COMPUTER SCIENCE AND ENGINEERING ASSOCIATION - GCT

ONE DAY HANDS ON WORKSHOP ON
ETHICAL HACKING

on 28th Feb 2020

Register Now

About the Workshop

Ethical Hacking hacking is the ability to suggest proper security tools that can avoid attacks on networks. Today's IT industry is in much demand for a passionate Ethical Hacker! Wish to learn more and become an ethical hacker? Then, this workshop is for you. Join us to explore it with one of the International Speakers of Ethical Hacking.

Where

MBA MCA Counselling Hall,
Government College of Technology,
Coimbatore-13
09:15 AM to 4:45 PM

Fees

Rs 400
(with Lunch,Kit and Refreshments)


Speaker Details

Workshop on Ethical Hacking

Speaker 1

Mr. SANKARRAJ SUBRAMANIAN

A renowned international speaker, cyber security consultant & certified ethical hacker (CEH) with 15 years of experience in this field. He has visited around 45 countries and delivered much international training. He was also involved in solving critical cyber crime issues for various government law enforcement agencies including ATM frauds, malware analysis, and network forensics & web security architecture.

GOVERNMENT AFFILIATIONS

Consultant - Tamil Nadu Police Department
Consultant - Coimbatore Cyber Crime Department
Executive Director - State Public Grievances Council
Convenor - District Political Affairs Committee


Workshop Schedule
Certified Ethical Hacking

We got you the most elaborated workshop schedule.

Seminar and Hands-on

Registration

Please bring your College/Organisation ID

Overview of Cyber Law and Crimes Key Note

Key issues plaguing the information security world, incident management process, and pene- tration testing.
Various types of foot printing, foot printing tools, competitive intelligence gatheringand coun- termeasures.
Network scanning techniques and scanning countermeasures.
Enumeration techniques and enumeration countermeasures.

System Hacking

Windows OS Secuity. Hacking Into System By Changing Passwords & Getting Access To Sys- tem By Elevating Privileges and to bypass The Windows Security.
Operating System Attacks, Misconfiguration Attacks, Application-Level Attacks, Examples of Application-Level Attacks, Shrink Wrap Code Attacks.
Different types of Trojans, Trojan analysis, and Trojan countermeasures.
Working of viruses, virus analysis, computer worms, malware analysis procedure, and coun- termeasures.
Virus creation in computer using Batch file programing, HTML & VB Script.

Break

Refreshments will be provided

Network Hacking

Virus creation in computer using Batch file programing, HTML & VB Script.
Packet sniffing techniques and how to defend against sniffing.
Social Engineering techniques, identify theft, and social engineering countermeasures.
DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit.
The cross-site scripting (XSS) vulnerabilityto exploit client side web application vulnerability.

Webserver Attacks

Directory Traversal Attacks, HTTP Response Splitting Attack, Web Cache Poisoning Attack ,HTTP Response Hijacking, SSH Bruteforce Attack, Webserver Password Cracking, Web Application Attacks.
Session hijacking techniques and countermeasures.
Different types of web server attacks, attack methodology, and countermeasures.

Lunch

Website Hacking

Different types of web application attacks, web application hacking methodology, and coun- termeasures.
SQL injection attacks and injection detection tools.
Performing MAC, DHCP & Spoofing attacks. Poisoning using ARP and DNS.

Wireless Hacking

Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools.
Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vul- nerabilities, mobile security guidelines, and tools.
Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures.
Various cloud computing concepts, threats, attacks, and security techniques and tools.

Break

Refreshments will be provided

Cryptography and Web Application Hacking

Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography at- tacks, and cryptanalysis tools.
Hacking Web Applications - Web Attack Vectors, Command Injection Attacks, File Injection Attack, Hidden Field Manipulation Attack, Stealing Users' Cookies, Cookie/Session Poisoning, Broken Authentication and Session Management.
Monitoring Keyloggers -Spytech SpyAgent, All In One Keylogger, Keyloggers for Windows, Amac Keylogger for Mac, Hardware Keyloggers.

Spyware Usage and Testing

Spyware usage - Desktop Spyware, Activity Monitor, Email and Internet Spyware, Power Spy, Internet and Email Spyware, Child Monitoring Spyware, Net Nanny Home Suite, Screen Capturing Spyware, USB Spyware, Audio Spyware, Video Spyware, Print Spyware.
Various types of penetration testing, security audit, vulnerability assessment, and penetra- tion testing roadmap.

Closing Remarks and Discussion

Venue

Workshop venue location info

MBA/MCA Counselling Hall

Government College of Technology
Thadagam Road
Coimbatore-13

Sponsors

Files Sponser :

F.A.Q

Contact Us

Feel free to contact us in case of queries

Phone Number

Thirumalai

82207 55820

Phone Number

Sadheesh

96594 70284