CYBER SECURITY WITH CTF CHALLENGE | 2 DAYS WORKSHOP | AT IIT HYDERABAD

CYBER SECURITY WITH CTF CHALLENGE | 2 DAYS WORKSHOP | AT IIT HYDERABAD

Workshops

February 8 | 10AM - February 9 | 5PM

Indian Institute of Technology Hyderabad, Hyderabad


1,500

Book Tickets

CYBER SECURITY WITH CTF CHALLENGE | 2 DAYS WORKSHOP | AT IIT HYDERABAD

Workshops

February 8 | 10AM - February 9 | 5PM

Indian Institute of Technology Hyderabad, Hyderabad


1,500

Book Tickets

About the Event

Techobytes & E-Cell IIT Hyderabad Present: 2-Day National Tech Workshop Series 2025


Join and get immersive learning experience. Sessions will be led by industry experts, offering hands-on practicals and a cutting-edge curriculum aligned with industry standards.


By attending, you'll not only gain valuable tech knowledge but also have the opportunity to network with industry professionals and connect with fellow participants, expanding both your skills and your professional circle.


Workshop Date : 8th - 9th February 2025 (Saturday-Sunday)

Workshop Time: 10 AM to 5 PM

Workshop Duration: 2 Days (14-16 Hours)

Workshop Venue: IIT HYDERABAD (Main Campus), Hyderabad


TECHO WORKSHOP SERIES TOPICS (Each Workshop has 60-80 Seats only)


Course Content


Session 1: Introduction to Ethical Hacking & Cyber Security


● Overview of ethical hacking

● Understanding the role of cybersecurity in protecting individuals and organizations

● Different types of hackers

● Scope and limitations of ethical hacking


Session 2: Footprinting and Reconnaissance

● Information gathering techniques

● Understanding OSINT

● WHOIS lookup

● Social engineering for reconnaissance

● Hands-on exercises and demonstrations


Session 3: Scanning and Enumeration

● Network scanning techniques

● TCP & UDP Scanning Background

● Port scanning

● Service enumeration

● Vulnerability Identification with Nmap


Session 4: Mobile Application Analysis

● Root detection and SSL pinning concepts

● Bypass root detection and ssl pinning in mobile apps

● Static analysis of android apps

● Android app dynamic analysis and attacks using burpsuite


Session 5: Vulnerability Assessment


● Importance of vulnerability assessment

● Tools for vulnerability scanning

● Common vulnerabilities and exposures (CVEs)

● Hands-On Exercise: Conducting a basic network scan and vulnerability assessment


Session 6: Exploitation and post-exploitation

● Malware & Exploits

● Metasploit framework

● Privilege escalation Techniques (Windows & Linux)

● Post-exploitation techniques

● Pivoting concept


Day 2: Advanced Penetration Testing Techniques Session 7: Web application attacks

● Burpsuite configuration and basics of web request and response

● Intro to web app bug bounty

● Offensive web application attacks

● SQL injection

● File upload vulnerabilities

● Web app business logic bypas

● Authentication attacks

● broken access controls in web apps

● HTML injection and Cross site scripting

● phishing user data via vulnerable web apps

● OWASP Top 10 vulnerabilities

● CSRF, XSS and SSRF

● Authentication & Access Control Vulnerabilities

● Hands-On Exercise: Exploiting a vulnerable web application


Session 8: Mobile Application Security


● Connecting Mobile Device to Burp Proxy

● Common mobile app vulnerabilities

● Basics of SSL Pinning

● Reverse engineering mobile apps

● Securing mobile applications

● Hands-On Exercise: Assessing the security of a mobile application


Session 9: Wireless Network Security

● Types of wireless networks

● Wi-Fi encryption protocols

● Wireless security threats

● Hands-On Exercise: Wireless network attacks


Session 10: CTF (Capture the Flag) Challenges for Students.

● Intro to CTF challenges and live CTF solving session

● Live demonstrations and hands-on exercises with CTF Labs

● CTF Lab setup

● CTF challenges for student batches


Session 11: Cybersecurity Best Practices

● Intro to SIEM and incident response

● Legal aspects of ethical hacking

● Continuous monitoring and improvement

● Building a career in ethical hacking

● Hands-On Exercise: Building a basic incident response plan


Additionally, topics like iOT hacking concepts, Software Defined Radio (SDR), etc., will be discussed with students. The workshop will be interactive and include practical exercises, demonstrations, and hands-on labs to engage the students and provide them with real-world experiences in ethical hacking and cybersecurity along with career guidance. 


CERTIFICATION:

Certificate of participation from E-Cell IIT Hyderabad & Techobytes Technologies


Eligibility: OPEN TO ALL!!! B.tech, B.E, M.B.B.S, BCA, MCA, MS, MD, B.sc IT, M.sc IT, Biomedical, Bio-Technology, BBA, MBA, B.A, hobbist and from any other stream can join the workshop.


Benefits:

-Hardcore Training from Industrial Experts for their particular domain.

-Software

-Hands-on Demonstration of the Latest Techniques & tools

-Interactive Query Session


Fee :

Rs. 1500/- only (per participant)


REGARDS

Team Techobytes

Event Guide

icon

Language

English

icon

Duration

2 Days

icon

Best Suited For Ages

16 yrs & above

Venue

Terms & Conditions

CYBER SECURITY WITH CTF CHALLENGE | 2 DAYS WORKSHOP | AT IIT HYDERABAD

Workshops

February 8 | 10AM - February 9 | 5PM

Indian Institute of Technology Hyderabad, Hyderabad


1,500

Book Tickets

1,500

Book Tickets

District
The best of events, movies, dining, and everything you love.

Find your next plan on District

Download the app

Scan to download the app

Download on appstoreDownload on playstore