What We Do
UNIVERSITY COLLABORATION
1. Assisting M.Sc( Cyber Security) and B.Tech courses in Cyber security, Data Science, AI/ML/DL
2. Setting up of Incubation center
3. Setting up of Cyber security and Forensics labs
4. Assistance for NBA and NAAC
5. Project proposals for UGC/AICTE/Central Government agencies
OUR WORKSHOP CONTENT DETAILS
Module 1: Cyber Security & Network Hacking
● Importance of Cyber Security
● Finding Domain & Sub Domains
● Advance Google Search
● Footprinting the target
● Automating footprinting using tools
● Introduction to Network Hacking
● Port Scanning
● Vulnerability Scanning
Module 2 : Sniffing Atacks & System Hacking
● Introduction to Sniffing/Spoofing attacks
● Passive Spoofing Attack
● Active Spoofing Attack
● Introduction to Cryptography
● Introduction to System Hacking
● Password Cracking
● Malware & it’s Types
● Introduction to Metasploit
Module 3: Web Application Hacking & Injection Atacks
● Introduction to Web Application Hacking
● How to use Burpsuite
● Lab Setup
● XSS, CSRF
● OWASP Top – 10, 2017
● SQL Injection
● HTMLI, XMLI, Code Injection,
● Command Injection
● File Uploading, URL Redirection,
● Path Traversal
Module 4: Cryptography
● Introduction to Cryptography
● Cryptography concepts
● Cryptography Encryption
● Encryption Algorithms/ Ciphers / Types of Ciphers (Theory + Practical Example)
● Comparison of cryptographic Algorithms
● Public key infrstructure and types of certificates
● Types of Ciphers
● Encryption Standards and Methods
Module 5: Digital Forensics
● Mobile Forensics
● ADB & Drozer
● Analyzing Extracted Data
● Recovering Deleted Data
Module 6: Social Engineering
● Social Engineering
● Cyber Laws
● Compliances
● Social Engineering Terminologies
● Information Gathering
● Social Engineering Attacks
● Phishing
● Protecting against social engineering
Module 7: Cloud security
● Introduction to Cloud
● Penetration testing
● Cloud Penetration Testing
● Limitations
● Tradition pentesting
● Introduction to SIEM
● Threats in cloud computing & tools
● Cloud computing services(AWS, Azure, etc.)
● Cloud Penetration Testing
● Cloud security counter measures.
Module 8: IoT & oT Security
● Basics of IoT & oT Device
● IoT & oT threats and attacks
● IoT & oT Hacking tools
● IoT & oT Penetration Testing
● IoT & oT security solutions
● IoT Devices
● IoT & oT security solutions
● IoT & oT counter measures.
Module 9: Python Programming
● Basics of Python
● Python statements
● Python Libraries
● Python loops
● File handling
● Python variables
● Python modules
● Methods and Functions
Module 10: Mobile Penetration Testing
● Introduction to Mobile Pentesting
● Lab Setup
● Android Fundamentals
● ADB/Drozer
● Mobsf
● Static/ dynamic analysis of android apks
● Analyzing android apks
● Android Pentesting
● Analyzing android apks
Module 11:Artificial Intelligence, Machine Learning, Deep Learning
● Introduction to AI, ML & DL
● Fundamentals of AI, ML, DL
● Evolution of AI, ML,DL
● Characteristics of AI-powered attacks
● Ethical considerations related to AI in cybersecurity
● Neural Networks
● CYBERSECURITY FOR ARTIFICIAL INTELLIGENCE
● AI/ML/DL Use cases
OUR WORKSHOP CONTENT DETAILS
Module 1: Cyber
Security & Network Hacking
● Importance of Cyber Security
● Finding Domain
& Sub Domains
● Advance Google
Search
● Footprinting the target
● Automating footprinting using tools
● Introduction to Network Hacking
● Port Scanning
● Vulnerability Scanning
Module 2 : Sniffing Atacks &
System Hacking
● Introduction to Sniffing/Spoofing attacks
● Passive Spoofing
Attack
● Active Spoofing Attack
● Introduction to Cryptography
● Introduction to System Hacking
● Password Cracking
● Malware &
it’s Types
● Introduction to Metasploit
Module 3: Web Application Hacking
& Injection Atacks
● Introduction to Web Application Hacking
● How to use Burpsuite
● Lab Setup
● XSS, CSRF
● OWASP Top
– 10, 2017
● SQL Injection
● HTMLI, XMLI, Code Injection,
● Command Injection
● File Uploading, URL Redirection,
● Path Traversal
Module 4: Cryptography
● Introduction to Cryptography
● Cryptography concepts
● Cryptography Encryption
● Encryption
Algorithms/ Ciphers / Types of Ciphers (Theory + Practical Example)
● Comparison of cryptographic Algorithms
● Public key infrstructure and types of
certificates
● Types of Ciphers
● Encryption Standards and Methods
Module 5: Digital Forensics
● Mobile Forensics
● ADB &
Drozer
● Analyzing Extracted Data
● Recovering Deleted
Data
Module 6: Social
Engineering
● Social
Engineering
● Cyber Laws
● Compliances
● Social Engineering Terminologies
● Information Gathering
● Social Engineering Attacks
● Phishing
● Protecting against
social engineering
Module 7: Cloud
security
● Introduction to Cloud
● Penetration testing
● Cloud Penetration Testing
● Limitations
● Tradition pentesting
● Introduction to SIEM
● Threats in cloud computing & tools
● Cloud computing services(AWS, Azure, etc.)
● Cloud Penetration Testing
● Cloud security counter measures.
Module 8: IoT &
oT Security
● Basics of IoT & oT Device
● IoT &
oT threats and attacks
● IoT &
oT Hacking tools
● IoT &
oT Penetration Testing
● IoT & oT security solutions
● IoT Devices
● IoT & oT security solutions
● IoT &
oT counter measures.
Module 9: Python
Programming
● Basics of Python
● Python statements
● Python Libraries
● Python loops
● File handling
● Python variables
● Python modules
● Methods and Functions
Module 10: Mobile
Penetration Testing
● Introduction to Mobile Pentesting
● Lab Setup
● Android Fundamentals
● ADB/Drozer
● Mobsf
● Static/ dynamic analysis of android
apks
● Analyzing android apks
● Android Pentesting
● Analyzing android apks
Module 11:Artificial Intelligence, Machine Learning, Deep
Learning
● Introduction to AI, ML & DL
● Fundamentals of AI, ML,
DL
● Evolution of AI, ML,DL
● Characteristics of AI-powered attacks
● Ethical considerations related to AI in cybersecurity
● Neural Networks
● CYBERSECURITY FOR ARTIFICIAL INTELLIGENCE
● AI/ML/DL Use
cases