Toll Free: 1800-3000-1115 Official Web: www.bytecode.in



Similar documents
FRANCHISE PROPOSAL BYTE CODE CYBER SECURITY PVT LTD

Ethical Hacking & Cyber Security Workshop

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

EC Council Certified Ethical Hacker V8

[CEH]: Ethical Hacking and Countermeasures

Course Title: Course Description: Course Key Objective: Fee & Duration:

Event Details. Stage 1 (Workshop Round to be held at Zonal Centers) Stage 2 (Zonal Round to be held at zonal center)

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

EC-Council. Certified Ethical Hacker. Program Brochure

CYBERTRON NETWORK SOLUTIONS

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CRYPTUS DIPLOMA IN IT SECURITY

LINUX / INFORMATION SECURITY

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

A Two days workshop on Information Security & Ethical Hacking Workshop Designed & Conceptualised by:

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

Certified Ethical Hacker (CEH)

CEH Version8 Course Outline

Certified Cyber Security Analyst VS-1160

EC-Council. Program Brochure. EC-Council. Page 1

HackINFINITY Workshop (A two day workshop on Ethical Hacking & Information Security)

CS Ethical Hacking Spring 2016

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

MET s Institute of Engineering, Department of MCA. Faculty Development Programme on Digital Forensic & Cyber Security Conducted by

Certified Cyber Security Expert V Web Application Development

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

FORBIDDEN - Ethical Hacking Workshop Duration

EC-Council Ethical Hacking and Countermeasures

Certified Cyber Security Analyst VS-1160

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Loophole+ with Ethical Hacking and Penetration Testing

FSP-201: Ethical Hacking & IT Security

Hackers are here. Where are you?

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Detailed Description about course module wise:

Workshop Designed & Powered by TCIL IT, Chandigarh

CSP-4225 Cyber Security Professional Certification The Most demanding, depth and advanced of all...

Hackers are here. Where are you?

A Systems Engineering Approach to Developing Cyber Security Professionals

SkyveBOTICS. A two days workshop on VoIP Controlled & Intelligent Robotics

Certified Ethical Hacker Exam Version Comparison. Version Comparison

#Invitation Letter. RE: Invitation for participation of your school in Edu-Venture 15.

ETHICAL HACKING CYBER SECURITY

The Cultural and Fine Arts Committee National Law School of India University, Bangalore presents

Analyze. Secure. Defend. Do you hold ECSA credential?

SONDRA SCHNEIDER JOHN NUNES

The International Certification in IT Security Training Program. fcch. foresec certified computer hacking

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws

EC-Council Certified Security Analyst (ECSA)

CIS 4204 Ethical Hacking Fall, 2014

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

IT and Cyber Security Training Courses

CAD-CAM Application in CNC Machining with Solid & Surface Modelling

Frequently Asked Questions

Course Title: Penetration Testing: Network Threat Testing, 1st Edition

Professional Penetration Testing Techniques and Vulnerability Assessment ...

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Cyber Security at NSU

RMAR Technologies Pvt. Ltd.

INFORMATION SECURITY TESTING

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

New-Age Undergraduate Programme

New in online. Ground Realities. admission table. DULEEP DEOSTHALE, PhD

Impact of Data Breaches

07 th to 12 th Dec [6 DAYS] IST ADVANCED MANAGEMENT DEVELOPMENT PROGRAMME FOR HEALTHCARE PROFESSIONALS

Anurag Gautam Contact No:

Principles of Information Assurance Syllabus

CEH Certified Ethical Hacker More Than 100 Success Secrets: Over 100 Professional Security Testers Most Asked Questions and Resources

Certified PHP Professional (CPP) Brochure Certified PHP Professional Training Brochure

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Certified Search Engine Optimizer (CSEO) Brochure

Preliminary Course Syllabus

Course Title: Penetration Testing: Security Analysis

CS 450/650 Fundamentals of Integrated Computer Security

IDS and Penetration Testing Lab ISA 674

IRCA QUALITY MANAGEMENT SYSTEMS AUDITOR/LEAD AUDITOR TRAINING IRCA Reg. No. A18021 (5 DAYS)

Course Content: Session 1. Ethics & Hacking

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

InfoSec Academy Pen Testing & Hacking Track

Ethical Hacking Course Layout

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

Bapuji Educational Association(Regd.) Bapuji Institute of Engineering and Technology. Davangere Karnataka. Placement Brochure

IDS and Penetration Testing Lab ISA656 (Attacker)

ACCT5949 Managing Agile Organisations

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

Part one: Programme Specification

Ethical Hacking I Course of Study for HAC2

Transcription:

. Ethical Hacking and Cyber Forensic Workshop

What is new?

