


Taking advantage of the prevailing situation due to COVID-19 pandemic, cyber criminals have become more active as evidenced by recent ransomware and DoS attacks on major institutions. Third Year UG/Final year UG/PG students of CSE/IT/ISE/ECEĮvery day cyber attacks are evolving and getting more sophisticated. Reversing Binaries using Disassembler and Debuggerįeedback Collection and Online Examination Result DeclarationĬybersecurity and deep learning applications From July 15-22 July 2020 (I.L.NarasimhaRao Cyber Peace Foundation -Hyderabad)Īutomatic Cyber Threat Detection and Analysis Latest trends in cyber crime Issues and challenges Venu Gopal, BriskinfoSec Solutions ltd, Chennai) Internet Security Architectures: Research Issues Information Security in 2020: Challenges ahead and Blockchain Technology to the rescue OWASP vulnerabilities and Vulnerabilities of voice-controlled systems and attacks Security Analysis of Safety Critical and Control System Undergraduate or Postgraduate students of engineering colleges in Karnataka National Institute of Technology Karnataka, SurathkalĮligibility criteria for applying for the course: Venu Gopal, BriskinfoSec Solutions ltd, Chennai Name(s) of faculty / Industry taking the course: To introduce participants to open problems in Cyber Security and give future research directions.Enable to the participant to understand real-world problems in terms of Industry and their solutions, through case studies and live projects related to Cyber Security.Extend the theoretical concepts towards Cyber Security and provide solutions to address real-world problems.Strengthen the confidence level and capability of the participants in designing and developing Cyber Security Tools.To enable the participants to analyze Cyber Attacks, Detection and Mitigation techniques.Introduce the participants to various Open Source Tools related to Cyber Security.Introduce the participants to the fundamentals of Cyber Security, need of Cyber Security, various Cyber Attacks, and their mitigation techniques.The primary objectives of the course are as follows: Topics include cyber-attacks and defenses, web security, firewalls, intrusion detection systems along with security services such as Confidentiality, Integrity, Authentication (CIA) and technologies, Future Internet Architectures, Industry 4.0, Social Engineering followed by practicals and real time cases. The subject allows students/participants to learn about and discuss various cyber-attack techniques used in practice, and methods to defend against such attacks using industry-standard tools and techniques. This subject consolidates the student&participants understanding of Cyber Security by considering security principles, methodologies and technologies from a technical and management perspective used in practice. General Transformation Based EncryptionĬyber Attack Detection and Mitigation Techniques From 27th -31st July 2020.Laptop/Desktop with Internet ConnectionĬloud Availability Issues (Cloud Outage):.Furthermore, the program includes practical demonstration of cloud computing facilities on Amazon Web Services (AWS Cloud). Further, the program discusses the critical security and privacy challenges in the cloud computing, existing defense solution their strength and limitations.

This program will introduce the audience about security and privacy concerns in cloud computing, which makes the clients reluctant to adopt cloud computing despite all its benefits.
#Cyber security courses in bangalore software#
Recent advancement in hardware, networking, middleware, and virtualization technologies have led to an emergence of a new, geographically distributed computing platforms, known as Cloud Computing, that provide computational facilities (Computing, Storage and Network) as services accessible from anywhere via the Internet without significant investments in Information Technology (IT) infrastructure, and critical human resource or software licensing. Security Concerns and Preventive Measures in Cloud Computing from 2 to Social Engineering and Social media offense and defense Industrial Applications of security – Network and OS security controls, Hardware and Software Security controls International Standards/Models for Cyber security control and managementĬoBIT / ITIL / ITSM models and implementations for organizations/Institutes Security management – Assets selection Threat modeling and Risk assessments Zero Trust Model Monitoring of Risks Threat and Vulnerability Landscape – Importance of Security controls and Security attributes Schedule of the course: As described below Dates Target Audience: Graduates, Faculty and Professionals. Course will have hands on sessions.Ĭourse Instructors: Prof. This course focuses on security threat modeling, security risk assessment and managing. Security concerns and risk management in information systems / Managing security risk in the information age from 2 to
