SRM INSTITUTE OF SCIENCE & TECHNOLOGY- RAMAPURAM

Faculty of Science and Technology

Department of Computer Science and Applications

                                                                                                                                                        

EVENT TITLE : One day Seminar on Ethical Hacking using Kali Linux

DATE : 30/9/2024 (Monday)

TIME : 12:00 noon to 1:00 pm

VENUE : III floor Lab, Block -V (S & H) SRMIST, Ramapuram

EVENT CONVENER : Mrs. T. Kanimozhi, Assistant Professor, Mrs. J. Muthuselvi, Assistant Professor

EVENT COORDINATORS   : Dr. J. Jebamalar Tamilselvi, Associate Professor/CS,Dr. K. Sutha, Assistant Professor/CS

NO. OF PARTICIPANTS : 83

 

RESOURCE PERSON DETAILS – BRIEF PROFILE OF THE SPEAKER

Mr.Kumaraguru MJ is working as a Senior Technical Trainer in ICT Academy for the past 5 years. He completed his UG in B.E Computer Science from Anna University. He was a member of ILUGC (Indian Linux Users Group of Chennai).

His area of expertise is Cybersecurity and Technical Training. He has certifications in EC – Council Certified Security Analyst: Penetration testing (ECSA) from EC – Council and Introduction to Generative AI from Google Cloud Skills Boost. His knowledge lies in various technologies such as Amazon web services (AWS), UiPath, Python and Web development.

Apart from being in the ICT Academy, Mr. Kumaraguru also has 5 years of experience as a freelance Technical Trainer, ensuring that students and professionals have access to his expertise.

SUMMARY OF THE EVENT

Mrs. T. Kanimozhi, Assistant Professor, Department of Computer Science and Applications, welcomed the attendees and introduced the guests.

Dr. J. Jebamalar Tamilselvi, Associate Professor, and Programme Coordinator, Department of Computer Science and Applications, presented tokens of appreciation to the esteemed guest.

Mr. Kumaraguru began the session with an introduction towards ethical hacking, and discussing various factors and elements that play an important role in becoming a certified Ethical hacker. The session continued further into Ethical hacking.

Types of Hackers

  1. White Hat Hackers: Ethical hackers who use their skills to improve security. They often work for organizations to identify vulnerabilities.
  2. Black Hat Hackers: Malicious hackers who exploit systems for personal gain or to cause harm. Their activities are illegal.
  3. Gray Hat Hackers: Operate between white and black hats. They may exploit systems without permission but do not have malicious intent, often reporting vulnerabilities afterward.
  4. Script Kiddies: Inexperienced individuals who use pre-made scripts or tools to hack without a deep understanding of the underlying technology.
  5. Hacktivists: Hackers who use their skills to promote a political agenda or social change, often by defacing websites or leaking information.
  6. State-Sponsored Hackers: Operate on behalf of governments to conduct espionage, sabotage, or cyber warfare.

Career Opportunities in Cybersecurity

  1. Security Analyst: Monitor systems for security breaches and respond to incidents.
  2. Penetration Tester: Simulate attacks to find vulnerabilities in systems before malicious hackers can exploit them.
  3. Security Consultant: Advise organizations on best practices and policies to enhance security.
  4. Incident Responder: Handle security incidents and breaches, managing the aftermath to mitigate damage.
  5. Security Architect: Design secure networks and systems to protect against potential threats.
  6. Chief Information Security Officer (CISO): Oversee an organization’s overall cybersecurity strategy.

 Certifications in Cybersecurity

  1. CompTIA Security+: Entry-level certification covering foundational security concepts.
  2. Certified Ethical Hacker (CEH): Focuses on penetration testing and ethical hacking techniques
  3. Certified Information Systems Security Professional (CISSP): Advanced certification for experienced security practitioners.
  4. Certified Information Security Manager (CISM): Focuses on managing and governing enterprise security.
  5. Certified Information Systems Auditor (CISA): For those focusing on auditing, control, and assurance.

 Basic Tools

  1. Wireshark: A network protocol analyzer that allows users to capture and interactively browse traffic. It’s useful for diagnosing network issues and monitoring traffic.
  2. Nmap: A network scanning tool that discovers hosts and services on a computer network.
  3. Metasploit: A penetration testing framework that helps find vulnerabilities in systems.
  4. Burp Suite: A tool for testing web application security, providing features for scanning and exploiting vulnerabilities.
  5. Kali Linux: A Linux distribution that comes pre-loaded with numerous cybersecurity tools for penetration testing and security research.

Vote of Thanks

Mr. Rehan Alam Student, Department of Computer Science in Specialization with Cybersecurity delivered the vote of thanks after the session. She expressed her heartfelt gratitude to the guest speakers for providing the concepts of ethical hacking and tools in ethical hacking and spending his valuable time delivering his expertise and valuable insights.

Conclusion

The seminar successfully met its objectives and contributed significantly to the participant’s knowledge and skills in ethical hacking. We look forward to organizing similar events to further promote cybersecurity awareness.

 OUTCOMES OF THE PROGRAM

  • Enhanced understanding of ethical hacking among participants.
  • Practical experience with Kali Linux tools.
  • Increased awareness of cybersecurity issues.
  • Networking opportunities among participants and speakers.

