6th December, 1300hrs to 1600hrs
Pre-requisite:
- BYOL : Bring Your Own Laptop
- Basic knowledge of web technologies
- Basic knowledge of Information Security
Workshop Outline
Cloud computing is an emerging trend in the IT space. Companies and
infrastructures are moving towards cloud computing and lot of
applications are now running as part of the cloud. There are different
models for the hosting like SaaS, PaaS and IaaS, running Software,
Platform or Infrastructure as a Service. Cloud computing is having range
of security issues and it is imperative to address them. In last few
months we have seen interesting applications like Twitter, Amazon,
Google Apps etc. are attacked in the cloud. This tutorial will give you
overview on cloud technologies and their security aspects. We will have
demonstrations and concept learning through real life cases. We will
walk you through some tools and technologies which can be used to
protect and assess your cloud driven applications. Here is the list of
topic which is going to be covered during the class.
- Introduction to Cloud Computing
- Cloud Architectures and Technologies
- Cloud protocols and interactions
- Enterprise Cloud Threat Model and Risks
- Real life cases - Hacks & Attacks
- Cloud Security Evaluation Frameworks - Methodlogies, Apporaches
and Model
- Cloud Hacks & Attacks
- Attacking Identity and Access
- Virtualization bypasses
- Attacking Storage and Databases
- Exploiting XML and JSON Cloud streams
- Logical attacks in the Cloud Apps
- Hacking Cloud APIs and Services
- Privacy hacks and attacks
- Cloud Vulnerabilities and Exploits
- Client side hacks in the cloud
- Scanning and Assessing Clouds
- Analyzing Source Code for Cloud Apps
- Cloud Countermeasure and Security
Register
|
6th December, 0900hrs to 1200hrs
Pre-requisite:
- BYOL : Bring Your Own Laptop
- Basic knowledge of computers
- Preferable - Basic knowledge of C and any scripting language
- Basic knowledge of networking.
- Basic knowledge of web.
Workshop Outline The Security & Hacking 101 workshop offers
participants with grounds up understanding of how the whole security
ecosystem works. It will cover various communication protocols and
techniques in more details than what is taught in the normal courses.
Hands-on and demonstrations on attacks and subversion methods will be
given for better and easy understanding of the participants. The course
will start of with the basics of networking and then delve into detailed
explanation on different kinds of attacks and their mitigation
techniques. At the end of the session the participants will be armed
with practical and fairly good understanding of network and web
security.
What to expect
- Hands-on
- Practical tips and tricks.
- Clearing some common misconceptions and doubts.
- Loads of Fun hacking.
What NOT to expect
- Mastering Ninja hacking skills overnight.
What is expected from the attendees
Register
|