Workshop (2 days, 12th & 13th Feb)
Join our dynamic workshop on Sniffing, Steganography, Cryptography, Basic Attacks, and Offensive Security! Delve into the intricacies of network sniffing, uncovering hidden messages through steganography, and mastering cryptographic techniques. Explore the fundamentals of basic attacks and offensive security strategies to fortify your digital defenses. Led by seasoned experts in cybersecurity, this workshop offers hands-on experience and invaluable insights into the world of information security. Whether you're a novice or a seasoned professional, expand your knowledge and sharpen your skills in this comprehensive training session. Don't miss out on this opportunity to enhance your understanding of cybersecurity essentials!
Faculty coordinator:
Ms.Jayalakshmi P-9894795761
Ms.Kavitha D-9445681974
Student coordinator
Roshan-9080526025
Dhanush-7823990075
Day1
10.30 am - 11 am: Introduction to Cyber Security
- Introduction to Steganography & Cryptography Types of Steganography & Cryptography
- Hands-on on Various Steganography & Cryptography Tools Extraction of Various Hidden Files/Information
- Text Encryption and Decryption
11 am - 12 pm: Networking
- Introduction to Networks
- Types of Networks
- Ports, NAT, IP Addresses, Proxies, VPNs
- OSI Layers, 3-Way Handshake
- HTTP Server Response Codes
- TCP, UDP | GET & POST Method
1 pm - 2 pm: Sniffing
- Introduction to Sniffing
- Types of Sniffing
- Practical Hands-on on Various Sniffing
- Techniques and Methodologies Capturing Passwords with Wireshark
2 pm - 3.30 pm: Stegnography & Cryptography
- Introduction to Steganography & CryptographyTypes of Steganography & Cryptography
- Hands-on on Various Steganography & Cryptography Tools Extraction of Various Hidden Files/Information
- Text Encryption and Decryption
Day 2
9 am - 10 am: Basic Attacks & Security
- Basic Phishing, Advanced Phishing
- IDN Homograph Attack
- IDN Homograph Text Analysis
- Fake Emails Header Analysis
- Social Engineering Techniques
10 am - 12 pm: Web application attacks
- Security Misconceptions
- Session Hijacking
- Parameter Tampering Attack
- OTP / 2 Factor Authentication Bypass
1 pm - 2 pm: Cyber laws, Malwares
- Malwares, Trojans , Virus
- Cyber Laws in India
- Online Security Precautions
- Conclusion – End of the Session
2 pm - 2.30 pm: Certificate Distribution
- Certificate of Supraja Technologies Certified Security Expert (Level 1)
- Doubts clearing session
- Vote of thanks