To impart the fundamentals of ISMS to the candidate
Vinod Kumar Agrasala, Managing Director & Principal Consultant, Wings2i IT Solutions Pvt Ltd.
Vinod is a richly experienced and established professional in the field of IT Service Management, based in Bangalore, India. He is a certified 'ITIL® Expert'. He was engaged by numerous global organizations as expert consultant in the areas of Service management, ITIL®, ISO/IEC 20000 and ISO/IEC 27001. Vinod is distinguished in the industry for his training skills as well, having trained more than 1500 professionals at various levels of ITIL® and ISO/IEC 20000. In his overall career spanning around 15 years, Vinod has worked in different capacities in operations to quality management to consultancy and trainings in global organizations like Wipro Technologies, QAI, IBM Global services, Microland, Modi Xerox and GLOPORE IMS. He can be reached at email@example.com
Anybody who need to get an idea on ISMS
This workshop will provide a highly technical and in-depth treatment of Wi-Fi security. The emphasis will be to provide the participants with a deep understanding of the principles behind various attacks and not just a quick how-to guide on publicly available tools. We will start our journey with the very basics by dissecting WLAN packet headers with Wireshark, then graduate to the next level by cracking WEP, WPA/WPA2 and then move on to real life challenges like orchestrating Man-in-the-Middle attacks, creating Wi-Fi Backdoors and solving some live CTF style challenges together!
Vivek Ramachandran started working on Wi-Fi Security since 2003. He has spoken at conferences such as Blackhat, Defcon and Toorcon on Wireless Security and is the discoverer of the Caffe Latte attack. He also broke WEP Cloaking, a WEP protection schema in 2007 publically at Defcon. Vivek is the author of the book "Wireless Penetration Testing using BackTrack 5" due for release in August 2011. He was one of the programmers of the 802.1x protocol and Port Security in Cisco's 6500 Catalyst series of switches. He was one of the winners of Microsoft Security Shootout contest held in India among a reported 65,000 participants. He is best known in the hacker community as the founder of SecurityTube.net where he routinely posts videos on Wi-Fi Security, Assembly Language, Exploitation Techniques etc. SecurityTube.net gets over 100,000 unique visitors a month. Vivek's work on wireless security has been quoted in BBC online, InfoWorld, MacWorld, The Register, IT World Canada etc. places. This year he is either speaking or training at Blackhat, Defcon, 44con, Hacktivity, HITB-ML, Brucon, Derbycon, HashDays, SecurityByte and MIT, Boston.
Hackers, Penetration Testers, Managers who are curious about the challenges in Wi-Fi security and want to see the latest and best hacking tools and techniques for Wi-Fi live!
Metasploit is one the most popular vulnerability assessment and exploit research frameworks available today. It is a community driven open source project and hundreds of security researchers contribute their know how to it regularly. In this workshop, we will take you through an in-depth tutorial on using Metasploit for vulnerability assessment and exploit research.
Security Professionals, Security/Network monitoring professionals, system administrator, incident handler.
This course will address the problems faced by security operations team to identify hacking attempts in there network by looking at various logs and alerts generated by security devices/SIEM. The biggest hurdle of any security professional is to identify the whether an alert generated by a security software/device is really a hack attempt/policy violation or a false positive. As a security professional once needs to be well versed with the different attack scenarios, logging formats and semantics and quick decision making during an attack outbreak. The objective of this course to make the attendees understand how to identify attacks and false positives, the technical details of different security software/devices logs and how to analyse them, understanding ones own network architecture and the relevant attack vectors for their network.
The attendess will get to learn the following during the workshop:
Aseem "@" Jakhar is the chief researcher at Payatu Technologies , a startup in information security trainings and consulting and founder of null - The open security community (registered not-for-profit organization, http://null.co.in). He has extensive experience in system programming, security research and consulting. He has worked on various security products and tools. He is also the author of Jugaad, an open source thread injection kit for Linux. He has been a speaker at various security conferences including Defcon, Xcon, Blackhat EU, Clubhack, IBM Security & Privacy Bangalore, Cocon, ISACA Bangalore, Bangalore Cyber secuity summit, National Police Academy Cyber crime seminar Hyderabad. At null he manages the overall operations and null initiatives like Keeda project, nullcon security conference.
