Transcript
Page 1: Ethical hacking workshop (One day)

1 http://www.securitylearn.net

Overview:

IDC (Global market intelligence firm) predicts requirement of 1,88,000 security professionals by

the year 2012. Currently the number of security professionals in India is around 22,000.

This workshop covers a wide range of security aspects ranging from basics of security to breaking

the networks. The main objective of the workshop is to teach about how to protect yourself from

the menace of hacking and to educate the student about the career opportunities in Information

Security world. This workshop will give a complete understanding of the popular information

security attacks and explains the techniques to counter them.

Duration: One day event – 6 hours

Benefits: Participation certificate for the students

Constant touch with the trainer for career guidance and doubts clarification

Ethical Hacking & Information Security Workshop

Page 2: Ethical hacking workshop (One day)

2 http://www.securitylearn.net

Content:

Introduction to Hacking & Ethical Hacking

Overview of hacking

Hacking Terminology

Types of hackers

System hacking Windows password algorithms

Breaking windows password

Key loggers

Real world case studies

Tools & Demos

Countermeasures

Network Hacking Enumerating networks

Buffer over flows Taking control on remote systems

Real world case studies

Introduction to secure code development practices

Tools & Demos

Countermeasures Web Application hacking

Web application architectures

Life cycle of web applications

Man in the middle attacks

SQL Injection

Social Engineering attacks

Phishing attacks

Tools & Demos

Countermeasures

Email hacking Hub vs switch networks

ARP Spoofing

Stealing Email passwords

Countermeasures

Career Guidance

Page 3: Ethical hacking workshop (One day)

3 http://www.securitylearn.net

Presenter’s profile:

Satish B:

Information Security Professional with 6 years of experience in Penetration testing of web

applications and mobile applications. He has reported vulnerabilities in Facebook, LinkedIn and

Microsoft bing services. Presented papers in international conferences.

Chaitanya K:

Information Security Professional with 5 years of experience in Penetration testing of web

applications and mobile applications.

Contact

Satish B

Email: [email protected]

[email protected]


Recommended