Book Online Tickets for Cyber Security Vulnerability Assessment , Bengaluru.  

One Day Workshop on \

Cyber Security Vulnerability Assessment and Penetration Testing on 6-Aug-2016


  • CSI Member


    Sale Date Ended

    INR 3000
    Sold Out
  • Non-Member


    Sale Date Ended

    INR 4000
    Sold Out
  • CSI Member-Academic

    CSI-Member Academic

    Sale Date Ended

    INR 2500
    Sold Out
  • Non-Member-Academic


    Sale Date Ended

    INR 3000
    Sold Out
  • CSI Student Member

    CSI-Student Member

    Sale Date Ended

    INR 1500
    Sold Out
  • Non-Member-Student


    Sale Date Ended

    INR 2000
    Sold Out

Invite friends

Contact Us

Page Views : 225

About The Event


One Day Workshop on "Cyber Security Vulnerability Assessment and Penetration Testing"


 Venue : CSI-BC Premises, Bangalore.







Date:6th Aug.  2016 

From 9.30 am to 5.30 pm


Vulnerability assessment and Penetration Testing is the process of attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access. If the focus is on computer resources, then examples of a successful penetration would be obtaining or subverting confidential documents, pricelists, databases and other protected information. The main thing that separates a penetration tester from an attacker is permission. The penetration tester will have permission from the owner of the computing resources that are being tested and will be responsible to provide a report. The goal of a penetration test is to increase the security of the computing resources being tested. In many cases, a penetration tester will be given user-level access and in those cases, the goal would be to elevate the status of the account or user other means to gain access to additional information that a user of that level should not have access to. There are a variety of reasons for performing a penetration test. One of the main reasons is to find vulnerabilities and fix them before an attacker does. Sometimes, the IT department is aware of reported vulnerabilities but they need an outside expert to officially report them so that management will approve the resources necessary to fix them. Having a second set of eyes check out a critical computer system is a good security practice. Testing a new system before it goes on-line is also a good idea. Another reason for a penetration test is to give the IT department at the target company a chance to respond to an attack. The Payment Card Industry (PCI) Data Security Standard, and other recent security recommendations and regulations, require external security testing.


Course Overview

Session 1: Foundation Concept 

Need of Cyber Security and Vulnerability Assessment
Introduction to Backtrack and Kali Linux

Session 2: Penetration Testing Fundamental 

Introductory Session on Penetration Testing Classic Approach
Penetration Testing Methodology

Session 3: Penetration Testing Procedure and Tools 

Preparation and Testing Procedures
Target Scoping and Information Gathering

Session 4: Introduction to Metasploit and Exploitation Techniques

Introduction to Target Exploitation and Introduction to Metasploit. Planning and Scoping for a Successful Penetration Test and Advanced Reconnaissance Techniques





Who Should Attend?

  1. Chief Security Officers and Chief Technology Officers.
  2. Security and Network Administrators. Threat Intelligence Professionals.
  3. Final Year CSE/ISE, E&C (UG/PG) Engineering Students who is planning a career in Network and Information Security.
  4. Faculty members of Engineering Colleges who is teaching Network and Information Security Courses.

Workshop Fee

  • CSI Member Rs. 3,000/- 
  • Others Rs. 4,000/-
  • Student Member  Rs. 1,500/-
  • Other Student Rs. 2,000/-

***Team of 3 and above - 10% discount





Key take away

  • Fundamental concepts of Vulnerability Assessment.
  • Understand the Penetration Testing Methodology.
  • What tools and techniques can help for carrying information gathering and penetration testing?
  • How to use Kali Linux and Backtrack for Vulnerability Assessment?
  • How to use Metasploit for Target Exploitation.

Workshop Facilitator

 Manish Kumar

Manish Kumar is working as Assistant Professor in Department of Computer Applications, M. S. Ramaiah Institute of Technology, Bangalore, India. His specialization is in Network and Information Security and Computer Forensic. He has conducted and delivered many sessions in Network and Information Security, Computer Forensics workshops and actively involved in this field. He is life member of CSI, ISTE, ISCA, member of Internet Society, IEEE, ACM and many other professional societies.



Registration fees

Note : Payment is to be made in favour of "CSI Bangalore Chapter",
A/c No. 33762189110,
Payable at State Bank of India, B1, Cross Road, MIDC, Andheri(E) Mumbai - 400 093.
IFSC Code / NEFT / RTGS Code: SBIN0007074,
MICR : 400002057, IFSC :SBIN0003298,
Phone.No : 022-28362419 

Participation only through advance registration, (Batch size : 20 participants only)

Note : - Out station participants need to confirm at least 2 days prior to the commencement of the training

Use for online registration Event URL:




Venue & For Registration Contact

Mr Sridhar H.C

CSI Bangalore Chapter, Unit No.201, 2nd Floor

 MB Center, Infantry Road, Bengaluru - 560 001.


080 22860461 / 40906171




Tele / Fax










This mail is not spam mail and is a genuine communication from Computer Society of India (CSI) Bangalore Chapter to its members and other IT Professionals to inform them about the forthcoming event. If you feel that this mail should not have been sent to you or you want similar communication to be sent to your different e-mail address, please reply to this mail and specify it in the message.


Venue Map