PAS3CYBERLABS  LLP   

PAS3CYBERLABS  LLP   

What We Do

UNIVERSITY COLLABORATION

1. Assisting  M.Sc( Cyber Security) and B.Tech courses in Cyber security, Data Science, AI/ML/DL
2. Setting up of Incubation center
3. Setting up of Cyber security and Forensics labs
4. Assistance for NBA and NAAC
5. Project proposals for UGC/AICTE/Central Government agencies

OUR WORKSHOP CONTENT DETAILS 

Module 1: Cyber Security & Network Hacking
●       Importance of Cyber Security
●       Finding Domain & Sub Domains
●       Advance Google Search
●       Footprinting the target
●       Automating footprinting using tools
●       Introduction to Network Hacking
●       Port Scanning
●       Vulnerability Scanning
 
Module 2 : Sniffing Atacks & System Hacking
●       Introduction to Sniffing/Spoofing attacks
●       Passive Spoofing Attack
●       Active Spoofing Attack
●       Introduction to Cryptography
●       Introduction to System Hacking
●       Password Cracking
●       Malware & it’s Types
●       Introduction to Metasploit
 
Module 3: Web Application Hacking & Injection Atacks
●       Introduction to Web Application Hacking
●       How to use Burpsuite
●       Lab Setup
●       XSS, CSRF
●       OWASP Top – 10, 2017
●       SQL Injection
●       HTMLI, XMLI, Code Injection,
●       Command Injection
●       File Uploading, URL Redirection,
●       Path Traversal
 
Module 4: Cryptography
●       Introduction to Cryptography
●       Cryptography concepts
●       Cryptography Encryption
●       Encryption Algorithms/ Ciphers / Types of Ciphers (Theory + Practical Example)
●       Comparison of cryptographic Algorithms
●       Public key infrstructure and types of certificates
●       Types of Ciphers
●       Encryption Standards and Methods
 
Module 5: Digital Forensics
●       Mobile Forensics
●       ADB & Drozer
●       Analyzing Extracted Data
●       Recovering Deleted Data
 
Module 6: Social Engineering
●       Social Engineering
●       Cyber Laws
●       Compliances
●       Social Engineering Terminologies
●       Information Gathering
●       Social Engineering Attacks
●       Phishing
●       Protecting against social engineering
 
Module 7: Cloud security
●       Introduction to Cloud
●       Penetration testing
●       Cloud Penetration Testing
●       Limitations
●       Tradition pentesting
●       Introduction to SIEM
●       Threats in cloud computing & tools
●       Cloud computing services(AWS, Azure, etc.)
●       Cloud Penetration Testing
●       Cloud security counter measures.
 
Module 8: IoT & oT Security
●       Basics of IoT & oT Device
●       IoT & oT threats and attacks
●       IoT & oT Hacking tools
●       IoT & oT Penetration Testing
●       IoT & oT security solutions
●       IoT Devices
●       IoT & oT security solutions
●       IoT & oT counter measures.
 
Module 9: Python Programming
●       Basics of Python
●       Python statements
●       Python Libraries
●       Python loops
●       File handling
●       Python variables
●       Python modules
●       Methods and Functions
 
Module 10: Mobile Penetration Testing
●       Introduction to Mobile Pentesting
●       Lab Setup
●       Android Fundamentals
●       ADB/Drozer
●       Mobsf
●       Static/ dynamic analysis of android apks
●       Analyzing android apks
●       Android Pentesting
●       Analyzing android apks
 
Module 11:Artificial Intelligence, Machine Learning, Deep Learning
●       Introduction to AI, ML & DL
●       Fundamentals of AI, ML, DL
●       Evolution of AI, ML,DL
●       Characteristics of AI-powered attacks
●       Ethical considerations related to AI in cybersecurity
●       Neural Networks
●       CYBERSECURITY FOR ARTIFICIAL INTELLIGENCE
●       AI/ML/DL Use cases
   

OUR WORKSHOP CONTENT DETAILS 

Module 1: Cyber Security & Network Hacking
●       Importance of Cyber Security
●       Finding Domain & Sub Domains
●       Advance Google Search
●       Footprinting the target
●       Automating footprinting using tools
●       Introduction to Network Hacking
●       Port Scanning
●       Vulnerability Scanning
 
Module 2 : Sniffing Atacks & System Hacking
●       Introduction to Sniffing/Spoofing attacks
●       Passive Spoofing Attack
●       Active Spoofing Attack
●       Introduction to Cryptography
●       Introduction to System Hacking
●       Password Cracking
●       Malware & it’s Types
●       Introduction to Metasploit
 
Module 3: Web Application Hacking & Injection Atacks
●       Introduction to Web Application Hacking
●       How to use Burpsuite
●       Lab Setup
●       XSS, CSRF
●       OWASP Top – 10, 2017
●       SQL Injection
●       HTMLI, XMLI, Code Injection,
●       Command Injection
●       File Uploading, URL Redirection,
●       Path Traversal
 
Module 4: Cryptography
●       Introduction to Cryptography
●       Cryptography concepts
●       Cryptography Encryption
●       Encryption Algorithms/ Ciphers / Types of Ciphers (Theory + Practical Example)
●       Comparison of cryptographic Algorithms
●       Public key infrstructure and types of certificates
●       Types of Ciphers
●       Encryption Standards and Methods
 
Module 5: Digital Forensics
●       Mobile Forensics
●       ADB & Drozer
●       Analyzing Extracted Data
●       Recovering Deleted Data
 
Module 6: Social Engineering
●       Social Engineering
●       Cyber Laws
●       Compliances
●       Social Engineering Terminologies
●       Information Gathering
●       Social Engineering Attacks
●       Phishing
●       Protecting against social engineering
 
Module 7: Cloud security
●       Introduction to Cloud
●       Penetration testing
●       Cloud Penetration Testing
●       Limitations
●       Tradition pentesting
●       Introduction to SIEM
●       Threats in cloud computing & tools
●       Cloud computing services(AWS, Azure, etc.)
●       Cloud Penetration Testing
●       Cloud security counter measures.
 
Module 8: IoT & oT Security
●       Basics of IoT & oT Device
●       IoT & oT threats and attacks
●       IoT & oT Hacking tools
●       IoT & oT Penetration Testing
●       IoT & oT security solutions
●       IoT Devices
●       IoT & oT security solutions
●       IoT & oT counter measures.
 
Module 9: Python Programming
●       Basics of Python
●       Python statements
●       Python Libraries
●       Python loops
●       File handling
●       Python variables
●       Python modules
●       Methods and Functions
 
Module 10: Mobile Penetration Testing
●       Introduction to Mobile Pentesting
●       Lab Setup
●       Android Fundamentals
●       ADB/Drozer
●       Mobsf
●       Static/ dynamic analysis of android apks
●       Analyzing android apks
●       Android Pentesting
●       Analyzing android apks
 
Module 11:Artificial Intelligence, Machine Learning, Deep Learning
●       Introduction to AI, ML & DL
●       Fundamentals of AI, ML, DL
●       Evolution of AI, ML,DL
●       Characteristics of AI-powered attacks
●       Ethical considerations related to AI in cybersecurity
●       Neural Networks
●       CYBERSECURITY FOR ARTIFICIAL INTELLIGENCE
●       AI/ML/DL Use cases
 

Photo by
Dr AM Sudhakara
X