3rd December, 2020

Pre-Con Training

Importance of CIACON Trainings

CIACON trainings offer attendees deeply technical hands-on courses on topics ranging from broader offensive security to the latest in penetration testing, infrastructure hacking, mobile application security, analysing automotive electrical systems, and everything in between. These hands-on attack and defence courses are led by some of the most sought after industry and subject matter experts from all over the world with the goal of defining and defending tomorrow’s information security landscape.

Play Video
Trainers Associated
+
International Speakers
Workshops We offer
+
People Trained
+

OUR PAST TRAININGS Who Should Attend

 

 

  • Security Practitioners 
  • Security Executives (CISOs, CXOs)
  • Business Developers and Venture Capitalists
  • Vendor Companies and Sponsors (Hardware, Software, Services)
  • Career Seekers and Recruiters ( Students, Expanding Companies
  • Academia (Professors, Researchers )
  • Students
  • Security Enthusiasts
  • Hackers

Benefits Takeaway

  • Certificate of Completion 
  • Lab Access
  • Personal one o one interaction with Trainer
  • Internship Opportunity
  • Discount Coupon for Goodies

CIACON Trainings Technical Workshops cum Trainings

Access to Join the Official Trainings will be given to only Registered Email ID's, those who have purchased the passes.

Practical Mobile App Attacks by Example

Abraham Aranguren

CEO, 7A Security

If you are the kind of person who enjoys workshops with practical information that you can immediately apply when you go back to work, this workshop is for you, all action, no fluff.

Attendants will be provided with training portal access to practice some attack vectors, including multiple mobile app attack surface attacks, deeplinks and mobile app data exfiltration with XSS. This includes: Lifetime access to a training VM, vulnerable apps to practice, guided exercise PDFs and video recording explaining how to solve the exercises.

This workshop is a comprehensive review of interesting security flaws that we have discovered over the years in many Android and iOS mobile apps: An entirely practical walkthrough that covers anonymized juicy findings from reports that we could not make public, interesting vulnerabilities in open source apps with strong security requirements such as password vaults and privacy browsers, security issues in government-mandated apps with considerable media coverage such as Smart Sheriff, apps that report human right abuse where a security flaw could get somebody killed in the real world, and more.

  • DATE : 3-12-2020
  • TIME : 2.30 PM – 6.30 PM (IST) 
  • Joining will be permitted to Registered Email ID’s only.

Cyber Forensics

Sankarraj Subramanian

Founder & CEO, Prompt Infotech

In this course, you will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. You will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. You will learn how to perform a forensic investigation on both Unix/Linux and Windows systems with different file systems. You will also be guided through forensic procedures and review and analyze forensics reports.

Here are the topics that will be covered in the session.
 
Procedure for first responders to a computer crime scene
Review of disc images by searching and listing keywords 
Create, mount and explore digital images for forensics 
Creating a forensics investigation report 
Acquisition Method of Digital Forensics 
Forensics Website & Browser History
 
  • DATE : 3-12-2020
  • TIME : 9.00 AM – 1.30 PM (IST)
  • Joining will be permitted to Registered Email ID’s only.

Buffer Overflow

Sanjeev Multani

Cyber Security Consultant

A buffer overflow is a popular software coding error that an intruder could use to take control over your system. To efficiently decrease buffer overflow vulnerabilities, it is necessary to understand what buffer overflows are, what threats they act to your applications, and what methods attackers use to successfully exploit these vulnerabilities.

Here are the topics that will be covered in the session.
 
Starting from Assembly
Python,
Register
Socket ProgrammingExploitation
BOF Concept
BOF Types
BOF 6 Waves Exploitation
Memory Corruption
 
  • DATE : 3-12-2020
  • TIME : 7.00 PM – 11.00 PM (IST)
  • Joining will be permitted to Registered Email ID’s only

OUR SUPPORTERS Our Sponsors