0% found this document useful (0 votes)
9 views2 pages

The First Day of The Cyber Security Workshop

The cyber security workshop at RVITM, led by Mr. Samarth Bhaskar Bhat, covered essential topics including hacking fundamentals, types of vulnerabilities, hacking techniques, and security measures. Participants learned about networking concepts, scripting, defensive strategies, and practical tips for aspiring cybersecurity professionals. The workshop aimed to equip attendees with foundational knowledge to protect systems in the digital landscape.

Uploaded by

meshrsth10
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views2 pages

The First Day of The Cyber Security Workshop

The cyber security workshop at RVITM, led by Mr. Samarth Bhaskar Bhat, covered essential topics including hacking fundamentals, types of vulnerabilities, hacking techniques, and security measures. Participants learned about networking concepts, scripting, defensive strategies, and practical tips for aspiring cybersecurity professionals. The workshop aimed to equip attendees with foundational knowledge to protect systems in the digital landscape.

Uploaded by

meshrsth10
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

The first day of the cyber security workshop at RVITM, organized by

the Aegis Club under the guidance of Niharika Ma'am, was led by
resource person Mr. Samarth Bhaskar Bhat. The session covered a
comprehensive range of topics essential for understanding the
fundamentals of cyber security and hacking.

Key Topics Covered

1. Introduction to Hacking:
- Discussion on whether hacking is a real phenomenon and the implications of its existence.

- Explanation of why wireless communications are particularly vulnerable to hacking, while wired
connections are generally safer due to their structure.

2. Types of Vulnerabilities:
- Overview of vulnerabilities categorized by severity: low, medium, high, and critical.

3. Hacking Techniques:
- Methods to check if a phone has been hacked using the code *#62#.

- Introduction to various types of malware, including ransomware (which encrypts data), worms
(which require user action), viruses (that execute automatically), botnets (fake packets sent
wirelessly), and Trojans (malicious files with remote access).

4. Security Measures:
- Three main security methods discussed:

- Two-factor authentication

- Google Authenticator app

- Hardware keys like YubiKey

5. Networking Concepts:
- Explanation of IP addresses as unique identifiers for devices and Fully Qualified Domain Names
(FQDN) as a combination of an IP address, port number, and protocol.
- Use of `nslookup` to find a website's IP address.

6. Scripting and Automation:


- Introduction to scripting as a means to automate tasks using interpreters that execute commands
line by line.

7. Defensive Strategies:
- A multi-layered defense approach involving:

- Cryptography: Encryption and decryption methods.

- Antivirus Software: Signature-based and heuristic analysis.

- Firewalls: Implementing rules for traffic management.

8. Operating Systems:
- Overview of Linux distributions and package management systems like APT and YUM, with Kali
Linux highlighted for its built-in penetration testing tools.

9. Practical Tips:
- Guidance on coding standards for efficiency and compatibility across multiple compilers.

- Interview tips for aspiring cybersecurity professionals.

The workshop provided valuable insights into the field of cyber security,
equipping participants with foundational knowledge about hacking techniques,
vulnerabilities, and defensive strategies essential for protecting systems in
today's digital landscape.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy