only40 days, 09 hours, 50 minutes and 44 seconds left

Ethical Hacking & Information Security Event

Grand Event on 11th & 12th April 2015 at IIT Delhi

Register Now
About the Conference

About Chakravyuh

Chakravyuh, the Flagship Event of Kyrion Digital Securities, is conducted every year to invite all the Ethical Hackers & IT Security Experts to come down under one roof to participate for the India’s Biggest IT Security Event.

The Event features Hackers from all over India wherein participants will have the chance to share knowledge and opinion with top leaders – discuss their problems related to IT Security, in this way Chakravyuh bridges the gap between Industry & Security Experts.

This year Chakravyuh 2015 is being organized at Indian Institute of Technology Delhi on 11th & 12th April 2015. It was organized at Indian Institute of Technology Delhi in year 2013, Indian Institute of Technology Kharagpur in year 2012 and Indian Institute of Technology Kanpur in year 2011.


Be a Part of India’s First Grand Scale IT Security Event “Chakravyuh” at IIT Delhi.

Keynote Speakers

Here is few of speakers at the Chakravyuh Conference

Speaker Image
Sulabh Jain
Information Security Consultant at Tech Mahindra
Speaker Image
Alok Gupta
Founder & Managing Director for Pyramid Cyber Security & Forensic
Speaker Image
Tarun Wig
Co-founded & Director at Innefu Labs
Speaker Image
Shubham Mittal
Security Researcher at Makemytrip India
Speaker Image
Shubham Gupta
Infosec Specialist at Fiserv India Pvt Ltd
Speaker Image
Harminder Singh
Founder & Director at Axpino Technologies Pvt Ltd

Chakravyuh IIT Delhi Program

An Ethical Hacking & Information Security Workshop at IIT Delhi

09:00 am - 09:30 am

Registration

09:30 am - 10:00 am

Inauguration Function

10:00 pm - 01:00 pm

Session 1 – Hacking for fun

ISMS with Concept of Hacking
Hacking Emails and Social Networks
Hacking and Securing Windows Systems
Google Hacking

02:00 pm - 04:00 pm

Session 2 – Industrial Talks

09:00 am - 11:00 am

Session 3 – Web Application Penetration Testing

Introduction to Penetration Testing
Setting Up Web Application Penetration Testing Lab
Beginning Application Penetration Testing
Testing for Security Vulnerabilities

  • SQL Injection

  • Cross Site Scripting

  • Session Hijacking

  • Local and Remote File Inclusion Attacks

  • Parameter Tampering

Basics of Secure Programming
  • Use Cryptography for Application Security

  • Data Validation Strategies

  • Session Management

11:00 am - 01:00 pm

Session 4 – Malware: Attack, Detect and Defend

Introduction to Computer Malware
Virus and Worm: Infectious Malware
Trojan Horse: Concealment
Detection and Removal

02:00 pm - 04:00 pm

Session 5 – Network Hacking

Wired Network Hacking
Wireless Network Hacking

04:00 pm - 06:00 pm

Session 6 – What After Hacking

Cyber Forensics
Cyber Law

06:00 pm - 07:00 pm

Valediction & Certificate Distributions

Organize a Chakravyuh Workshop at your Campus

Contact us at 9555944466

Loophole - Ethical Hacking Workshop

The Loophole - Ethical Hacking Workshop is a two days workshop which has revolutionised the way ethical hacking was percieved by students. It is our most popular project that caters to the maximum number of students and has won laurals for its innovative approach from the industry heads.

Overview of the Workshop

The Kyrion's Loophole Ethical Hacking Workshop trains you in every domain related to Cyber Security,that too Ethically!!! However, we do everything - Ethically!!! To be an Ethical Hacker, it is important to think like them! We train you to coordinate various different internet service providers and exploit their weakness to meet your own ends. The focus of the workshop is to teach you how to protect yourself from the menace of hacking. During the workshop, the primary aim is to introduce you to the current popular attacks and explain the techniques to counter them. Don't worry, it would not be a "scriptkiddie" material, it will cover concepts and working of the Attacks. Development of your own tools and Scripts will also be covered.

