CYBER SECURITY WITH CTF CHALLENGE | 2 DAYS WORKSHOP | AT IIT HYDERABAD
Workshops
February 8 | 10AM - February 9 | 5PM
Indian Institute of Technology Hyderabad, Hyderabad
₹1500
Invite your friends
and enjoy a shared experience
CYBER SECURITY WITH CTF CHALLENGE | 2 DAYS WORKSHOP | AT IIT HYDERABAD
Workshops
February 8 | 10AM - February 9 | 5PM
Indian Institute of Technology Hyderabad, Hyderabad
₹1500
Invite your friends
and enjoy a shared experience
About the Event
Techobytes & E-Cell IIT Hyderabad Present: 2-Day National Tech Workshop Series 2025
Join and get immersive learning experience. Sessions will be led by industry experts, offering hands-on practicals and a cutting-edge curriculum aligned with industry standards.
By attending, you'll not only gain valuable tech knowledge but also have the opportunity to network with industry professionals and connect with fellow participants, expanding both your skills and your professional circle.
Workshop Date : 8th - 9th February 2025 (Saturday-Sunday)
Workshop Time: 10 AM to 5 PM
Workshop Duration: 2 Days (14-16 Hours)
Workshop Venue: IIT HYDERABAD (Main Campus), Hyderabad
TECHO WORKSHOP SERIES TOPICS (Each Workshop has 60-80 Seats only)
Course Content
Session 1: Introduction to Ethical Hacking & Cyber Security
● Overview of ethical hacking
● Understanding the role of cybersecurity in protecting individuals and organizations
● Different types of hackers
● Scope and limitations of ethical hacking
Session 2: Footprinting and Reconnaissance
● Information gathering techniques
● Understanding OSINT
● WHOIS lookup
● Social engineering for reconnaissance
● Hands-on exercises and demonstrations
Session 3: Scanning and Enumeration
● Network scanning techniques
● TCP & UDP Scanning Background
● Port scanning
● Service enumeration
● Vulnerability Identification with Nmap
Session 4: Mobile Application Analysis
● Root detection and SSL pinning concepts
● Bypass root detection and ssl pinning in mobile apps
● Static analysis of android apps
● Android app dynamic analysis and attacks using burpsuite
Session 5: Vulnerability Assessment
● Importance of vulnerability assessment
● Tools for vulnerability scanning
● Common vulnerabilities and exposures (CVEs)
● Hands-On Exercise: Conducting a basic network scan and vulnerability assessment
Session 6: Exploitation and post-exploitation
● Malware & Exploits
● Metasploit framework
● Privilege escalation Techniques (Windows & Linux)
● Post-exploitation techniques
● Pivoting concept
Day 2: Advanced Penetration Testing Techniques Session 7: Web application attacks
● Burpsuite configuration and basics of web request and response
● Intro to web app bug bounty
● Offensive web application attacks
● SQL injection
● File upload vulnerabilities
● Web app business logic bypas
● Authentication attacks
● broken access controls in web apps
● HTML injection and Cross site scripting
● phishing user data via vulnerable web apps
● OWASP Top 10 vulnerabilities
● CSRF, XSS and SSRF
● Authentication & Access Control Vulnerabilities
● Hands-On Exercise: Exploiting a vulnerable web application
Session 8: Mobile Application Security
● Connecting Mobile Device to Burp Proxy
● Common mobile app vulnerabilities
● Basics of SSL Pinning
● Reverse engineering mobile apps
● Securing mobile applications
● Hands-On Exercise: Assessing the security of a mobile application
Session 9: Wireless Network Security
● Types of wireless networks
● Wi-Fi encryption protocols
● Wireless security threats
● Hands-On Exercise: Wireless network attacks
Session 10: CTF (Capture the Flag) Challenges for Students.
● Intro to CTF challenges and live CTF solving session
● Live demonstrations and hands-on exercises with CTF Labs
● CTF Lab setup
● CTF challenges for student batches
Session 11: Cybersecurity Best Practices
● Intro to SIEM and incident response
● Legal aspects of ethical hacking
● Continuous monitoring and improvement
● Building a career in ethical hacking
● Hands-On Exercise: Building a basic incident response plan
Additionally, topics like iOT hacking concepts, Software Defined Radio (SDR), etc., will be discussed with students. The workshop will be interactive and include practical exercises, demonstrations, and hands-on labs to engage the students and provide them with real-world experiences in ethical hacking and cybersecurity along with career guidance.
CERTIFICATION:
Certificate of participation from E-Cell IIT Hyderabad & Techobytes Technologies
Eligibility: OPEN TO ALL!!! B.tech, B.E, M.B.B.S, BCA, MCA, MS, MD, B.sc IT, M.sc IT, Biomedical, Bio-Technology, BBA, MBA, B.A, hobbist and from any other stream can join the workshop.
Benefits:
-Hardcore Training from Industrial Experts for their particular domain.
-Software
-Hands-on Demonstration of the Latest Techniques & tools
-Interactive Query Session
Fee :
Rs. 1500/- only (per participant)
REGARDS
Team Techobytes
Event Guide
Language
English
Duration
2 Days
Best Suited For Ages
16 yrs & above
Invite your friends
and enjoy a shared experience
Venue
Indian Institute of Technology Hyderabad
IITH Road, Near NH-65, Sangareddy, Kandi, Telangana 502285, India
Get Directions
Terms & Conditions
CYBER SECURITY WITH CTF CHALLENGE | 2 DAYS WORKSHOP | AT IIT HYDERABAD
Workshops
February 8 | 10AM - February 9 | 5PM
Indian Institute of Technology Hyderabad, Hyderabad
₹1500
Invite your friends
and enjoy a shared experience
₹1500