Workshop on Cyber Security Vulnerability Assessment and Penetration Testing on 9th July 2016

Workshop on Cyber Security Vulnerability Assessment and Penetration Testing on 9th July 2016

 

  • CSI Member

    Sale Date Ended

    INR 3000
    Sold Out
  • Non Member

    Sale Date Ended

    INR 4000
    Sold Out
  • CSI Student Member

    Sale Date Ended

    INR 1500
    Sold Out
  • Student Non Member

    Sale Date Ended

    INR 2000
    Sold Out

Invite friends

Contact Us

Page Views : 137

About The Event

 

One Day Workshop on "Cyber Security Vulnerability Assessment and Penetration Testing"

 Venue : CSI-BC Premises, Bangalore.

 

 

 

 

 

On 

Date:9th July, 2016 

From 9.30 am to 5.30 pm

Introduction

Vulnerability assessment and Penetration Testing is the process of attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access. If the focus is on computer resources, then examples of a successful penetration would be obtaining or subverting confidential documents, pricelists, databases and other protected information. The main thing that separates a penetration tester from an attacker is permission. The penetration tester will have permission from the owner of the computing resources that are being tested and will be responsible to provide a report. The goal of a penetration test is to increase the security of the computing resources being tested. In many cases, a penetration tester will be given user-level access and in those cases, the goal would be to elevate the status of the account or user other means to gain access to additional information that a user of that level should not have access to. There are a variety of reasons for performing a penetration test. One of the main reasons is to find vulnerabilities and fix them before an attacker does. Sometimes, the IT department is aware of reported vulnerabilities but they need an outside expert to officially report them so that management will approve the resources necessary to fix them. Having a second set of eyes check out a critical computer system is a good security practice. Testing a new system before it goes on-line is also a good idea. Another reason for a penetration test is to give the IT department at the target company a chance to respond to an attack. The Payment Card Industry (PCI) Data Security Standard, and other recent security recommendations and regulations, require external security testing.

Course Overview

Session 1: Foundation Concept 

Need of Cyber Security and Vulnerability Assessment
Introduction to Backtrack and Kali Linux

Session 2: Penetration Testing Fundamental 

Introductory Session on Penetration Testing Classic Approach
Penetration Testing Methodology

Session 3: Penetration Testing Procedure and Tools 

Preparation and Testing Procedures
Target Scoping and Information Gathering

Session 4: Introduction to Metasploit and Exploitation Techniques

Introduction to Target Exploitation and Introduction to Metasploit.
Planning and Scoping for a Successful Penetration Test and Advanced Reconnaissance Techniques

Prerequisites

  1. BRING YOUR LAPTOPS FOR THE WORKSHOP

 

 

Who Should Attend?

  1. Chief Security Officers and Chief Technology Officers.
  2. Security and Network Administrators. Threat Intelligence Professionals.
  3. Final Year CSE/ISE, E&C (UG/PG) Engineering Students who is planning a career in Network and Information Security.
  4. Faculty members of Engineering Colleges who is teaching Network and Information Security Courses.

Workshop Fee

CSI Member Rs. 3,000/- ,

Others Rs. 4,000/-,

Student Member  Rs. 1,500/-

Other Student Rs. 2,000/-

***Team of 3 and above - 10% discount

 

 

 

 

Key take away

  • Fundamental concepts of Vulnerability Assessment.
  • Understand the Penetration Testing Methodology.
  • What tools and techniques can help for carrying information gathering and penetration testing?
  • How to use Kali Linux and Backtrack for Vulnerability Assessment?
  • How to use Metasploit for Target Exploitation.

Workshop Facilitator

 Manish Kumar

Manish Kumar is working as Assistant Professor in Department of Computer Applications, M. S. Ramaiah Institute of Technology, Bangalore, India. His specialization is in Network and Information Security and Computer Forensic. He has conducted and delivered many sessions in Network and Information Security, Computer Forensics workshops and actively involved in this field. He is life member of CSI, ISTE, ISCA, member of Internet Society, IEEE, ACM and many other professional societies.

 

 

Registration fees

 

  1. CSI - Member Rs. 3,000/-
  2. Others Rs. 4,000/-
  3. Student Member Rs. 1,500/-
  4. Other Student Rs. 2,000/-

***Team of 3 and above - 10% discount

  1. Cheque to be drawn in favour of CSI Bangalore Chapter
  2. Note : Payment is to be made in favour of "CSI Bangalore Chapter",
    A/c No. 33762189110,
    Payable at State Bank of India, B1, Cross Road, MIDC, Andheri(E) Mumbai - 400 093.
    IFSC Code / NEFT / RTGS Code: SBIN0007074,
    MICR : 400002057, IFSC :SBIN0003298,
    SWIFT Code :SBININBB363,
    Phone.No : 022-28362419 

Participation only through advance registration, (Batch size : 20 participants only)

Note : - Out station participants need to confirm at least 2 days prior to the commencement of the training

Use www.Meraevents.com for online registration Event URL:

 

 

Venue & For Registration Contact

Mr Sridhar H.C

CSI Bangalore Chapter, Unit No.201, 2nd Floor, MB Center, Infantry Road, Bengaluru - 560 001.

Telephone
080 22860461 / 40906171

Mobile
09448905268

Tele / Fax
080-22862215

 

Email
bangalore.csi@gmail.com
mailto:manager@csibc.org

 

Website
www.csibc.org

 

 

 

 

Disclaimer:

This mail is not spam mail and is a genuine communication from Computer Society of India (CSI) Bangalore Chapter to its members and other IT Professionals to inform them about the forthcoming event. If you feel that this mail should not have been sent to you or you want similar communication to be sent to your different e-mail address, please reply to this mail and specify it in the message.