 

ATTENDANCE SHEET

S.NO REGISTER NUMBER REGISTERED NAME CLASS
1 RA2331021020001 K V VIJAY THARUN II CYBER
2 RA2331021020002 POOJA S II CYBER
3 RA2331021020003 YUKESH S II CYBER
4 RA2331021020004 SASI RAJ K II CYBER
5 RA2331021020005 VETRIVEL T II CYBER
6 RA2331021020006 KKESHINII S II CYBER
7 RA2331021020007 MOHAMMED SUHAIL N II CYBER
8 RA2331021020008 HARIKRISHNAN R II CYBER
9 RA2331021020009 HEMANTH P II CYBER
10 RA2331021020010 SESHA GOPALAN S P II CYBER
11 RA2331021020011 PRAVEEN R II CYBER
12 RA2331021020012 SAMEER KHAN J II CYBER
13 RA2331021020013 SWETHA S II CYBER
14 RA2331021020014 HARI HARAN MURUGESAN II CYBER
15 RA2331021020015 KABILESH K II CYBER
16 RA2331021020016 ASWINI V II CYBER
17 RA2331021020017 V L YUVAN GOWTHAM II CYBER
18 RA2331021020018 ABINAYA J A II CYBER
19 RA2331021020019 GOWTHAMAN K S II CYBER
20 RA2331021020020 NANDHAKUMAR K II CYBER
21 RA2331021020021 AKSHYA A II CYBER
22 RA2331021020022 ADHIVISHNU M II CYBER
23 RA2331021020023 R AKAASH II CYBER
24 RA2331021020024 BUVANESH KUMAR D II CYBER
25 RA2331021020025 JAGAN BALASUNDARAM II CYBER
26 RA2331021020026 KISHORE C II CYBER
27 RA2331021020027 D AJITH VARSHAN II CYBER
28 RA2331021020028 JOHN AVINASH I F II CYBER
29 RA2331021020029 JAVED ASHRAF A II CYBER
30 RA2331021020030 MOHAMMED FAYIZ L II CYBER
31 RA2331021020031 PRADEEP M II CYBER
32 RA2331021020032 ABISHWA S II CYBER
33 RA2331021020033 AKASH V II CYBER
34 RA2331021020034 S AJANS II CYBER
35 RA2331021020035 BALAMURAUGAN M II CYBER
36 RA2331021020036 DEVESHWAR M II CYBER
37 RA2331021020037 HARISH KARTHIKEYAN II CYBER
38 RA2331021020038 MD REHAN ALAM II CYBER
39 RA2331021020039 AMRITA K II CYBER
40 RA2331021020040 SALMANKHAN M S II CYBER
41 RA2331021020041 ROKITH ESWARAN R II CYBER
42 RA2331021020042 NAGARISHU TASMIN P II CYBER
43 RA2331021020043 TUSHAR PRADEEP II CYBER
44 RA2331021020044 PRASANTH G II CYBER
45 RA2331021020045 NAVEEN KUMAR I II CYBER
46 RA2331021020046 AKSHAY KUMAR S II CYBER
47 RA2331021020047 DHURGESHWARAN D II CYBER
48 RA2331021020048 THANUJA B II CYBER
49 RA2331021020049 ROSHINI PRIYA J II CYBER
50 RA2331021020050 SWATHI PU II CYBER
51 RA2331021020051 SNEHA G II CYBER
52 RA2331021020052 KARTHIK D II CYBER
53 RA2331021020053 HARIHARAN S II CYBER
54 RA2331021020055 KANIMOZHI S II CYBER
55 RA2431021020001 HARI KRISHNAN P I CYBER
56 RA2431021020002 KRITHICK SEKAR GV I CYBER
57 RA2431021020003 VIGNESH S I CYBER
58 RA2431021020004 RIKASH KUMAR G V I CYBER
59 RA2431021020005 SHIKHA S I CYBER
60 RA2431021020006 SHYAMKHANNA I CYBER
61 RA2431021020007 A VARSHANTH I CYBER
62 RA2431021020008 DIVYADHARSHINI R I CYBER
63 RA2431021020009 ROHITH S I CYBER
64 RA2431021020010 M S AFTAB BASHA I CYBER
65 RA2431021020011 PRIYA C I CYBER
66 RA2431021020012 KEERTHANA G I CYBER
67 RA2431021020013 GULLIPALLI SAHITHI I CYBER
68 RA2431021020014 AKASH S I CYBER
69 RA2431021020015 MUKESH S I CYBER
70 RA2431021020016 LAKSHMI V I CYBER
71 RA2431021020017 THICKSHA S I CYBER
72 RA2431021020018 SIVANI V I CYBER
73 RA2431021020019 MOHAMMED FAZIL I CYBER
74 RA2431021020020 PADMAJA K I CYBER
75 RA2431021020022 EASHA RAJA I CYBER
76 RA2431021020023 S THIRU NARAYAN I CYBER
77 RA2431021020024 M VISHALI I CYBER
78 RA2431021020025 ARJUN K I CYBER
79 RA2431021020026 LOGANATHAN N I CYBER
80 RA2431021020027 NIRANJAN K I CYBER
81 RA2431021020028 GEEVAN I CYBER
82 RA2431021020029 HASINI B I CYBER
83 RA2431021020030 ESHWAR R I CYBER