Workshop Partners

About Techkriti (IIT Kanpur) With immense pleasure we would like to inform you that the Indian Institute of Technology (IIT) Kanpur is organizing its National Level Annual Technical and Entrepreneurship Festival, TECHKRITI 2014 during 06th - 09th March, 2014. Techkriti has fast emerged as one of the best technical festivals of the country over the past years and now resounds as a familiar name across the colleges as well as the industry, nationwide. It gets bigger and better by the years and needless to say we plan to keep up with the legacy! After the last year s renaissance, Techkriti is striking back with vengeance, in its very first green avatar, to redefine the technology which will transform the future of the commons. From workshops and guest lectures on the one hand to debates, quizzes and professional shows on the other, TECHKRITI 2014 is playing host to a gamut of activities which challenges the brightest minds in the country to push their capacity to ideate, drive their hunger to innovate and challenge their potential to create like never before. The 4 day fiesta of TECHKRITI to be held from 06th to 09th of March 2014 sees the confluence of thoughts and ideas amongst more than 50,000+ young minds from not only India's but the world's top notch universities.

Techkriti (Event Details) 2014 TECHKRITI 2014 is IIT Kanpur Technical festival going to held from 06th - 09th March, 2014. TECHKRITI 2014 is conducting an INTERNATIONAL Event Hackkriti who s Prelims round will be conducted at 20 Zonal Centers across different cities of India. The Prelims round will be conducted at the end of 2 days workshop on Ethical Hacking & Cyber Forensic. The final Round of Hackkriti, IIT Kanpur has Prize Money of ` 1,00,000/- to be given by BYTECODE CYBER SECURITY. Countries like Sri Lanka, China, Pakistan, Bangladesh, Australia and many more will be participating in the competition. The workshop will be conducted by BYTECODE CYBER SECURITY, Delhi a renowned company for delivering Technical Workshops in Engineering Colleges. We are looking forward to Make Your College as a ZONAL CENTER for conducting the workshop.

Techkriti (Event Details) 2014 Prelims of HACKKRITI : We want your association for TECHKRITI 2014, IIT Kanpur Ethical Hacking Outreach program in terms of providing support and holding a Zonal Center at your institution. Round 1 (Workshop to be held in 20 Zonal Centers) 1. The workshops will be organized in 20 different Zonal Centers/Colleges all across India from 1 st November 2013 to 28th February 2014. 2. The workshop will be organized by BYTECODE CYBER SECURITY, Delhi (Workshop Partner TECHKRITI 2014, IIT Kanpur & Prize Sponsor BYTECODE). 3. The duration of workshop will be of 16 hours and will be covered in 2 days. 4. The Fees of Workshop will be ` 1,000/- per student.

Techkriti (Event Details) 2014 Each student will get the following during the workshop : Software Toolkit CD (Containing Software, Study Material, e-books, Tutorials etc) Students will get Certificate of Participation from TECHKRITI 2014, IIT Kanpur & BYTECODE CYBER SECURITY. 1. Your college can be one of the 20 Zonal Centers for organizing TECHKRITI 2014, IIT Kanpur HACKKRITI Outreach workshop. 2. Publicity material for the Promotion of the workshop will be send to different colleges by the Zonal Center (Publicity material will be provided by BYTECODE CYBER SECURITY). Your college name will be displayed on TECHKRITI 2014, IIT Kanpur & BYTECODE CYBER SECURITY. Official Website and Facebook page each having a daily visitor of more than 80000.

Zonal Center Round 2 (Prelims of HACKKRITI at Zonal Center) At the end of workshop on 2nd day, Prelims round of HACKKRITI Competition HACKRITI will be organized at the Zonal Center. Winners will get Direct Entry to the Final Round of HACKKRITI at Techkriti 2014, IIT Kanpur where participants from countries like Sri Lanka, Pakistan, Bangladesh, Nepal, Australia, India would be participating. Winning team will also get Certificate of Merit from TECHKRITI 2014, IIT Kanpur in association with BYTECODE CYBER SECURITY. Name of the Winning Team will be uploaded on TECHKRITI 2014 & BYTECODE CYBER SECURITY website.

Zonal Center SELECTION OF ZONAL CENTER The Zonal Center will be finalized on the following basis: 1. College having a Good Infrastructure with a Seminar Hall having sitting capacity of 200-300 students. 2. Can provide Accommodation to Outstation college students. However college can charge extra for this from the students. 3. Laptop Charging Points. 4. Accommodation and Fooding to BYTECODE. 5. Arrange min. 150 students for the workshop. Since, every college will be interested to make his/her college as a Zonal center for this Event, priority will be given to the college fulfilling the above stated terms and conditions

Benefits to Zonal Center 1. International Promotion of your College. 2. Prelims Round of INTERNATIONAL Event HACKKRITI to be held at Zonal Center. 3. Certificate of Association to Zonal Center from TECHKRITI 2014, IIT Kanpur in association with BYTECODE CYBER SECURITY. 4. Zonal Center (College name) will be displayed on TECHKRITI 2014, IIT Kanpur & BYTECODE CYBER SECURITY. Official Website and Facebook page each having a daily visitor of more than 8000+. 5. Student getting Certificate of Participation will contain name of Zonal Center. 6. Certificate of Coordination for Students & Faculties Coordinators. 7. Your college will be one of the Zonal Center out of 20 Centers for organizing TECHKRITI 2014, IIT Kanpur Ethical Hacking Outreach workshop. 8. All Publicity material (Poster, Flex etc) send to different colleges will carry the name & logo of the Zonal Center. 9. Promotional and Invitation Mail send to different colleges (1 Lacks++) will contain the name & logo of Zonal Center. 10. Name of the Winning Team and Zonal Center will be uploaded on TECHKRITI 2014 & BYTECODE CYBER SECURITY.

Requirements from Zonal Center A Seminar Hall with sitting capacity of 200-300 students. Two Projectors. 2 COLLAR MIKE with Sound System. White Board and Marker. Laptop Charging Points. Workshop Coordinators (2-5). One Laptop per team (1-3 Students), should be carried by all teams. Fooding and Lodging to BYTECODE team. Accommodation for the participants of workshop.

Certification Details During the whole Event Process following Certificate will be provided Certificate of Participation to all Participants from TECHKRITI 2014, IIT Kanpur in association with BYTECODE CYBER SECURITY. Certificate of Coordination to the Organizers/Coordinators from TECHKRITI 2014, IIT Kanpur in association with BYTECODE CYBER SECURITY. Certificate of Association to Zonal Center from TECHKRITI 2014, IIT Kanpur in association with BYTECODE CYBER SECURITY. Certificate of Merit to the Winners of Prelims round of Hackkriti from TECHKRITI 2014, IIT Kanpur in association with BYTECODE CYBER SECURITY.

About BYTECODE CYBER SECURITY Bytecode is an Information Security & IT trainings and certifications providing company, An authorized or accredited training center of EC-Council, Our head quarter is completely based in New Delhi (INDIA), In just a few years Bytecode has grown with a large number of new students, clients and partners. From the starting we only deliver the best quality and knowledge base solutions with a very high standard to our students, clients and partners because we believe that the high standards bring excellent output in long run and our standards is our strength, and we support these standards so that when we say We are Professional in it and we must really mean it. Bytecode believes in teamwork, With every new day the quest for acquiring new competencies continues. Forever searching, experimenting, innovating, learning, moving ahead with our sincere efforts and dedication, shaping the future, and challenging our competencies to create new opportunities, is a neverending process in the company.

About BYTECODE CYBER SECURITY Byte Code has conducted workshop on Ethical Hacking, Forensics and Robotics and other workshops with the giant engineering colleges, schools, companies, Govt. organizations such as: Delhi Public School HMDAV School - Delhi SPSS Public School - Delhi Innovative Group Of Colleges - Noida PCTI Computers and Technologies Delhi Technia College - Delhi IMS College - Noida IIT Kharagpur IIT Delhi IIT Jodhpur 2012, 2013 IIT Bombay IIT Jodhpur Feb 2012, March 2013 IIT Roorkee 2013 IIT Guwahati ISN DHANBAAD SRM UNIVERSITY Bengal COLLEGE OF ENGINEERING KNNCIT MADURAI Matrix Knowledge Solutions B.S.A.BDUR RAHMAN CHENNAI BITS PILANI-RAJASTHAN IIT BOMBAY Jaipur University SARVODYA College IGNOU and many more

PARTNERS BYTECODE CYBER SECURITY

Audience To Target Individuals School Students College Students IT Professionals IT Officers IT and LAW Officers Corporate IT Training Firms/Organizations/Society IT Consultants IT Experts IT Officers IT Institutions & Colleges IT Graduated or Computer Science Students Governance Security Agencies Security Groups Govt. IT Institutions IT Govt. & Security Officers.

Student Benefits Complimentary official study material, presentations worth 350$ USD. Complimentary 6 month virtual lab practicing/test access worth 350$ USD. Complimentary student learning kit, digital kit, complete software package worth 250$ USD. Byte-Code global Information Security & Ethical Hacking certification. Complimentary 50% discount gift voucher for Byte-Code official trainings. Complimentary 6 month virtual training support worth 500$ USD. Complimentary 6 month virtual e-courseware access worth 150$ USD. Complimentary sessions for education and career counselling.

Student s Benefits No other fee/costs. (like for: study material, exam charges, certification charges, exam fee, registration fee). Complimentary scholarship programs for first 10 (ten) winners of workshop worth 1000$ USD. Complimentary surprise gifts for first 10 (ten) winner of the workshop. Complimentary Byte-Code HACK T-Shirt for top 10 (ten) winners worth 50$ USD. Complimentary special appreciation Certificate for top 10 (ten) winners. Chance to work with Byte-Code on a Information Security, Ethical Hacking and Cyber Forensics' project for first top 10 (ten) winners.

Coordinator & Member s Benefits Complimentary official study material, presentations worth 350$ USD. Complimentary 6 month virtual lab practicing/test access worth 350$ USD. Complimentary student learning kit, digital kit, complete software package worth 250$ USD. Byte-Code global Information Security & Ethical Hacking certification. Complimentary 50% discount gift voucher for Byte-Code official trainings. Complimentary 6 month virtual training support worth 500$ USD. Complimentary 6 month virtual e-courseware access worth 150$ USD. Complimentary sessions for education and career counselling.

Coordinator & Member s Benefits No other fee/costs. (like for: study material, exam charges, certification charges, exam fee, registration fee). Complimentary workshop banners, posters, flex, workshop publicity through social network, email marketing, updates on Byte- Code official website i.e. Complimentary surprise gifts. Complimentary Byte-Code HACK T-Shirt worth 50$ USD. Complimentary appreciation Certificate. Chance to work with Byte-Code on a Information Security, Ethical Hacking and Cyber Forensics' project for first top 10 (ten) winners.

What is Ethical Hacking? ETHICAL HACKING An ethical hacker is usually employed by an organization who trusts him or her to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing computer security vulnerabilities. Unauthorized hacking (i.e., gaining access to computer systems without prior authorization from the owner) is a crime in most countries, but penetration testing done by request of the owner of the victim system(s) or network(s) is not.

What is Cyber Forensics? CYBER FORENSICS Computer forensics (sometimes known as computer forensic science is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information. Although it is most often associated with the investigation of a wide variety of computer crime, computer forensics may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail.

Workshop Details. Workshop Name: Certified Ethical Hacking & Forensics Expert. Workshop Duration: 2 Days (8 Hours per day) Workshop Fee: 1000.00 INR (Eleven Hundred Only) for per student. Included: Study material, certification, digital kit, training, service tax i.e.

Course Content C EH Partner 1. Module 01: Introduction to Ethical Hacking 2. Module 02: Foot printing and Reconnaissance 3. Module 03: Scanning Networks 4. Module 04: Enumeration 5. Module 05: System Hacking 6. Module 06: Trojans and Backdoors 7. Module 07: Viruses and Worms 8. Module 08: Sniffers 9. Module 09: Social Engineering 10. Module 10: Denial of Service 11. Module 11: Session Hijacking 12. Module 12: Hacking Web servers 13. Module 13: Hacking Web Applications 14. Module 14: SQL Injection 15. Module 15: Hacking Wireless Networks 16. Module 16: Evading IDS, Firewalls, and Honey pots 17. Module 17: Buffer Overflow 18. Module 18: Cryptography 19. Module 19: Penetration Testing 20. Module 20: Mobile Hacking

Workshop Tools & Digital Kit

Byte-Code Gallery

BYTE CODE CYBER Security Contact Us Contact Us BYTE CODE CYBER SECURITY (P) LIMITED Head Office: 72-B, 3 rd Floor Main Vikas Marg Laxmi Nagar, Delhi: 110092 Web: www.bytecode.in Email: info@bytecode.in Telephone: 011 64601115 / 43005481 +91-9210001115 / 9891307007 Branches : New Delhi, Ghaziabad, Noida, Pune, Vadodara, Odisha, Gurgaon TEXT Website: www.bytec0de.com ( Indian) www.bytecode.co.in ( International )

We seek your collaboration with us and look forward to make your campus one of zonal center of this event. The authorized team from BYTECODE CYBER SECURITY (Workshop Partner TECHKRITI 2014, IIT Kanpur & Prize Sponsor BYTECODE) would come to your campus to organize a workshop and Prelims Round of the concerned event. This workshop cum event can be organized at any weekend/weekday. We look forward for a quick and positive response from you and a long term association with your esteemed organization. THANK YOU I T H A S B E E N A P L E A S U R E!