• weekwid: false
  • widHeader: false
  • orgName:
  • orwid: false

Cyber Security & Cyber Forensics Workshop at IIT Bombay on 25th-26th January'20

Sat, 25 Jan 10:00AM - Sun, 26 Jan 5:30PM
Rs 1500
326 people viewed this event.
We’re currently not serving due to Covid-19. Sorry for the inconvenience!
I Am Interested

Get notified when the event happens next time.



Aakaar'20 IIT-Bombay is presenting a workshop in association with Entrench Electronics Pvt. Ltd.

Registration Fee?
Rs. 1500/- INR / participant |2 Day 

Coupon Code: IITCSCF100

What you will take after the course?
Pure knowledge and lots of learning.
Specialized Training from Domain Expert.
Individual hardware kit.
Software tool kit  & certification.
T-Shirt to every participant

What do you need to carry during the workshop?
Carry the Payment Receipt (Softcopy/Hardcopy) during the Training.
Carry Aadhar Id for entry in IIT-Bombay. 

Terms & Conditions
In case of cancellation of Workshop/Training from our side, the participants of the cancelled Workshop/Training will be given an option to be upgraded to another Workshop/Training. If the offer is denied by them, only then will they be considered for a refund.

If In Any Case Workshop is cancelled by Organizers due to any reason, we will refund the Workshop fee after deducting Bank Changes i.e. (INR150/-) per participant fee.
The refund will be in 3 stages: Verification>>Approval>>Bank Credit through the same mode of payment. A cash refund is NOT possible under any circumstance.
We are not responsible for any software failing to run/install on the participant's laptop owing to different configurations in laptops

Login to View Organizer Details
Like this event ? Share it with your friends !!

Course Content

Course Content

Introduction to Cyber Security

    • Introduction to Cyber Security
    • HTML
    • PHP
    • Database

Linux Operating System and Networking:

    • LINUX

Information Gathering:

    • Doxing
    • Website/ IP information Gathering
    • Network Mapping
    • Google Hacking

    • Discovering the IP Range and Open Port
    • Identifying the Target Operating System and Services
    • Secure Bypassing Firewalls while Scanning

Proxy Servers and Anonymity:

    • Learning Various Methods to Use Proxies
    • Hiding behind VPN
    • Using Proxies and VPN for Hacking Tools i.e Scanning
    • Configuring TOR with Backtrack and Nmap for Invisible Scanning
    • Using Tunneling methods for IP hide

Email Security & SocialEngineering:

    • Types of Email Addresses.
    • Security measures for Phishing.
    • Security measures for Social Engineering.
    • Security measures for Brute force
    • Security measures for Keynoters and Rating.
    • Security measures for Password Guessing.
    • Security measures for Mobile Phone.

Cryptography & Steganography:

    • Cryptography and Encryption Basics
    • Understanding various Hashes and Encryption Algorithms
    • Creating Digital Signatures on Backtrack and SSL cert.
    • Cryptography attacks
    • Rainbow table to Crack Passwords
    • Using various Steganography tools on Backtrack

System Hacking & Security

  • Hacking Windows Passwords using various methods
  • Cracking SAM file
  • Protecting SAM file from hack
  • Privilege Escalation in Windows and Linux
  • Using Stealers, Key loggers and Remote Administrations Tools (RATs)
  • Creating Undetectable Viruses using Crypters, Binders and Assembly Codes
  • Protection against Trojans, Worms and Malware
  • Website & Server Hacking Techniques:
  • Advanced SQL Injection 
  • Cross-Site Scripting

    • Local File Inclusion (LFI)
    • Remote File Inclusion (RFI)
    • Parameter Manipulation
    • Session and Cookies Hijacking
    • ClickJacking
    • Shell Injection
    • Brute force Attacks against Website login pages
    • Modules Particulars

Website & Server Hacking Techniques:

    • Using various Web-based
    • Vulnerabilities to hack servers
    • Rooting Servers
    • Remote Code Execution
    • Buffers Overflow
    • Brute force against Servers
    • Using Dos, DDos and Creating Botnets
    • Using various Exploits and Exploits Databases

Vulnerability Assessment and Penetration Testing (VAPT) :

    • Using Acunetix, Wikto, Nessus, skip fish, w3af, SQLmap Websecurify for vulnerability Scanning and Exploiting
    • Wordpress-scan, Drupal scan, Joomscan, cms-explorer for CMS Hacking and Pantsing

Query Session

Certificate & T-shirt Distribution


Map & Directions

Map & Directions
IIT Bombay Powai Mumbai, Maharashtra 400076
No reviews available
Write a review
Be the first one to review! Share your experience.

Frequently Asked Questions

Have any query? Drop your questions here !!
EventsHigh Specials, cyber security, electronics, software, courses, Entrench Electronics, classes and workshops, tech workshops,