Ethical hacking is a term used to describe hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass way past the system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the organization to improve the system security, in an effort to minimize or eliminate, any potential attacks. This workshop provides an opportunity for the students to understand the complete terms of ethical hacking and keep themselves secure in the cyber world.
BENEFITS OF WORKSHOP
Authorized Certification to all participants
Chance to represent college in National Level Competition
Assistance to students by Industry Experts
Receive an unparalleled education with personal one-
Learn all the Basics in Information Security & Ethical Hacking with ease
Learn about Cloud Computer and setting up one.
Know about Viruses, Trojans & Spywares in depth
Get to learn Android Hacking techniques and Security Measures
Kits and study materials designed by Professionals
Assistance in projects from Technoledge team
Details about Hacker
Who is a Hacker?
Why People Hack?
What people Hack?
What is information?
How much worth my Information is?
Types of Hackers
Approach of a Hacker
Steps in Hacking
Basics of Internet, Networking & Hacking
What is a Network?
Types of network – LANs, WANs & WLANs
What is Internet?
History of the Internet
About domain name
Details about browser
What is a port?
Protecting your Information
Attack of Hackers
Network scanning & its tools
Working of Google
Google Hacking (Demo)
Accessing Public Cameras
Basic hacks (Demo)
Desktop/PC Security, Antivirus & IDS
Viruses and it’s types
Which Antivirus is best?
Firewall and it’s uses
Trojan & Spywares
Fundamentals of Web Security
How the web really works
Rattling the Locks
Looking through Tinted Windows – SSL
Having someone else do it for you – Proxies
Top Ten Most Critical Web Application Vulnerabilities
Security Guidelines for Building Secure Web Applications
HTML Basics – A brief introduction
Viewing HTML at its Source
Proxy methods for Web Application Manipulation
Spam, Phishing and fraudulence
Smart Phone Security
Dos & Dont’s for Mobile Phones
Wifi and its Usage
Working of a Wifi
Protection from Wifi attacks
Passwords and Security
History of Passwords
Types of Passwords
Strings of Characters
Strings of Characters plus a token
Builing a strong password
Password Cracking/ Recovery
Security in Social Media
Types of Social Media
Attacks on Social Media
Social Engineering Attacks
Laws against Cyber Abuse
How to avoid cyber abuse
Tutorials User Manual
1x Text Book
REQUIREMENTS FROM THE COLLEGE
6. Internet Connection for Laptop (Without Proxy if possible)
o School students from IXth class onwards.
o Education Faculty & Staff in school.
o Students who want to pursue Computer Science as their career
o Students with innovative aptitude of becoming an industry Hacker
o Students who want to participate in International Hacking Championships
Communicate mobile device security threats and the risks.
Describe mobile applications and device Security functions.
Perform attacks against sample mobile apps to understand the weaknesses that exist in the current device security models.
Test and discover vulnerabilities present in mobile devices, applications, servers and the networks.
Ensure trusted interactions at the application, device and network levels.
Learn about user authentication, data security.
Guidance from Industry experts about scope in Hacking and Programming
© copyright 2014-
Follow us on
|Automobile Design and I.C. Engine|
|Automobile & I.C. Engine|
|Hand Gesture Robotics|
|Embedded System with ARM|
|Android App Dev|
|Internet Of Things (I.O.T.)|
|Computational Fluid Dynamics|
|Automotive Vehicle Assembly|
|Android App Development|
|Seven Wonders of robotics|
|Microsoft & Cisco|