Network Security Vulnerability Assessment and Penetration Testing

Network Security Vulnerability Assessment and Penetration Testing

 

  • CSI Member

    CSI Member

    Sale Date Ended

    INR 2250
    Sold Out
  • Others

    OtherthanCSIMembers

    Sale Date Ended

    INR 2850
    Sold Out
  • CSIStudentMember

    CSIStudentMember

    Sale Date Ended

    INR 1150
    Sold Out
  • OtherStudent

    OtherthanCSIStudentMember

    Sale Date Ended

    INR 1700
    Sold Out

Invite friends

Contact Us

Page Views : 354

About The Event

 

COMPUTER SOCIETY OF INDIA,  Bangalore Chapter

Presents

One-Day Workshop on

“Network Security Vulnerability Assessment and Penetration Testing”

July 26, 2014(Saturday) From 9.00am to 5.30pm

INTRODUCTION

Vulnerability assessment and Penetration Testing is the process of attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access. If the focus is on computer resources, then examples of a successful penetration would be obtaining or subverting confidential documents, pricelists, databases and other protected information. The main thing that separates a penetration tester from an attacker is permission. The penetration tester will have permission from the owner of the computing resources that are being tested and will be responsible to provide a report. The goal of a penetration test is to increase the security of the computing resources being tested. In many cases, a penetration tester will be given user-level access and in those cases, the goal would be to elevate the status of the account or user other means to gain access to additional information that a user of that level should not have access to. There are a variety of reasons for performing a penetration test. One of the main reasons is to find vulnerabilities and fix them before an attacker does. Sometimes, the IT department is aware of reported vulnerabilities but they need an outside expert to officially report them so that management will approve the resources necessary to fix them. Having a second set of eyes check out a critical computer system is a good security practice. Testing a new system before it goes on-line is also a good idea. Another reason for a penetration test is to give the IT department at the target company a chance to respond to an attack. The Payment Card Industry (PCI) Data Security Standard, and other recent security recommendations and regulations, require external security testing.

COURSE OVERVIEW

Session 1:-Foundation Concept:

  • Need of Cyber Security and Vulnerability Assessment
  • Introduction to Backtrack and Kali Linux

 

Session 2:-Penetration Testing Fundamental:

  • Introductory Session on Penetration Testing Classic Approach
  • Penetration Testing Methodology

Session 3:-Penetration Testing Procedure and Tools

  • Preparation and Testing Procedures
  • Target Scoping and Information Gathering

 

Session 4:-Introduction to Metasploit and Exploitation Techniques

  • Introduction to Target Exploitation and Introduction to Metasploit.
  • Planning and Scoping for a Successful Penetration Test and Advanced Reconnaissance Techniques.

PREREQUISITES

BRING YOUR LAPTOPS FOR THE WORKSHOP

KEY TAKEAWAYS

  • Fundamental concepts of Vulnerability Assessment.
  • Understand the Penetration Testing Methodology.
  • What tools and techniques can help for carrying information gathering and penetration testing?
  • How to use Kali Linux and Backtrack for Vulnerability Assessment?
  • How to use Metasploit for Target Exploitation.

WHO SHOULD ATTEND?

  • Chief Security Officers and Chief Technology Officers.
  • Professionals seeking a career in Network Security and Vulnerability Assessment.
  • Security and Network Administrators.Threat Intelligence Professionals.
  • Final Year CSE/ISE, E&C (UG/PG) Engineering Students who is planning a career in Network and Information Security.
  • Faculty members of Engineering Colleges who is teaching Network and Information Security Courses.

WORKSHOP FACILITATOR

Manish Kumar is working as Assistant Professor in Department of Computer Applications, M. S. Ramaiah Institute of Technology, Bangalore, India. His specialization is in Network and Information Security and Computer Forensic. He has conducted and delivered many sessions in Network and Information Security, Computer Forensics workshops and actively involved in this field. He is life member of CSI, ISTE, ISCA, member of Internet Society, IEEE, ACM and many other professional societies. 

Registration fees and Payment details

Student - Member

1150

Other Student

1700

CSI-Member

2250

Others

2850

***Team of 3 and above – 10% discount 

Cheques to be drawn in favour of : “CSI-Bangalore Chapter”

Details of CSI BC Bank account for online payment :

Bank: State Bank of India

Branch: B1, Cross Road, MIDC, Andheri (E) Mumbai. 400 093

MICR: 400002057   IFSC : SBIN0003298  SWIFT Code: SBININBB363

Account # : 33762189110   Bank Code:  07074

IFSC Code / NEFT / RTGS:  SBIN0007074
Bank Phone No.  022- 28362419

VENUE & FOR REGISTRATION CONTACT:

COMPUTER SOCIETY OF INDIA(Bangalore chapter)

Unit # 201, MB Center, Infantry Road, BENGALURU – 560 001

Contact Person:  Mr. H.C. Sridhar / Mr. Ramaswamy

Phone:  080-2286 0461, 40906171      Cell:  94489 05268        Fax: 080-22862215           

E-mail:bangalore.csi@gmail.com, manager@csibc.org

Participation only through advance registration, (Batch size : 20 participants only)

Note – Out station participants need to confirm at least 2 days prior to the commencement of the training