Chaitanya Bharathi Institute of Technology is one of the
This Short Term Training Program (STTP) is tailored to premier Engineering Colleges in the self-financing category provide participants with advanced strategies for in the state of Telangana established in the year 1979. The mitigating cyber attacks and identifying threats, featuring college offers 11 UG and 10 PG Programs. The Institute practical techniques that can be readily applied in their Chaitanya Bharathi Institute of has become Autonomous under UGC w.e.f. 2013-14. UG professional settings. Emphasizing the critical need for Technology (Autonomous Institute) Programs were accredited by the NBA in the years 1998, swift detection and response in today's digital landscape, 2004, 2008, 2013, 2017, and 2022 and Five PG Programs the program combines theoretical knowledge with practical application. Attendees will learn to enhance Department of have been accredited by the NBA in 2020 and 2024. The Computer Engineering and Technology their defenses against a wide array of cyber threats, Institute is accredited by NAAC with a CGPA of 3.59 on ensuring they are equipped to protect and secure their the seven-point scale at ‘A++’ grade in 2023 for five years. organizations effectively against the evolving landscape of Organizes CBIT ranked in the band of 150-200 in Engineering cyber vulnerabilities. Category under National Institutional Ranking Framework (NIRF), Govt. of India, MHRD. The College Who can attend the STTP? International Level One Week Short Campus is spread across 50 acres. Security professionals aiming to enhance their Term Training Program (online) technical cybersecurity knowledge. Newcomers with a background in information on systems and networking. Computer Science Engineering (CSE) students and Comprehensive Cybersecurity and those in similar fields. Ethical Hacking from Fundamentals Objectives of the STTP to Advanced Techniques Acquire a comprehensive understanding of the critical domains within cybersecurity. th th Learn to develop a security framework that is 4 - 9 March, 2024 anchored in detection, response, and prevention. between 6.30 P.M to 8.30 P.M Investigate actionable insights and methodologies for About Computer Engineering & resolving high-impact security issues. Technology Department Steer towards implementing effective security In Association With Department of Computer Engineering and Technology measures and solutions within your organization. (CET) offers a BE CSE (IoT, Cyber Security Including Blockchain) undergraduate engineering programme, since Outcomes of the STTP the academic year 2020-21 with an intake capacity of 60 Upon completing the STTP, participants will: seats. This programme combines Computer Science, with the functional and operational aspects of IoT, Cyber Understand how to update defense strategies in Security and Blockchain Technology. The department has response to evolving cyber threats. well equipped laboratories with necessary software’s and Learn effective defenses against ransomware. committed, qualified well trained staff for Implement network architectures that enhance security, including VLANs, NAC, and IEEE 802.1X, teaching/learning process. The department is consistently ॥ क्षणे क्षणे यन्नवतामुपैतत तदेव रूपं रमणीयतायााः ॥ guided by advanced threat indicators. exploiting the trending curriculum, teaching, learning, Master Identity and Access Management (IAM) with kṣaṇe kṣaṇe yan navatām upaiti tad eva rūpaṃ ramaṇiyatāyāḥ research and development practices, providing scope for a focus on Multi-Factor Authentication (MFA). That which becomes new every moment is the very form of beauty the students to acquire knowledge and exploring better Navigate the strengths and offerings of leading cloud Māgha (7th Century Indian Poet) opportunities, for those aiming for admissions in providers (AWS, Azure, and Google