SRM INSTITUTE OF SCIENCE & TECHNOLOGY- RAMAPURAM
Faculty of Science and Technology
Department of Computer Science and Applications
EVENT TITLE : One day Seminar on Ethical Hacking using Kali Linux
DATE : 30/9/2024 (Monday)
TIME : 12:00 noon to 1:00 pm
VENUE : III floor Lab, Block -V (S & H) SRMIST, Ramapuram
EVENT CONVENER : Mrs. T. Kanimozhi, Assistant Professor, Mrs. J. Muthuselvi, Assistant Professor
EVENT COORDINATORS : Dr. J. Jebamalar Tamilselvi, Associate Professor/CS,Dr. K. Sutha, Assistant Professor/CS
NO. OF PARTICIPANTS : 83
RESOURCE PERSON DETAILS – BRIEF PROFILE OF THE SPEAKER
Mr.Kumaraguru MJ is working as a Senior Technical Trainer in ICT Academy for the past 5 years. He completed his UG in B.E Computer Science from Anna University. He was a member of ILUGC (Indian Linux Users Group of Chennai).
His area of expertise is Cybersecurity and Technical Training. He has certifications in EC – Council Certified Security Analyst: Penetration testing (ECSA) from EC – Council and Introduction to Generative AI from Google Cloud Skills Boost. His knowledge lies in various technologies such as Amazon web services (AWS), UiPath, Python and Web development.
Apart from being in the ICT Academy, Mr. Kumaraguru also has 5 years of experience as a freelance Technical Trainer, ensuring that students and professionals have access to his expertise.
SUMMARY OF THE EVENT
Mrs. T. Kanimozhi, Assistant Professor, Department of Computer Science and Applications, welcomed the attendees and introduced the guests.
Dr. J. Jebamalar Tamilselvi, Associate Professor, and Programme Coordinator, Department of Computer Science and Applications, presented tokens of appreciation to the esteemed guest.
Mr. Kumaraguru began the session with an introduction towards ethical hacking, and discussing various factors and elements that play an important role in becoming a certified Ethical hacker. The session continued further into Ethical hacking.
Types of Hackers
- White Hat Hackers: Ethical hackers who use their skills to improve security. They often work for organizations to identify vulnerabilities.
- Black Hat Hackers: Malicious hackers who exploit systems for personal gain or to cause harm. Their activities are illegal.
- Gray Hat Hackers: Operate between white and black hats. They may exploit systems without permission but do not have malicious intent, often reporting vulnerabilities afterward.
- Script Kiddies: Inexperienced individuals who use pre-made scripts or tools to hack without a deep understanding of the underlying technology.
- Hacktivists: Hackers who use their skills to promote a political agenda or social change, often by defacing websites or leaking information.
- State-Sponsored Hackers: Operate on behalf of governments to conduct espionage, sabotage, or cyber warfare.
Career Opportunities in Cybersecurity
- Security Analyst: Monitor systems for security breaches and respond to incidents.
- Penetration Tester: Simulate attacks to find vulnerabilities in systems before malicious hackers can exploit them.
- Security Consultant: Advise organizations on best practices and policies to enhance security.
- Incident Responder: Handle security incidents and breaches, managing the aftermath to mitigate damage.
- Security Architect: Design secure networks and systems to protect against potential threats.
- Chief Information Security Officer (CISO): Oversee an organization’s overall cybersecurity strategy.
Certifications in Cybersecurity
- CompTIA Security+: Entry-level certification covering foundational security concepts.
- Certified Ethical Hacker (CEH): Focuses on penetration testing and ethical hacking techniques
- Certified Information Systems Security Professional (CISSP): Advanced certification for experienced security practitioners.
- Certified Information Security Manager (CISM): Focuses on managing and governing enterprise security.
- Certified Information Systems Auditor (CISA): For those focusing on auditing, control, and assurance.
Basic Tools
- Wireshark: A network protocol analyzer that allows users to capture and interactively browse traffic. It’s useful for diagnosing network issues and monitoring traffic.
- Nmap: A network scanning tool that discovers hosts and services on a computer network.
- Metasploit: A penetration testing framework that helps find vulnerabilities in systems.
- Burp Suite: A tool for testing web application security, providing features for scanning and exploiting vulnerabilities.
- Kali Linux: A Linux distribution that comes pre-loaded with numerous cybersecurity tools for penetration testing and security research.
Vote of Thanks
Mr. Rehan Alam Student, Department of Computer Science in Specialization with Cybersecurity delivered the vote of thanks after the session. She expressed her heartfelt gratitude to the guest speakers for providing the concepts of ethical hacking and tools in ethical hacking and spending his valuable time delivering his expertise and valuable insights.
Conclusion
The seminar successfully met its objectives and contributed significantly to the participant’s knowledge and skills in ethical hacking. We look forward to organizing similar events to further promote cybersecurity awareness.
OUTCOMES OF THE PROGRAM
- Enhanced understanding of ethical hacking among participants.
- Practical experience with Kali Linux tools.
- Increased awareness of cybersecurity issues.
- Networking opportunities among participants and speakers.
