mangalore engineering college

News and Events

News

3 days National Level Workshop on Ethical Hacking and Cyber Security

Sep 21, 2017 - Sep 23, 2017

About Workshop

A 3 days National Level Workshop on Ethical Hacking and Cyber Security is organized by Department of Computer Engineering, P. A. College of Engineering, Mangalore in association with IBNC an initiative by I-Medita Learning Solutions Pvt. Ltd (An ISO 9001:2008 Certified Company). The main focus of workshops is on giving deep and inside knowledge about Information Security, Counter Measures for Google and Facebook Hacking, Networking Security, Android Hacking, Virus, Trojan, Email Hacking, Stenography, Cryptography, Firewall Security etc.

Workshop Venue: P. A. College of Engineering, Mangalore

Organized by: Department of Computer Engineering

Workshop Dates: 21st , 22nd and 23rd September 2017


Workshop Content & Topics to be covered:

Introduction to Ethical hacking

What is Information Security?

Problems faced by the Corporate World

Why Corporate needs Information Security? Who is a Hacker?

Type of Ethical Hackers

Classification of Hackers

Phases of Hacking

Basic Terminologies

Vulnerability Research


Networking and Basics

IP Address, Finding a Remote IP Address

Tracing an IP Address

MAC Addresses Spoofing


Google Hacking

Advisories and server vulnerabilities, finding Login Page, Hacking Live Webcam, Printer etc.


Facebook Hacking

Foot printing

What is foot printing?

Types of foot printing

Domain Information

NsLookup — its there when you need it

Search for People

Search for Company’s Information

Finding Internal URL of Website

Gather public information

Network Reconnaissance

Archive Pages

Mirroring of Websites


Scanning

Definition of Scanning

Types of Scanning

Difference between Port and Network Scanning

Network Scanning

Port Scanning

port scanning with Nmap

Daemon Banner Grabbing

OS Fingerprinting

Vulnerability Scanning with Nessus

Android Phone Hacking:

Introduction to Android

Gaining Access to Android Phone,

APK File Package

Securing you Mobile


Common Threats

Viruses

Worms

Trojans

Spywares

adwares

Ransomwares


Wireless Hacking

Introduction of Wireless Network

Types of Wireless Network ,Wireless Technology

Advantages and Disadvantages of Wireless Network

Wireless Cracking WEP,WPA,WPA2

Wireless Security

Wireless Intrusion Detection System

Tips to Secure Wireless Network


Key logger

What is Key logger?

Categorization of Keystroke Loggers

Advanced Key logger

logging keys using the Metasploit framework

Hardware Key logger


Stenography

Art of Hiding

How Steganography Works

Steganography Today

Steganography With CMD

Steganography Tools

Steganalysis

Crypotography

Introduction to Cryptography

Advantages and uses of Cryptography

Symmetric Algorithms Asymmetric Algorithms

Encryption

Cipher


DOS And DDOS

Concept: Denial of Service

Introduction to Distributed Denial of Service Attacks?

Working of Distributed Denial of Service Attacks?

Symptoms of a DOS Attack

Impact DDOS/DOS Attack Difference of DDOS & DOS

Introduction to Botnet


SQL Injection Concepts

Basics of SQL

Web Application Working

Introduction to Server Side Technologies

SQL injection

Identifying SQL Injection via Error Messages

Advanced SQL Injection Attacks

SQL Injection using Kali SQLMAP

Types of SQL Injection

Simple SQL Injection Attack

Union SQL Injection Example

SQL Injection Error Based


Social Engineering

What is Social Engineering?

Techniques of Social Engineering

Attempt Using Phone, E-mail, Traditional Mail, In person, Dumpster Diving, Websites,

Shoulder surfing, Third Person Approach.

Spam Emails

Social Engineering with Computer

Social Engineering attacks Through SET - Set Social Engineering toolkit.


Firewalls & Honeypots

What Does a Firewall Do?

What a Firewall cannot do

How does a Firewall work?

Types of Firewall

Working of Firewall

Advantages and Disadvantages of Firewall

Test firewall using fire walking tool

Concept of Honeypots

Purpose and working of Honeypots

Advantages and Disadvantages of Honeypots

Types and uses of Honeypots


Penetration Testing

Pen Testing Concepts

Types of Pen Testing

Pen Testing Phases & Tools


Deliverables to Participants:

Authorized Certificate from IBNC India and I-Medita Learning Solutions Pvt Ltd.

Software toolkit to each participant.

Training Material (ebooks, ppt, videos) to each participant.


(Please carry your College ID and Registration Slip with you in workshop)


Staff Coordinators:

1. Prof. Mohammed Hafeez M. K.

2. Prof. Ganesh Pai


Student Coordinators:

1. Mr. Manikanta : +91 9945514497

2. Ms. Varnitha : +91 7034217499

3. Mr. Ramesh : +91 8050680137

4. Ms. Nishmitha : +91 8971504011


Eligibility: BE/BTech/BSc/BCA/MCA/BBM/Diploma

Who can attend: First year to Final year students of all Discipline

Registration Link: www.bit.do/Pacehacks17

Payment Link: www.bit.do/pacehacking

Back to Top
© 2016 P.A. College of Engineering, Mangalore
Site By Chillipages