PAS3CYBERLABS  LLP

Data analysis experts train you through online classes ( March 4-30,2024)    Register for Research Data Analysis using SPSS Online ClassesDaily 7 PM  to 8.30 PM( 4 Days a week) 

PAS3CYBERLABS  LLP

Data analysis experts train you through online classes ( March 4-30,2024)    Register for Research Data Analysis using SPSS Online ClassesDaily 7 PM  to 8.30 PM( 4 Days a week) 

Computer Security & Digital Forensics

5 Days Workshop Content Details


 Module 1: Cryptography

●       Introduction to Cryptography
●       Cryptography concepts
●       Cryptography concepts
●       Encryption Algorithms/ Ciphers / Types of Ciphers/ Steganography (Theory + Practical Example)
●       Encryption Algorithms/ Ciphers / Types of Ciphers (Theory + Practical Example)
●       Comparison of cryptographic Algorithms – list of known attacks
●       Cryptography tools (Theory + Practical Example)
●       Public Key Infrastructure
●       Certification Authorities
●       Signed Certificate vs Self Signed Certificate (Theory + Live example)
●       Email encryption, Email encryption tools
●       Digital Signature
●       SSL -TLS (Theory + Practical)
●       Cryptography toolkits (Practical)
●       Pretty Good Privacy, GNU Privacy, Web of trust (WOT) (Theory)
●       Disk Encryption and Disk encryption tools (Theory + Practical)
●       Cryptanalysis – Cryptanalysis tools (Theory + Practical)
●       Cryptography attacks – Brute force attack (Theory + Practical)
●       Birthday Attack, Meet in the Middle attack on Digital Signature schemes (Theory + Practical)
●       Side channel attack, Hash Collision, Drown Attack (cross protocol weakness) (Theory + Practical)
●       How to defend against cryptographic attacks
●       Brief on the topics covered
 
Module 2: VAPT
●       Introduction to Web applications
●       OWASP top 10
●       Information Gathering and Scanning
●       Lab setup
●       Understanding web application architecture
●       Burp Suite
●       SQL Injection attacks
●       HTML Injection attacks
●       XSS
●       CSRF attacks
●       SSRF
●       Security Misconfigurations
●       Attacking CMS Sites
●       Manual Attacking Techniques
●       Reporting
 
Module 3: Digital Forensics
●       Introduction to Digital Forensics
●       Branches of Digital Forensics
●       Collecting Digital Evidence (Practical’s)
●       File Analysis (Practical’s)
●       Photo And Video Analysis (Practical’s)
●       Windows Forensics (Theory & Practical’s)
●       Introduction to Mobile Forensics
●       Interaction with Device (Practical’s)
●       Collecting Artefacts from Android Mobile Devices
●       Introduction to Network Forensics
●       Collecting Network Artefacts (Practical’s)
●       Analysing Network Artefacts
●       Introduction to Email Forensics
 


 

 

Dr AM Sudhakara