Workshop on Ethical Hacking and Cybersecurity
29th February 2024
Google Developer Student Club, Dronacharya College of Engineering, Gurugram organized a workshop on Ethical Hacking and Cyber Security titled "Unexplored Secret of Ethical Hacking" on 29th February, 2024. 75 B.Tech 1st year and 2nd year students attended the workshop. The workshop aimed at unravelling the mysteries behind ethical hacking and cyber security.
Scheduled to take place offline in the Seminar Hall, the event promised to be an enlightening experience for attendees, offering a deep dive into various topics essential for understanding and combating cyber threats. Pioneered by Gaurav Kumar, a distinguished expert in the field, the event was poised to be a beacon of knowledge for individuals keen on fortifying their digital defences.
The event was structured to cover a diverse range of topics, each crucial for understanding the basics of ethical hacking and cybersecurity. The agenda included an introductory session on Ethical Hacking and Cybersecurity, serving as a foundational pillar for attendees new to the field as everyone was asked if they were a beginner, intermediate or advanced in terms of knowledge related to ethical hacking and cybersecurity & the majority of the responses received were beginners. The session likely provided insights into the ethical considerations and legal frameworks surrounding hacking activities, setting the stage for the more advanced topics to follow.
One of the highlights of the event was the exploration of techniques used by hackers to breach social media accounts. The topic held immense relevance in today's digital age, where social media platforms are omnipresent. Attendees were benefited from understanding the common vulnerabilities in social media accounts and learning best practices to secure their online presence. Mr. Gaurav Kumar demonstrated some live examples to show how hackers breach accounts, websites and so on which fascinated the students very much.
Google Dorking, another intriguing topic on the agenda, offered attendees a glimpse into the world of advanced search techniques used by hackers. By leveraging specific search queries, hackers can uncover sensitive information on the web, highlighting the importance of understanding and mitigating such risks.
The event also delved into the intricate details of website hacking, shedding light on the methodologies employed by hackers to compromise websites. This session likely provided attendees with practical insights into identifying and addressing vulnerabilities in their websites, enhancing their ability to protect against cyberattacks.
Equally important was the session on securing oneself from hackers, which likely provided attendees with actionable tips and strategies to safeguard their digital assets. Students were taught techniques about how can oneself prevent him or her from getting vulnerable in front of hackers. Some of them were - using a weekly password changer, using 2fa i.e. 2 factor authentication, not allowing websites to save passwords for every time use and so on.
The event not solely focused on theoretical knowledge but also aimed to provide practical insights and bonuses to attendees. The approach ensured that participants could apply their learnings effectively in real-world scenarios, enhancing the overall impact of the event.
Despite the challenges posed by the offline format, the event likely proceeded smoothly, with attendees actively engaging with the speaker and each other. Gaurav Kumar's expertise and engaging presentation style had undoubtedly captivated the audience, fostering a conducive learning environment. In the end, a Q&A session was held which further cleared the doubts of all the attendees whether it be any minor doubt or a major one. Besides that, a short quiz session was also held by Gaurav Sharma himself asking questions related to the topics he covered in the whole workshop to test the understanding potential of the students and the top 3 winners of the quiz were given exclusive merchandise.
Benefits/Outcome: Students learnt the importance of protecting sensitive information and systems from cyber threats. They also understood the types of cyberattacks, such as phishing, malware, ransomware, and social engineering.