• Tidak ada hasil yang ditemukan

workshop on cyber security and internet of things

N/A
N/A
Protected

Academic year: 2023

Membagikan "workshop on cyber security and internet of things"

Copied!
1
0
0

Teks penuh

(1)

Cyber Security touches nearly every part of our daily lives. We rely on vast array of networks to communicate, power our homes, run our economy, and provide government services. However cyber intrusions and attacks have increased dramatically over the last decade, exposing sensitive personal and business information, disrupting critical operations, and imposing high casts on the economy. The nation has a significant shortage of Cyber Security professionals who can understand and effectively thwart the growing threats.

As a result, education and training in Cyber Security and Internet of Things has become a priority.

This 3 days workshop cover interactive learning and practice through theory

and lab

exercises.

The

department of Computer Science and Engineering part of JNTUH College of Engineering, situated in the heart of the

city at

Kukatpally,

Hyderabad is facilitating the workshop to all the stakeholders and faculty willing to learn, practice and then teach in their respective organizations and colleges.

THE SPEAKERS AND RESOURCES PERSONS ARE INVITED FROM INDUSTRY AND RESEARCH ORGANIZATIONS, WILL HANDLE THE SESSIONS FOR IMPARTING THE KNOWLEDGE REQUIRED FOR THE PRESENT NEEDS OF CYBER SECURITY AND INTERNET OF THINGS

WORKSHOP ON CYBER SECURITY AND INTERNET OF THINGS

JN

WHO CAN ATTEND

Responsible personnel working at the level of

- Faculty/Teaching staff - Engineers/Researchers - T & D Employees/staff

Working in departments of

- Computer Science & Engineering - Research & Development - IT Infra and Applications - Training & Development

TAKE AWAYS ON

Cyber Security (CS)

Internet of Things (IoT)

Cyber Laws/Forensics

CS/IoT Lab setup

POINTS TO NOTE

Bring own laptop for practice

Participants limited to 30 due to hands-on sessions.

No paper/printouts

Learn to teach

FEE DETAILS

Academia: Rs. 2000/-

Industry: Rs. 2500/- Mode of payment: NEFT Name A/C Holder:

M/S C S E ASSOCIATION A/C No: 103410100065907 IFSC Code: ANDB0001034 Andhra Bank Branch: 1034 J N T U CAMPUS, KUKATPALLY

SUBJECT AREAS FOR LEARNING AND PRACTICE

DAY1: SECURE IOT, CYBER THREAT DETECTION AND MITIGATION, CYBER CRIME, CYBER LAWS, …

DAY2: VULNERABILITY ASSESSMENT AND PENETRATION TESTING, TRANSPORT ENCRYPTION AND NETWORK SECURITY, MOBILE AND WEB SECURITY, ENDPOINT SECURITY AND ETHICAL HACKING

DAY3: MALWARE ANALYSIS, LANGUAGE BASED SECURITY, SECURE SYSTEM ENGINEERING, HDL & CRYPTOGRAPHIC APPLICATION, FORMAL METHODS OF SECURITY,

Dates: 15/06/2017 to 17/06/2017, Time: 9.30AM – 5.30PM, Venue: Department of CSE, JNTU Kukatpally, Hyderabad. Head & Prof Kamakshi Prasad, Workshop Coordinator: Prof & Dr R Sridevi, Mobile No:+91 9441219100, Registration: send eMail to <[email protected]>, having the details (1) NEFT Payment Transaction number:--- (2) Your Full name:--- (3) Designation:--- (4) Qualification:--- (5) Qualification:--- (6) Address for communication:--- (7) Phone Office:--- Mobile:---

Learn to Teach Cyber Security and IoT to build better Society

IoT Cyber Security is the responsibility of everyone in the Eco-System

Note: Participation will be confirmed on receiving above NEFT Payment and other details through email to workshop coordinator.

Applications will be considered on first come first serve basis, confirmation number will be sent through email/sms.

Knowledge on Cyber Laws/Forensics is need of the hour

Referensi

Dokumen terkait

The research analysis is based on the gap in the value of the Cyber Security Maturity assessment and focuses on information security risk management planning steps based on

This is an open access article under the CC BY-NC-ND license https://creativecommons.org/licenses/by-nc-nd/4.0 Peer-review under responsibility of the scientific committee of the 4th

Hug , Composite business ecosystems for the web of everything: using cloud platforms for web convergence, in: Proceedings of the 2013 Seventh International Conference on Innovative

Conclusion Based on the research that has been done, it can be concluded that the control and monitoring system for house door locks with a combination of WEMOS D1 microcontrollers,

This research paper explores the impact of IoT on privacy and security, focusing on the various challenges and risks associated with the technology.. The paper begins by examining the

 Support layer: Support layer needs a large part of the application security architecture, such as cloud computing and multi-party secure computing, almost all strong encryption

b Keamanan Data Keamanan data pengguna dapat disimpan dengan aman lewat server yang disediakan oleh penyedia layanan Cloud Computing seperti jaminan platform teknologi, jaminan ISO,

Smart meteringis basically an advanced electronic recording device that is used to record energy consumption in the building over a certain interval in hours or minutes and reports