0x01

Cybersecurity Awareness Workshop

Cybersecurity Awareness Workshop

Cyber Security Awareness Workshop is for IT and Non-IT Professionals who want to learn about online security and privacy protection. In this workshop, we will learn about security awareness topics like phishing attacks, email and text message scams, fraud calls, password security, safe internet habits, social networking safety, data privacy, physical security etc. Prerequisite for Workshop is :

● Basic knowledge of Internet

   Download Brochure

Duration

2 Hours

Level

Beginner

Mode

Online / In-Person

Certificate of

Completion

Resource

eBooks

Fee

₹100
   Enroll Now
Cybersecurity Awareness Workshop Highlights

● Introduction
● Cyber Crime ?
● Types of Cyber Crime
● Purpose of Cyber Crime
● Why should we care ?
● Cyber Security
● Sources of Attacks
● Personally Identifiable Information (PII)
● Cyber Security Threats
● Advanced persistent threats (APT)
● Social Engineering
● Phishing / Pretexting / Baiting / Quid Pro Quo / Piggybacking
● Phone Call and Credit Card Frauds
● Virus, Malware, Spyware, Ransomware, Rootkits etc.
● KeyLogger
● Denial-of-Service
● Man in the Middle (MitM)
● Social Media
● Unsecure Websites
● WiFi
● Mobile Devices
● ATM
● Password
● Threat Protection or Prevention
● Stay Safe on The Internet
● Cyber Law in India
● Best Practices

0x02

Ethical Hacking Workshop

Ethical Hacking Workshop

Ethical Hacking Workshop is especially for college students and also for those who want to learn about cybersecurity and start their career in it. Prerequisite for Workshop are :

● Basic knowledge of how to use Computer and Internet
● Out-Of-The-Box Thinking

   Download Brochure

Duration

10 Hours

Level

Beginner

Mode

Online / In-Person

Certificate of

Completion

Kit

Tools & eBooks

Fee

₹499
   Enroll Now
Ethical Hacking Workshop Highlights

● Introduction of Cyber Security
● Concept Of Ethical Hacking
● Lab Setup
● Fundamentals of Networking
● Fundamentals of Linux
● Introduction to Kali Linux
● ProxyChains / Hiding IP and MAC Address
● Reconnaissance
● Scanning
● Exploiting Vulnerability
● Password Cracking
● Man-In-The-Middle Attack
● WiFi Hacking
● DoS Attack
● Phishing
● Social Accounts / Email Hacking
● System Password Cracking
● Hacking Windows
● Backdoor in Windows
● Hacking with Batch Programming & Scripting
● Hacking by Viruses, Trojans, Keyloggers and Rootkit
● Cryptography
● Hacking with Android / iPhone
● Hacking with Raspberry Pi
● Google Hacking Database
● Social Engineering
● Career in Cybersecurity