arrow_back Should I contribute to Open Source or not?
Introduction to TLSv3 Protocol arrow_forward
Cybersecurity: Offensive & Defensive
Submitted by Aditya Shankar Tripathi (@aditya-s-tripathi) on Friday, 15 February 2019
Anything that relies on the Internet for communication, can be affected by a breach in security. Today, most of us use the Internet to avail the hosted services without knowing about the extent of privacy breach that can affect us. This workshop will serve as a starting point to a more secured digital life for the participants. This workshop will also give an insight into corporate’s cybersecurity structure to help those who want to start their careers in Cybersecurity, which is one of the booming sectors with respect to requirement of skilled professionals and cyber attack incidents all over the world.
The workshop would start with an overview of Information Security, awareness about the possibility of privacy invasions, famous cybercrimes all over the world and in India. Next, we will learn how to reduce our digital footprints and security practices to adapt in daily life to save ourselves from falling victim to cybercrimes like identity theft, bank frauds and others.
We will then look at the network infrastructure of an organisation and various security tools and deployed by the organisation.
Now, workshop will have two parts: Offensive and Defensive
Part I: Ofensive
1. Lifecycle of an attack: Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control, Action on objectives in brief
2. Types of hacks and tools to get started with and we will do hands-on labs for better understanding.
3. Case study of a hack to develop a better understanding of the phases of an attack.
Part II: Defensive
1. Preventive measures to be taken at each phase of attacks.
2. Tools for ensuring safeguard of individuals and enterprise: Vulnerability assessment tools, Machine Learning based anti-virus, firewalls, SIEMs, etc.
In the final section of the workshop, we will perform an attack and will then learn to defend it too.
Participants would require a laptop, all the required tools would be provided by us.
Kali linux on virtual box or vmware workstation is required. If particiapnts can come to workshop will Kali Linux installed, it will save us time. Or we will provide you with the setups.
We will need a wifi connection throughout the workshop.
Jayesh is working as Infrastructure Solution Designer in the industry for past 6.5 years.Previously, he has worked as Wireless design & Implementation Consultant in providing network infrastructure solutions.He likes to deliver training & seminars.
Amol Kahat is an open source enthusiast who loves Linux and python. He works at Red Hat and is also an event host of the PythonPune meet-up group.
Aditya is working as a Security Analyst in the industry for past 2 years.Previously, he has worked as Consultant in providing network infrastructure solutions.He likes coding in python. On weekends, he organizes and attends meetups for Cybersecurity awareness for both levels: enterprise and individual.