eee-in-ccna
Internship in-chennai-for-eee-in-ccnaInternship in-chennai-for-eee-in-ccna
Internship in-chennai-for-eee-in-ccna
 
Dice live training program
Dice live training programDice live training program
Dice live training program
 
Pinkle makhijani supermarket billing system vb project
Pinkle makhijani supermarket billing system vb projectPinkle makhijani supermarket billing system vb project
Pinkle makhijani supermarket billing system vb project
 
Self Paced Computer Based Training Media and Methods
Self Paced Computer Based Training Media and MethodsSelf Paced Computer Based Training Media and Methods
Self Paced Computer Based Training Media and Methods
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Ethical Hacking Seminar

  • 2. 1.1 Time Duration 4Hrs. Demonstrations to students 2.1 Authorized Certificate for each participant of seminar. 2.2 Goodies will be distributed during seminar. 3.1 T-shirts or Hoddie will we given to coordinating team with our company logo and your institute logo. 3.2 Certificate of Coordination will be given after successful conduction of the seminar to coordinators. 4.1 We search for shining techno minds. May be they are sitting in your college, i.e. Such minds with strong skills set will be considered for our internship program, under the impact of our expert’s team. 4.2 We are Team Worker; we work in collaboration. Interns can also expect a funded research project, depending upon the quality and market reputation for output of that project. www.kryptora.com 2
  • 3. 5.1 Posters/or Banners/or Pamphlets will be provided or college can design for promotional purpose. This can be done on the basis of Communication between both Parties. Therefore, Payment will be made accordingly. 6.1 Sponsorship will be given to college, for conducting the seminar as a part of acknowledgement of using college Infrastructural facilities. 6.2 College name will be published on our website as a part of marketing on Social Media. 7.1 Learn/practice about Information Security latest techniques and countermeasures directly from experienced certified professionals from EC Council, USA and Cyber Law certified. 7.2 Learn & Interact with Information Security Expert. 7.3 Receive unparalleled hands-on education training on the art of Information security with personal one-on-one attention during hands-on session each day of seminar. 7.4 10% Theory and 90% total live demonstrations by our trainers on latest Information Security Techniques & Tools. 7.5 Discussing cybercrime case studies. 7.6 Future assistance to every student regarding any query of seminar demonstrations or any other technical assistance. www.kryptora.com 3
  • 4. 7.7 Special Discount to every participant for a. Class room training (25 days) b. Advanced level workshops and boot camp conducted by us. We want following assistance from college to conduct seminar in smooth flow:- 8.1 Technical Infrastructure Facilities a. A Seminar hall/or Auditorium /or Lab having an enough capacity to accommodate all participants comfortably and voice should not echo there. b. A Projector setup with stereo jack cord and audio public address system; with proper visibility for every student who all are accommodated. If student’s no. is more and projector view is demised than there is requirement of another projector accordingly so, as to give proper visibility to rest students. c. An Internet Connection (min. 1MPBS speed) for the resource person (Without proxy if possible). d. Two Wireless Microphones (Collar Mic. Preferred for speaker). e. Internet Connection for every student during Practice session. f. Laptops are recommended for students for practice, Charging point in Hall for every student’s laptop and if it’s a Computer Lab, students should be allotted systems to practice on them (Managed accordingly to the situation) g. P roper Electricity, during the seminar. www.kryptora.com 4
  • 5. 8.2.1 Accommodation to our visiting team members in your college guest house or any other good place. (Min. 1 or 2 member and rest acc. to the conversation b/w both parties and no. of students) 8.2.2 Pick and drop facility from nearest railway station/ bus-stand/ or airport. 8.3 Publicity & Logistics Support 8.3.1 Soft copy of student’s database with name, contact no., email, branch/stream and year should be given to us. 8.3.2 Min. strength of 80 students required to conduct seminar successfully. 8.3.3 Specially designed seminar posters (provided by us) to be dispatched to engineering colleges across the region of your institute along with the festival posters and to be put up in the campus. As per seminar, marketing point. 8.3.4 Three to four specially appointed coordinators (Student and Faculty) having the knowledge of the subject, to promote, publicize, handle local student queries etc. for our seminar to be conducted at the college. 8.3.5 Support to our team to interact with college students to provide them proper awareness regarding the seminar program and to increase the participation. www.kryptora.com 5
