CET Brochure Cyber Security Workshop 07.03.2024

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

About CBIT About the STTP

Chaitanya Bharathi Institute of Technology is one of the


This Short Term Training Program (STTP) is tailored to
premier Engineering Colleges in the self-financing category provide participants with advanced strategies for
in the state of Telangana established in the year 1979. The mitigating cyber attacks and identifying threats, featuring
college offers 11 UG and 10 PG Programs. The Institute practical techniques that can be readily applied in their Chaitanya Bharathi Institute of
has become Autonomous under UGC w.e.f. 2013-14. UG professional settings. Emphasizing the critical need for Technology (Autonomous Institute)
Programs were accredited by the NBA in the years 1998, swift detection and response in today's digital landscape,
2004, 2008, 2013, 2017, and 2022 and Five PG Programs the program combines theoretical knowledge with
practical application. Attendees will learn to enhance Department of
have been accredited by the NBA in 2020 and 2024. The Computer Engineering and Technology
their defenses against a wide array of cyber threats,
Institute is accredited by NAAC with a CGPA of 3.59 on ensuring they are equipped to protect and secure their
the seven-point scale at ‘A++’ grade in 2023 for five years. organizations effectively against the evolving landscape of Organizes
CBIT ranked in the band of 150-200 in Engineering cyber vulnerabilities.
Category under National Institutional Ranking
Framework (NIRF), Govt. of India, MHRD. The College
Who can attend the STTP? International Level One Week Short
Campus is spread across 50 acres.
Security professionals aiming to enhance their Term Training Program (online)
technical cybersecurity knowledge.
Newcomers with a background in information on
systems and networking.
Computer Science Engineering (CSE) students and Comprehensive Cybersecurity and
those in similar fields. Ethical Hacking from
Fundamentals
Objectives of the STTP to Advanced Techniques
Acquire a comprehensive understanding of the
critical domains within cybersecurity. th th
Learn to develop a security framework that is 4 - 9 March, 2024
anchored in detection, response, and prevention. between 6.30 P.M to 8.30 P.M
Investigate actionable insights and methodologies for
About Computer Engineering & resolving high-impact security issues.
Technology Department Steer towards implementing effective security In Association With
Department of Computer Engineering and Technology measures and solutions within your organization.
(CET) offers a BE CSE (IoT, Cyber Security Including
Blockchain) undergraduate engineering programme, since Outcomes of the STTP
the academic year 2020-21 with an intake capacity of 60
Upon completing the STTP, participants will:
seats. This programme combines Computer Science, with
the functional and operational aspects of IoT, Cyber Understand how to update defense strategies in
Security and Blockchain Technology. The department has response to evolving cyber threats.
well equipped laboratories with necessary software’s and Learn effective defenses against ransomware.
committed, qualified well trained staff for Implement network architectures that enhance
security, including VLANs, NAC, and IEEE 802.1X,
teaching/learning process. The department is consistently ॥ क्षणे क्षणे यन्नवतामुपैतत तदेव रूपं रमणीयतायााः ॥
guided by advanced threat indicators.
exploiting the trending curriculum, teaching, learning, Master Identity and Access Management (IAM) with kṣaṇe kṣaṇe yan navatām upaiti tad eva rūpaṃ ramaṇiyatāyāḥ
research and development practices, providing scope for a focus on Multi-Factor Authentication (MFA). That which becomes new every moment is the very form of beauty
the students to acquire knowledge and exploring better Navigate the strengths and offerings of leading cloud Māgha (7th Century Indian Poet)
opportunities, for those aiming for admissions in providers (AWS, Azure, and Google Cloud) for
prestigious institutions for their higher studies and optimal multi-cloud strategies. For Faculty / Research Scholar/ Students/ Industry People
placements in well known MNC companies.
Chief Patron Keynote Speaker
Sri. N. Subash, President, CBIT Dr. V Sunkari, Professor, SiTE, AAiT, Addis
Ababa University, Ethiopia
Patron
Prof. C. V. Narasimhulu, Principal, CBIT Resource Person
Convener Ajinkya Lohakare, CTO and Founder of Ditto Department of
Prof. M. Subramaniam
Professor and Head, Dept. of CET, CBIT
Security. CEH, CHFI, LPT, Penetration Computer Engineering and Technology
Tester, BUG BOUNTY Hacker. Josh talk and Organizes
Coordinator
Dr. S. Kranthi Kumar Tedx Speaker, Ethical Hacker International Level One Week Short Term
Associate Professor, Dept. of CET, CBIT Training Program (online)
Program Outline on
Co-Coordinators Day 1: Footprinting and Reconnaissance
Prof. N. Ramadevi Introduction to Footprinting and Reconnaissance Techniques Comprehensive Cybersecurity and
Professor, Dept. of CET, CBIT Domain and Network Information Gathering: NSLOOKUP, Ethical Hacking from Fundamentals
Mrs. G Mamatha
Assistant Professor, Dept. of CET, CBIT
WHOIS
to Advanced Techniques
Advanced Search Techniques: SHODAN and Other Search Engines
Specialized Reconnaissance Tools: MALTEGO, HTTRACK, The th th
Advisory Committee Harvester 4 - 9 March, 2024
Prof. Umakanta Choudhary, Advisor I & I, CBIT
Integrating Recon-NG and Social Engineering for Comprehensive between 6.30 P.M to 8.30 P.M
Prof. Sarma A.D, Advisor, R&E, CBIT
Reconnaissance
Dr. N. L. N. Reddy, Advisor, CDC, CBIT In Association With
Day 2 and 3: Penetration Testing and Ethical Hacking
Dr. P. Suresh, Director, AEC & COE, CBIT
Prof. P. Ravinder Reddy, Director & Head, R&E, CBIT Foundations of Ethical Hacking and Introduction
Prof. M. Sushanth Babu, Director, Academics, CBIT Network Reconnaissance: Scanning, Enumeration, and Sniffing
Prof. N. T. Rao, Director, IQAC, CBIT Attacking Techniques: System Hacking, Malware, Social
Prof. P. V.R. Ravindra Reddy, Director, Student Affairs, CBIT Engineering, Denial of Service, and Session Hijacking
Web Security: Server and Application Vulnerabilities, SQL Injection
Organizing Committee (Dept. of CET) Wireless and Mobile Security: Hacking WiFi, Bluetooth, and
Registration Details
Dr. G. Jaya Rao, Assistant Professor Mobile Devices
Mrs. Kavita Agarwal, Assistant Professor Defensive Strategies: Understanding and Deploying IDS, Firewalls,
Mr. P. Narsimhulu, Assistant Professor Honeypots, and exploring IoT, Cloud Security, and Cryptography Registration Fee: ₹250 per participant
Mrs. N. Sujatha Gupta, Assistant Professor
QR for Registration Form:
Day 4 and 5 : Advanced Penetration Testing
Supporting Staff (Dept. of CET) Deep Dive into Linux Programming for Security Professionals
Mr. S. Rajesh, Computer Operator Mastery of Metasploit for Effective Penetration Testing
Mr. Syed Althaf, Computer Operator Advanced Techniques in Information Gathering and Vulnerability
Mrs. Md. Shabana, Administrative Exec. Assessment
Sophisticated Traffic Analysis and Capture for Network Security
CET Student Coordinators Comprehensive Exploitation Techniques, including Password
Ms. Kavya Sri Yakkala Cracking and Advanced Exploits
Ms. Shrina Tyarla Strategic Post-Exploitation Tactics to Maintain Access and Gather
Ms. B. Jyothi Samjyotha Critical Data
Ms. Mudimala Sanjana Reddy Payment Details Provided in the Form
Enhancing Web Application Security through Targeted Testing
Mr. B. Kartikender Reddy
Developing Custom Exploits for Comprehensive Security If any queries, contact:
Mr. Kosuri Sasidhar
Assessments
Mr. Simhadri Adhit
Utilizing Smartphone Penetration Testing Frameworks for Mobile
Mrs. G. Mamatha
Mr. Vangapally Namish Mobile Number: +91 94918 70706
Security
Mr. Aditya Raj Bhosle
Day 6: CTF Challenges Email Address: [email protected]
Mr. Garlapati Ritesh

You might also like