Course ContentDuration: 2 Days (14-16 HRS)Eligibility: Can be joined by B.TECH, B.E, GRADUATE, POST GRADUATE, COLLEGE STUDENTS, SCHOOL STUDENTS and who all are interested in this domain and want to explore the latest Technologies. Cyber Ninjas: Master the Art of Ethical Hacking Session 1: Introduction to Ethical Hacking & Cyber Security ● Overview of ethical hacking● Understanding the role of cybersecurity in protecting individuals and organizations● Different types of hackers● Scope and limitations of ethical hackingSession 2: Footprinting and Reconnaissance ● Information gathering techniques● Understanding OSINT● WHOIS lookup● Social engineering for reconnaissance● Hands-on exercises and demonstrationsSession 3: Scanning and Enumeration ● Network scanning techniques● TCP & UDP Scanning Background● Port scanning● Service enumeration● Vulnerability Identification with NmapSession 4: Mobile Application Analysis ● Root detection and SSL pinning concepts● Bypass root detection and ssl pinning in mobile apps● Static analysis of android apps● Android app dynamic analysis and attacks using burpsuiteSession 5: Vulnerability Assessment ● Importance of vulnerability assessment● Tools for vulnerability scanning● Common vulnerabilities and exposures (CVEs)● Hands-On Exercise: Conducting a basic network scan and vulnerability assessmentSession 6: Exploitation and post-exploitation ● Malware & Exploits● Metasploit framework● Privilege escalation Techniques (Windows & Linux)● Post-exploitation techniques● Pivoting conceptDay 2: Advanced Penetration Testing Techniques Session 7: Web application attacks ● Burpsuite configuration and basics of web request and response● Intro to web app bug bounty● Offensive web application attacks● SQL injection● File upload vulnerabilities● Web app business logic bypas● Authentication attacks● broken access controls in web apps● HTML injection and Cross site scripting● phishing user data via vulnerable web apps● OWASP Top 10 vulnerabilities● CSRF, XSS and SSRF● Authentication & Access Control Vulnerabilities● Hands-On Exercise: Exploiting a vulnerable web applicationSession 8: Mobile Application Security ● Connecting Mobile Device to Burp Proxy● Common mobile app vulnerabilities● Basics of SSL Pinning● Reverse engineering mobile apps● Securing mobile applications● Hands-On Exercise: Assessing the security of a mobile applicationSession 9: Wireless Network Security ● Types of wireless networks● Wi-Fi encryption protocols● Wireless security threats● Hands-On Exercise: Wireless network attacksSession 10: CTF (Capture the Flag) Challenges for Students. ● Intro to CTF challenges and live CTF solving session● Live demonstrations and hands-on exercises with CTF Labs● CTF Lab setup● CTF challenges for student batchesSession 11: Cybersecurity Best Practices ● Intro to SIEM and incident response● Legal aspects of ethical hacking● Continuous monitoring and improvement● Building a career in ethical hacking● Hands-On Exercise: Building a basic incident response planAdditionally, topics like iOT hacking concepts, Software Defined Radio (SDR), etc., will be discussed with students. The workshop will be interactive and include practical exercises, demonstrations, and hands-on labs to engage the students and provide them with real-world experiences in ethical hacking and cybersecurity along with career guidance.CertificationAll participants will receive a globally recognized hardcopy certificate after the workshop.Eligibility:Open to AllB.Tech, B.E., M.B.B.S., BCA, MCA, MS, MD, B.Sc IT, M.Sc IT, Biomedical, Bio-Technology, BBA, MBA, B.A., hobbyists and more.Key Benefits:✔️ Hands-on workshop with real-world use cases✔️ Industry-driven curriculum✔️ Exposure to leading tech tools and AI applications✔️ Mentorship from domain experts✔️ Networking opportunities with professionals
Also check out other Workshops in Aurangabad, Business events in Aurangabad, Arts events in Aurangabad.