  • 6. Introduction to Information SecurityModule 1: Module 3: Module 2: Module 4: Module 5: Module 6: Module 7: Module 8:Call Masking Social Engineering (FB hacking etc) Hacking Humans Mind SQL Injection (Basic)System Security Bypass Google Dorking Brute Introduction Python www.kryptora.com 6
  • 7. Rs. 200/participant (inclusive of all taxes) - Software / Tutorial toolkit per participant (as mentioned in Clause 2) - Goodies worth 1500+ will be distributed during seminar - Special Discount to every participant for Class room training or any other advanced level workshops / bootcamp conducted by us and offer for internship program accordingly. The amount shall be paid as under:- - Appropriate Amount to be handed over to team on the first day of the seminar a. Mode of Payment can be Cheque /Demand Draft/Cash b. Proper Invoice will be provided. c. Appropriate Sponsorship Amount to be handed over to the College on the first day of the seminar www.kryptora.com 7
  • 8. We ensure that you will find our seminar program extremely beneficial for your students. Such type of 3 days program not only give exposure to student regarding Information Security but It will make them learn, creating awareness for daily life and add-on in their Curriculum Vitae. If students want to make career in Information Security, our seminar and training are very helpful for such international certification like C|EHTM , E|CSATM, CISSP, OSCP etc.. As such types of topics are not part of our standard study curriculum, so it is a high booster for every participant. As per the report, “The number of trained Information Security Professionals in India only accounts to 556 compared to 1.25 lakh in China and 91,080 in the U.S “ *(Link is provided at the bottom of this page, for the reference check).If you are looking as career perspective so, Information security is having very good opportunities for people who choose this domain. If you have any queries kindly get back to us. We are looking forward to a quick and positive response from you and a long term association with your esteemed organization. This is a general Proposal; rest all other specific details with name/seal/sign. will be mentioned in Memorandum of Understanding (MOU) which will be signed b/w parties. www.kryptora.com 8
  • 9. Thanks & Regards, Kryptora InfoTech Pvt. Ltd. If you have any queries, kindly contact us on: +91-8210109116 Or directly contact us: +91 -7503897545, +91-9149104872 Contact Person: Mr. Rakesh Sharma Email: info@krypsec.com, Contact@kryptora.com www.kryptora.com 9
  • 10. Information Cyber Security, awareness and knowledge is very important for every computer user. Information Cyber Security career is very bright. The number of trained Information Security Professionals in India only accounts to 556 compared to 1.25 lakh in China and 91,080 in the U.S. India require no. of cyber security professionals. Students will have an add-on into their resume/cv; they have more than introductory knowledge of Networking, Database, website etc. no matter from which branch they belong or what profession they go for. If they use computer, definitely it will be a great exposure. Not only as a career, students can safeguard themselves from being trapped in to hands of offensive minds. eg. Martial Arts are a science of Self Defense not attacking others. Our trainers, who are coming for seminar program, are certified professionals and highly experienced for Bootcamp training delivery (Rest read in Clause 10). No prerequisites required from student side except interest. Student of any branch can go for this Seminar. Students are highly benefited by training quality and advantages as… (Refer to clause 2 and 7). Because of our quality training and quality business with every institute, we recommend ourselves. (Infra etc... support required from Coll. Side: ref. clause 8) www.kryptora.com 10
  • 11. Contact Us Corporate Office: E-48, Ground Floor, Sector 3 Noida, UP Pin Code: 201301 Contact Details: +91-7503897545, +91- 9149104872