The other focus of the workshop is to enable you to build up future systems. It includes making you aware of the current shortcomings which give rise to bad security systems. As it is a vast topic, we will be giving an overview of what constitutes an 'ideal secure system'. This course would equip students to counter the potential attacks. Also, the aim would be to impart technical know-how of how to make the Internet transactions safe and secure. This would be a founding stone for India to emerge as a Super Power in times to come.

Loophole - Ethical Hacking Workshop Curriculum (Detailed Module)

  • ISMS with Concept of Hacking
  • Indian Cyber Law
  • Web Application Penetration Testing
  • Basics of Secure Programming
  • Hacking Emails and Social Networks
  • Google Hacking
  • Data Security and Recovery
  • World of Digital Virtualization
  • Hacking and Securing Windows Systems
  • Malware: Attack, Detect and Defend
  • Software Cracking: Product Key Generation
  • Mini Chakravyuh - Security Challenge
  • Mobile Hacking Techniques and Security Concepts

Kyrion Ethical Hacking Workshop Details

Pre-requisites:

  • Zest to learn new things
  • Passion to gain knowledge in their area of interest
  • Basic knowledge of How to use Computer & the Internet

After the Workshop:

  • Assurance of changing your point of view towards a Computer and its Security
  • Will develop a Hacking Maniac inside you
  • At least 95% Security as a normal user in your digital life

Benefits:

  • Loophole - Ethical Hacking Workshop Toolkit
  • Authorized Certificate after the completion of the Workshop

Course Duration:

  • 16 hours (Will be covered in 2 days, 8 hours daily)

Workshop Charges:

  • Rs 1,200/- per student

Organize a workshop at your College

  • Check the Availability of the following Technical Requirements at your campus:
    • An Air-conditioned or well ventilated Stepped Seating Seminar Room with a good sitting capacity
    • Speaker System in the Seminar Hall
    • Two cordless mic (One Collar mic preferred)
    • One LCD projector for demonstration
    • Internet Connection for Laptop (Without Proxy if possible)
  • A Formal Confirmation on the College Letter Head by the authorized person
  • Discussion for the best possible dates of the workshop and the team Kyrion will be there at your college for the best workshop ever

Kyrion will provide following Marketing Support for Publicity and promotion of the workshop:

  • Specially designed Kyrion's Loophole Workshop Posters
  • Access to Kyrion's Loophole Marketing Kit

Benefits Provided by Kyrion to the Organizers:

  • Mementoes to the colleges for hosting event in their campus
  • Certificates to the Coordinators for successfully coordinating/organizing the workshop

Chakravyuh Conference is Presented by

Don't miss the event!

We will inform you when the time comes

Conference Workshop

The Conference will also host a series of workshops before the main conference.

Workshops have been the identity of Kyrion, they are our biggest brand, which has created a niche for itself.

The workshop has gathered mass popularity and has received heartening appreciation from the leaders of both the teaching fraternity and industry stalwarts. We are committed to improve and better ourselves as time goes by and provide you with the finest workshop experience in numerous career fields.

Launch demo modal!

Contact Us

Chakravyuh at IIT Delhi

Indian Institute of Technology Delhi
Hauz Khas, New Delhi-110 016, India

Counselling Center

Kyrion Technologies Pvt. Ltd.
907, Indra Prakash Building, Barakhamba Road, Connaught Place, New Delhi 110001
Tel: +91-9555-9444-66 or +91-11-4355-9494
Email: chakravyuh@kyrion.in

Register Now

1. Select your Plan

11th & 12th April 2015 Rs. 1,500/-

A workshop cum conference on Ethical Hacking & Information Security at IIT Delhi for beginners.

6 weeks Summer Training Rs. 10,000/-

A 6 week Job Oriented Certification Training Program on Ethical Hacking & Information Security.

Workshop at your campus Rs. 600/-

Organize a workshop on Ethical Hacking & Information Security at your college.

2. Enter your Personal information