SAKEC is an Autonomous Institute Affiliated to University of Mumbai

Advanced Cyber Security & Digital Forensics Hands-on Workshop

Advanced Cyber Security & Digital Forensics Hands-on Workshop

Workshop Description: 

SAKEC Cyber Security Department is thrilled to announce that Marcraft USA & AIIPL Industry Sponsored Advanced Forensics Training and Professional Training Center organising 5 days Physical Hands-On workshop on Advanced Cyber Security & Digital Forensics !!!! Register now.

Workshop Objective:

  • Equip participants with advanced cybersecurity skills for facing real-world cyber security challenges and digital forensics skills for effective investigation and evidence analysis.
  • Provide Physical Hands-On experience with networking devices, security controllers, as well as digital forensic tools and techniques used in real-world scenarios.
  • To understand how security principles apply & differ in Enterprise IT, Industrial OT and Medical IoT Environments  
  • Develop a comprehensive understanding of digital forensic methodologies and cybersecurity practices.

Highlights for the Program:

  • Learn Advanced topics in Cyber Security and Digital Forensics.
  • Physical Hands-On Experience for performing real industrial practices.
  • Exposure to Industry Hardware and Professional Software Tools used in investigating actual criminal cases and to protect infrastructure across different security environments.
  • Real Case Studies

Workshop Outcomes:

  • Understand the CIA Triad and how it applies to different network environments.
  • Understand the complete digital forensic investigation process (pre-investigation, investigation, and post-investigation phases).
  • Learn to apply the AAA-A security framework to program Security controllers to physically secure critical infrastructure.
  • Gain expertise in tools like HashCalc, FTK Imager, Autopsy, and WinHex for data acquisition and analysis.
  • Learn to configure VLANs on network switches for Enterprise IT Network operation.
  • Learn anti-forensic techniques and implement countermeasures for steganography, password recovery, and encryption.
  • Learn to create ladder-logic programs for PLCs operating in industrial manufacturing processes. 
  • Conduct forensic analysis on Windows OS, smartphones, and malware to identify and report suspicious activities.
  • Learn to perform Bluetooth reconnaissance on a medical IT network environment while understanding the principle of Privacy.
  • Develop the ability to create detailed forensic reports based on collected and analyzed evidence.

Subject Mapped:  Ethical Hacking & Digital Forensics Lab, Mobile Forensic Lab, CYSE Honours

Who all Can Attend ?

Faculty, Students, Industry Person, M.Tech Students, Ph.D Students, Researchers

Note: 

Cost Rs 12,000 including GST, Training, Certificate.

Account Details : 

Registration Fees Rs. 12000/- can be deposited to SAKEC CYBER SECURITY DEPARTMENT account details as mentioned:

Name of the account holder: SAKEC CYBER SECURITY DEPARTMENT

Bank Account number: 50100495153237

Bank of Name: HDFC Bank

IFSC Code: HDFC0006432

Account type: Saving

Resource Persons:  Mr. Leander Pillai

About Workshop : 

The hands-on workshop provides in-depth training on Cybersecurity and Digital Forensics, covering key topics such as Physical Asset Security, the forensic investigation process, Industrial OT Network Security, and tools like HashCalc, FTK Imager, Wireshark, PuTTY, and Autopsy. Participants will gain practical experience in Medical IT security, anti-forensics techniques, and countermeasures, while working with network devices, data acquisition, security sensors, Windows OS, smartphone forensics, PLCs, and malware analysis through real-world scenarios.

Registration Link

Last date of Registration: 25th January 2025  

For more information contact: Ms. Pranali Pawar, 8655353458, Ms. Priyanka Singh, 9953868722

Date:  10th February 2025 to 14th February 2025

Time:  10:00am to 5:00pm

Venue: 

Day 1 & 2: SAKEC Marcraft USA & AIIPL Industry Sponsored Advance Forensics Training and Professional  Training Center (401 Lab, 4th Floor, Cyber Security Department)

Day 3, 4 & 5: AIIPLTech Ideation Centre (Akshar Business Park, Z1 Wing – 1088/89/90, Sector 25, Vashi, Navi Mumbai, Maharashtra 40070

 Course Details:

DOMAIN TOPICS
Digital Forensics and Investigation Process
  • Fundamental of Digital Forensics
  • Roles    and    Responsibilities    of   a    Digital Forensic Investigator
  • Digital Forensic Investigation Process Importance
  • Pre-Investigation:   Investigation   Phase:   Post Investigation
Storage Devices and

File Systems

File System of Windows

Different Types of Disk Drives

Data Acquisition Data Acquistion Fundamentals

Types of Data Acquisition

Anti-Forensics
  • Anti – Forensic Techniques
  • Passwords
  • Steganography
  • Encryption
  • Countermeasure
Localhost Security
  • Use the Encrypting File System to protect data.
  • Describe the benefits of encryption.
  • Compare NTFS permissions and EFS.
  • Test EFS on User files and folders.
Internet Security
  • Describe and contrast Steganography with Cryptography.
  • Create a hidden message using a Steganography program.
  • Implement file hashing and compare hashes.
  • Describe the usage and importance of file hashing and define file integrity.
Physical Asset Security
  • Verify the basic operation of a Physical Asset Protection system.
  • Use the ELK RP2 application to implement a multi-zone security system for the designated environments.
  • Configure a basic security controller for operation as an entry/exit controller.
  • Enroll users to enable access cards based on user needs.
  • Configure the Push-to-Exit button.
  • Test access card usage and audit user access.
  • Test the basic operation of the Physical Asset Protection system.
Industrial OT Network Security
  • Become familiar with the components of a typical PLC-controlled industrial process
  • Examine the roll of actuators and sensors in an ICS.
  • Create a ladder logic program to control a simple process operation by configuring common ladder logic components for operation:
  • Sensors (physical inputs)
  • Actuators (physical outputs)
  • Logical operators
  • Create a PLC program to control the functions of the Conveyor system
  • Start and stop the Conveyor motor
  • Sort product work pieces by size
  • Position acceptable work pieces for pickup
  • Transfer control to a second PLC
  • Test the Conveyor system for proper operation.
Enterprise Network Security
  • Use a PuTTY application to open a session on an enterprise switch.
  • Use IOS commands to display switch configurations and view various settings.
  • Create and test Virtual LAN segments on a L2/L3 switch.
  • Assign specific ports to VLANs in an L2/L3 switch.
  • Display established VLANs in the Cisco CLI environment.
  • Reload a startup-configuration into an enterprise switch.
Medical IT Network Security
  • Use a USB Bluetooth radio and supporting software application to monitor Bluetooth LE traffic.
  • Use a packet sniffer application to examine specific data obtained from Bluetooth traffic.
  • Parse a Bluetooth packet sniffed by the packet analyzer.
  • Locate specific data within the Bluetooth packet.
Windows OS Forensics
  • Volatile and Non Volatile
  • Windows Memory and Registry Analysis
  • Cache,  Cookie and History Recorded in Web Browser
  • Windows Files and Metadata
Smartphone Forensics
  • Mobile Forensic Concept
  • Mobile Forensics Process
  • File System Logical and Physical Acquisition
  • Android Forensic Analysis
Malware Forensics
  • Malware Forensics
  • Suspicious Behaviour
  • Suspicious Documents

Accredited with 'A' Grade (2021) by NAAC for 5 years
Ranked in band 251-300 (2020) by NIRF
UG Programs for Computer, IT & EXTC Accredited by NBA
UG Programs for Computer & IT granted 'permanent affiliation' by University of Mumbai

 

Website powered by ALV Works

Enquire Now
Admission 2026-27