Murtuja is Co-Founder of null(Open security community) and Co-Founder, Payatu Technologies Pvt. Ltd. He has worked on IBM-ISS (Internet Security System) project as Senior System Engineer. He has worked on Securegate UTM (Unified Threat Management) product and design and developed various features such as Firewall, IPS, VPN, Application Proxies, and Authentication Modules.
A true open source enthusiast at heart he has expertise in Linux based product development/ customization, security-patching/hardening, penetration testing and integration of open source solutions. He is actively involved in security practices, development, consultancy, VA/PT with prestigious financials organizations and banks. Murtuja has conducted various security trainings for reputed organizations including Cognizant and Wipro.
Professional life as an Information security consultant. Provided services for several organizations in both private and government sectors. Has completed several security assignments for his clients and has a keen interest in solving cyber crime issues.
Rohit Sharma - Independent computer security researcher, active member of null delhi chapter and social engineering evangelist, currently working as software Engineer at Infogain India Pvt Ltd.Trainers profile
Harsimran Walia - An IIT Delhi alumni, currently working as Research Scientist in McAfee Labs and passionate about computer security.
Ajit Hatti - is a Security Researcher. Co-founded Null & is employed with Emerson India. Currently working on security of Critical Infrastructures.
Prashant Mahajan, Ajit Hatti, Pardhasaradhi a.k.a babloo
Information Security is a vast subject one of the interesting subject in it is Digital Forensics. In this workshop we will cover the basics of forensics. Workshop will emphasise on use of open source tools which are freely available and part of Matriux Distribution.This workshop will be covered with Imaging a Windows disks in various formats, analyzing the images with different tools to extract evidences,recovering the data from the images and documenting the evidences found with the procedure, concluded with how to Report the artifacts.
Security in the .Net world.
It will cover common attacks [cross site,sql etc] and how to handle them too....
To encurage a culture of including security into each phase of SDLC and ensure that architects, developers and testers undertand reviewing of security before hand.
K.V. Prashantn and Akash Mahaja.
Anyone with software development/ Quality/ IT knowledge
Armorize code secure, Acunetix, Paros, Weg scarab, codescan, etc..
IT professionals, developers, testing, quality professionals, anyone wants to know what application security is all about
Mr. Vishnu Tiwari, MVP Microsoft BizTalk Server and Member of Developer Group Advisory Council at Microsoft, is an experienced solution architect and seasoned speaker. He has spoken on various Technical Summits and Organizations. He is working as Account Technology Specialist with one of the leading organization in the country.
WCF/Web Services Developers and managers, SOAP Testers and managers, SOA, ESB Architects
WCF Service development/SOAP Principles knowledge
06 Oct 2011 (Thursday)
Cochin, Kerala. However, the venue will be declared on 03 Oct 2011 (Monday).
The rates for attending the workshops (does not include conference fees) are follows:
The rates for combo pack (workshops + conference) are follows:
Registrations can be done through two ways:
Online mode – Visit http://conference.ayojak.com/event/c0c0n-2011-international-information-security-and-hacking-conference to register online for c0c0n 2011 pre-conference workshop.
Offline mode – Send a DD / Cheque Favoring “Information Security Research Association” or do a money transfer to the following bank account:
Bank - Bank of India
Account Name: Information Security Research Association
Account Number: 850420110000065
Branch: Ernakulam Housing Finance and Personal Banking
IFSC Code: BKID0008504 (used for RTGS and NEFT transactions)
PAN # - AAAA14718G
A single registration is valid for one workshop (workshop code WS1 to WS10). All the workshops will be running parallel on 06 Oct 2011.
For information about the c0c0n 2011 Workshops and Conference including Exhibition, Sponsorship, Registration, discounts and general conference enquiries please contact: