Cyber Security & Ethical Hacking – Mobile & Windows Case Study

Cyber Security & Ethical Hacking – Mobile & Windows Case Study

Total Seat: 200 (183 Left)
Add Calendar

Date and Time:

December 26, 2021 6:30 pm - December 30, 2021 - 6:30 pm

Event Location:

,

Share This Event:

Description

Days
Hours
Minutes
Seconds
Oops you have missed the event

CYBER SECURITY – WINDOWS & MOBILE SECURITY. 

Faculties and students across the globe are invited to this event. The vision of this event is to have a high-level idea of the most recent Cyber security with its applications. The sessions are handled by industry experts, Participation certificates will be provided to the faculties and students on successful completion of the event

 

what will you learn !!

Day 1

1. Introduction to Security

Information Security, Cyber Security, and Cybercrime

Definition

Differences between them

Importance of cybercrime in day-to-day life

Trinity of IT Sec – CIA

Hacking

Introduction – hacking and hackers

Types of hackers

Hacking methodologies

What Is not hacking

OSI Layers

Introduction

OSI Layers – Detailed explanation

Protocols

What are protocols

Usage and importance of protocols

Protocols in each OSI Layer

Types of Attacks and Malware

Attacks: Introduction, followed by

Denial of Service (DOS) and Distributed Denial of Service (DDoS)

Man in the Middle Attack (MitM)

Bots and Botnets

Phishing

Drive-by Downloads

Brute Force/ Password Attacks

SQL Injection

Cross-site Scripting (XSS)

Information Gathering

Footprinting

Scanning

Malware: Introduction, followed by

Virus and worms

Trojans

Adware and Spyware

Backdoor and Info stealer

Rootkits

Ransomware

Anonymizers, Proxies, VPN, Tor and Dark web

Anonymizers

Proxies

VPN

Tor

Darkweb

Day 2

Network Sniffing and DOS

Introduction – Definition, Importance, Usage

Wireshark – Network Sniffer

Packet Capturing

4.3.1 Password capture by Packet capturing

Burp Suite

DOS

Defense Mechanisms

Introduction

Antivirus

Encryption

Firewall

Biometrics

Factor authentication methods

Honeypots and DMZs

Security for Wireless Devices

Password Management

Internet Security

Internet Privacy, Anonymity, etc.

Identity/Identification Strategies

How can we be tracked online?

Places you are tracked

How do cookies play an important role in user tracking?

Incognito mode

Other methods to hide your internet activity

Email Security

Email Basics, Ports, and Protocols

Tracking Sent Emails

Detection of Email tracking

Major attacks through Email (Phishing and Scams)

Day 3

Backup and Storage Security

Importance of Data Storage and Backup

Storage Methods

Protection of data using Passwords and their risks

Encryption of data

Encrypting in Win10 using BitLocker

Encrypting in iOS using FileVault

Attacks against Encryption

Mobile Security

Introduction

Android vs Apple devices

Tips to identify Legit/Scam Apps

Understanding App Permissions (Android vs Apple)

Checking App Permissions (Android vs Apple)

Some Mobile Threats – Trojans, Ransomware, Virus, Spyware, etc.

Symptoms that your mobile has been compromised

Sec Apps for mobile Devices

Win 10 Security

Features

Patches and Updates

Privacy Checks

Turning off Ad Tracker

Turning off Location Tracker

  • Turning of Peer system downloads

Restricting Data collection by Cortana

Hardening

Randomizing MAC Address

Enabling Defender SmartScreen

Conclusion

General Cyber Security Policies

Myths about Online Security

Mitigation steps to be taken for personal security in the web

Careers in Cyber Security

Sorry, Event Expired
Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
  • Attributes
  • Custom attributes
  • Custom fields
Compare
Wishlist 0
Open wishlist page Continue shopping

Field is required!
Field is required!
Field is required!

I am a

Field is required!
Field is required!
  • - select a option -
  • CSE
  • IT
  • ECE
  • Mech
  • Civil
  • EEE
  • E&I
  • Others
Field is required!
  • - select a option -
  • 1st Year
  • 2nd Year
  • 3rd Year
  • 4th Year
  • OTHERS
Field is required!
Field is required!

Field is required!
Field is required!
Field is required!

I am a

Field is required!
Field is required!
  • - select a option -
  • CSE
  • IT
  • ECE
  • Mech
  • Civil
  • EEE
  • E&I
  • Others
Field is required!
  • - select a option -
  • 1st Year
  • 2nd Year
  • 3rd Year
  • 4th Year
  • OTHERS
Field is required!
Field is required!