Cloud) for prestigious institutions for their higher studies and optimal multi-cloud strategies. For Faculty / Research Scholar/ Students/ Industry People placements in well known MNC companies. Chief Patron Keynote Speaker Sri. N. Subash, President, CBIT Dr. V Sunkari, Professor, SiTE, AAiT, Addis Ababa University, Ethiopia Patron Prof. C. V. Narasimhulu, Principal, CBIT Resource Person Convener Ajinkya Lohakare, CTO and Founder of Ditto Department of Prof. M. Subramaniam Professor and Head, Dept. of CET, CBIT Security. CEH, CHFI, LPT, Penetration Computer Engineering and Technology Tester, BUG BOUNTY Hacker. Josh talk and Organizes Coordinator Dr. S. Kranthi Kumar Tedx Speaker, Ethical Hacker International Level One Week Short Term Associate Professor, Dept. of CET, CBIT Training Program (online) Program Outline on Co-Coordinators Day 1: Footprinting and Reconnaissance Prof. N. Ramadevi Introduction to Footprinting and Reconnaissance Techniques Comprehensive Cybersecurity and Professor, Dept. of CET, CBIT Domain and Network Information Gathering: NSLOOKUP, Ethical Hacking from Fundamentals Mrs. G Mamatha Assistant Professor, Dept. of CET, CBIT WHOIS to Advanced Techniques Advanced Search Techniques: SHODAN and Other Search Engines Specialized Reconnaissance Tools: MALTEGO, HTTRACK, The th th Advisory Committee Harvester 4 - 9 March, 2024 Prof. Umakanta Choudhary, Advisor I & I, CBIT Integrating Recon-NG and Social Engineering for Comprehensive between 6.30 P.M to 8.30 P.M Prof. Sarma A.D, Advisor, R&E, CBIT Reconnaissance Dr. N. L. N. Reddy, Advisor, CDC, CBIT In Association With Day 2 and 3: Penetration Testing and Ethical Hacking Dr. P. Suresh, Director, AEC & COE, CBIT Prof. P. Ravinder Reddy, Director & Head, R&E, CBIT Foundations of Ethical Hacking and Introduction Prof. M. Sushanth Babu, Director, Academics, CBIT Network Reconnaissance: Scanning, Enumeration, and Sniffing Prof. N. T. Rao, Director, IQAC, CBIT Attacking Techniques: System Hacking, Malware, Social Prof. P. V.R. Ravindra Reddy, Director, Student Affairs, CBIT Engineering, Denial of Service, and Session Hijacking Web Security: Server and Application Vulnerabilities, SQL Injection Organizing Committee (Dept. of CET) Wireless and Mobile Security: Hacking WiFi, Bluetooth, and Registration Details Dr. G. Jaya Rao, Assistant Professor Mobile Devices Mrs. Kavita Agarwal, Assistant Professor Defensive Strategies: Understanding and Deploying IDS, Firewalls, Mr. P. Narsimhulu, Assistant Professor Honeypots, and exploring IoT, Cloud Security, and Cryptography Registration Fee: ₹250 per participant Mrs. N. Sujatha Gupta, Assistant Professor QR for Registration Form: Day 4 and 5 : Advanced Penetration Testing Supporting Staff (Dept. of CET) Deep Dive into Linux Programming for Security Professionals Mr. S. Rajesh, Computer Operator Mastery of Metasploit for Effective Penetration Testing Mr. Syed Althaf, Computer Operator Advanced Techniques in Information Gathering and Vulnerability Mrs. Md. Shabana, Administrative Exec. Assessment Sophisticated Traffic Analysis and Capture for Network Security CET Student Coordinators Comprehensive Exploitation Techniques, including Password Ms. Kavya Sri Yakkala Cracking and Advanced Exploits Ms. Shrina Tyarla Strategic Post-Exploitation Tactics to Maintain Access and Gather Ms. B. Jyothi Samjyotha Critical Data Ms. Mudimala Sanjana Reddy Payment Details Provided in the Form Enhancing Web Application Security through Targeted Testing Mr. B. Kartikender Reddy Developing Custom Exploits for Comprehensive Security If any queries, contact: Mr. Kosuri Sasidhar Assessments Mr. Simhadri Adhit Utilizing Smartphone Penetration Testing Frameworks for Mobile Mrs. G. Mamatha Mr. Vangapally Namish Mobile Number: +91 94918 70706 Security Mr. Aditya Raj Bhosle Day 6: CTF Challenges Email Address: [email protected] Mr. Garlapati Ritesh