A workshop on "Ethical Hacking & Cyber Security" (16 Hours) presented by iHackers.
Ethical hacking is an important tool in many national security agencies and even companies. An Ethical Hacker is usually employed with the organization and can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker. The goal of the ethical hacker is to help the organization take pre-emptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. In order to become an Ethical Hacker or Security Expert one must think out of the box with the mentality that in order to catch a thief.
This workshop is specifically designed to provide the right knowledge to the aspiring Hacking and Cyber Security enthusiasts. This workshop will explore the various means that an intruder has available to gain access to computer resources. It will investigate weaknesses by discussing the theoretical background behind, and whenever possible, actually performing the attack.
iHackers Workshop enables you to interactively discuss security approaches, projects, and challenges with iHackers expert to help address and identify security gap impact and an approach to address a comprehensive security architecture with processes, multivendor technologies, and organizational personnel.
We will also discuss infrastructure security and other security requirements, as well as best practices for security policy and processes, and provide recommendations for improvements.
Attendees will be provided with instructions how to secure themselves from Cyber Crime. A live speaker and instructor are available to answer questions during this 2 day workshop. Let a trained professional show you how to secure and manage your data. Upon completion attendees will get a certificate of participation from iHackers.
Topics To Be Covered
An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit.Ethical hacking is an important tool in many national security agencies and even companies.
A keylogger is a type of surveillance software that has the capability to record every keystroke you make to a log file, usually encrypted.There are numerous keylogging methods, ranging from hardware and software-based approaches to acoustic analysis.
Trojan, is a non-self-replicating type of malware which appears to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access to the target's computer.
Who Could Attend ?
College students seeking career in Cyber Security Industry.
Person having interest in Hacking & Security.
Education Faculty & Staff.
IT Professionals, Web Developers, Network Engineers.
Students from any branch can attend the workshop.