ATTENDANCE SHEET
S.NO | REGISTER NUMBER | REGISTERED NAME | CLASS |
1 | RA2331021020001 | K V VIJAY THARUN | II CYBER |
2 | RA2331021020002 | POOJA S | II CYBER |
3 | RA2331021020003 | YUKESH S | II CYBER |
4 | RA2331021020004 | SASI RAJ K | II CYBER |
5 | RA2331021020005 | VETRIVEL T | II CYBER |
6 | RA2331021020006 | KKESHINII S | II CYBER |
7 | RA2331021020007 | MOHAMMED SUHAIL N | II CYBER |
8 | RA2331021020008 | HARIKRISHNAN R | II CYBER |
9 | RA2331021020009 | HEMANTH P | II CYBER |
10 | RA2331021020010 | SESHA GOPALAN S P | II CYBER |
11 | RA2331021020011 | PRAVEEN R | II CYBER |
12 | RA2331021020012 | SAMEER KHAN J | II CYBER |
13 | RA2331021020013 | SWETHA S | II CYBER |
14 | RA2331021020014 | HARI HARAN MURUGESAN | II CYBER |
15 | RA2331021020015 | KABILESH K | II CYBER |
16 | RA2331021020016 | ASWINI V | II CYBER |
17 | RA2331021020017 | V L YUVAN GOWTHAM | II CYBER |
18 | RA2331021020018 | ABINAYA J A | II CYBER |
19 | RA2331021020019 | GOWTHAMAN K S | II CYBER |
20 | RA2331021020020 | NANDHAKUMAR K | II CYBER |
21 | RA2331021020021 | AKSHYA A | II CYBER |
22 | RA2331021020022 | ADHIVISHNU M | II CYBER |
23 | RA2331021020023 | R AKAASH | II CYBER |
24 | RA2331021020024 | BUVANESH KUMAR D | II CYBER |
25 | RA2331021020025 | JAGAN BALASUNDARAM | II CYBER |
26 | RA2331021020026 | KISHORE C | II CYBER |
27 | RA2331021020027 | D AJITH VARSHAN | II CYBER |
28 | RA2331021020028 | JOHN AVINASH I F | II CYBER |
29 | RA2331021020029 | JAVED ASHRAF A | II CYBER |
30 | RA2331021020030 | MOHAMMED FAYIZ L | II CYBER |
31 | RA2331021020031 | PRADEEP M | II CYBER |
32 | RA2331021020032 | ABISHWA S | II CYBER |
33 | RA2331021020033 | AKASH V | II CYBER |
34 | RA2331021020034 | S AJANS | II CYBER |
35 | RA2331021020035 | BALAMURAUGAN M | II CYBER |
36 | RA2331021020036 | DEVESHWAR M | II CYBER |
37 | RA2331021020037 | HARISH KARTHIKEYAN | II CYBER |
38 | RA2331021020038 | MD REHAN ALAM | II CYBER |
39 | RA2331021020039 | AMRITA K | II CYBER |
40 | RA2331021020040 | SALMANKHAN M S | II CYBER |
41 | RA2331021020041 | ROKITH ESWARAN R | II CYBER |
42 | RA2331021020042 | NAGARISHU TASMIN P | II CYBER |
43 | RA2331021020043 | TUSHAR PRADEEP | II CYBER |
44 | RA2331021020044 | PRASANTH G | II CYBER |
45 | RA2331021020045 | NAVEEN KUMAR I | II CYBER |
46 | RA2331021020046 | AKSHAY KUMAR S | II CYBER |
47 | RA2331021020047 | DHURGESHWARAN D | II CYBER |
48 | RA2331021020048 | THANUJA B | II CYBER |
49 | RA2331021020049 | ROSHINI PRIYA J | II CYBER |
50 | RA2331021020050 | SWATHI PU | II CYBER |
51 | RA2331021020051 | SNEHA G | II CYBER |
52 | RA2331021020052 | KARTHIK D | II CYBER |
53 | RA2331021020053 | HARIHARAN S | II CYBER |
54 | RA2331021020055 | KANIMOZHI S | II CYBER |
55 | RA2431021020001 | HARI KRISHNAN P | I CYBER |
56 | RA2431021020002 | KRITHICK SEKAR GV | I CYBER |
57 | RA2431021020003 | VIGNESH S | I CYBER |
58 | RA2431021020004 | RIKASH KUMAR G V | I CYBER |
59 | RA2431021020005 | SHIKHA S | I CYBER |
60 | RA2431021020006 | SHYAMKHANNA | I CYBER |
61 | RA2431021020007 | A VARSHANTH | I CYBER |
62 | RA2431021020008 | DIVYADHARSHINI R | I CYBER |
63 | RA2431021020009 | ROHITH S | I CYBER |
64 | RA2431021020010 | M S AFTAB BASHA | I CYBER |
65 | RA2431021020011 | PRIYA C | I CYBER |
66 | RA2431021020012 | KEERTHANA G | I CYBER |
67 | RA2431021020013 | GULLIPALLI SAHITHI | I CYBER |
68 | RA2431021020014 | AKASH S | I CYBER |
69 | RA2431021020015 | MUKESH S | I CYBER |
70 | RA2431021020016 | LAKSHMI V | I CYBER |
71 | RA2431021020017 | THICKSHA S | I CYBER |
72 | RA2431021020018 | SIVANI V | I CYBER |
73 | RA2431021020019 | MOHAMMED FAZIL | I CYBER |
74 | RA2431021020020 | PADMAJA K | I CYBER |
75 | RA2431021020022 | EASHA RAJA | I CYBER |
76 | RA2431021020023 | S THIRU NARAYAN | I CYBER |
77 | RA2431021020024 | M VISHALI | I CYBER |
78 | RA2431021020025 | ARJUN K | I CYBER |
79 | RA2431021020026 | LOGANATHAN N | I CYBER |
80 | RA2431021020027 | NIRANJAN K | I CYBER |
81 | RA2431021020028 | GEEVAN | I CYBER |
82 | RA2431021020029 | HASINI B | I CYBER |
83 | RA2431021020030 | ESHWAR R | I CYBER |