Workshops

Who should attend?
  • Information technology and security professionals and practitioners.
  • Business professionals interested in the field of threat management and response
  • Information security Students


Ms. Rajani Arya

Workshop I – Is Windows Secure?

Synopsis

The workshop will introduce the security framework and how to protect Microsoft applications including Microsoft windows operating systems. Topics include how to understand security layers, understand operating system security, understand network security, and understand security software .

Profile

Ms. Arya is a highly practical trainer who delivered many training courses for many entities inside and outside UAE. She has the below Qualifications & Technical Certification.

  • Microsoft Certified Office Specialist (MOS)
  • Microsoft Certified Solution Associate 2012 (MCSA)
  • Microsoft Certified Solution Associate 2008 (MCSA)
  • Microsoft Exchange Server 2007, Configuring (MCTS)
  • Microsoft Certified IT Professional: Enterprise Messaging Administrator (MCITP)
  • Microsoft Certified IT Professional: Enterprise Support Technician (MCITP)
  • Microsoft Certified Technical Specialist: Windows Server 2008 (MCTS)
  • MCTS: Windows Server 2008 Application Platform
  • MCTS: Configuring Windows Server 2008 Network Infrastructure
  • MCTS: Configuring Windows Server 2008 Active Directory
  • Microsoft System Center Configuration Manager 2007, Configuring (MCTS)
  • Microsoft Certified Systems Engineer (MCSE 2003)
  • Microsoft Certified System Administrator (MCSA 2003)
  • Microsoft Certified Professional(MCP)
  • Cisco Certified Network Associate (CCNA)
  • Bachelor of Engineering in Computer Science
  • Microsoft Certified Technology Specialist(MCTS) on Windows 7
  • MCP on Microsoft Windows Server 2003
  • Cisco Certified Network Associate (CCNA)
  • Cisco Certified Network Professional (CCNP)


Eng. Mohamad Osama Muhra

Workshop II – Microsoft Security fundamentals

Time: 11:00 - 13:00
Venue: Cyber Lab - 2ndfloor

Synopsis

The workshop will introduce the security framework and how to protect Microsoft applications including Microsoft windows operating systems. Topics include how to understand security.

Profile

As a senior consultant with diversified and rich work experience in the areas of Project Management, Service Management, Technology, IT, and cloud enablement, he has fulfilled roles of Senior Information Security Analysts and IT and Business manager. His area of expertise among several acquired program and projects that focus on the analysis, design and re-design and improvement of business processes for various customers ranging from government players to private companies. Serving as a consultant and trainer to diverse industries such as banking, financial organizations, healthcare companies, government offices, petrol companies and United Nations organizations, he has acquired a reputable image and accreditation from international bodies such as Microsoft and EC-Council. Additionally, Mr. Muhra is an accomplished professional recognized as a perceptive leader with strengths in reengineering business processes, defining continuous improvement processes, and recognizing and accelerating peer’s strengths.

Certified in:

Governance, COBIT, Enterprise Architecture, ITIL, EC-Council, Microsoft, (ISC) 2, Business Analysis, MS PROJECT, Project Management, Behavioral Skills, Leadership, Business Continuity.

Topics
  • Man-In-The-Middle Attacks ARP – DNS Spoofing In the first installment we will review normal ARP communication and how the ARP cache of a device can be poisoned in order to redirect machines network traffic through a another machine with possible malicious intent. This seemingly advanced man-in-the-middle (MITM) attack known as ARP Cache Poisoning is done easily with the right software. we will discuss a similar type of MITM attack called DNS Spoofing.
  • Password Authentication and Password Cracking We’re going to explore different authentication mechanisms. An authentication mechanism. Passwords have been the default method of authentication for as long as most of us have needed to prove to a computer that we’re allowed to access it.
  • Session hijacking attack The Session Hijacking attack consists of the exploitation of the web session control mechanism we will cover Session Sniffing and Cross-site script attack


Pavan Raja

Workshop III – Security Monitoring using HP ArcSight Enterprise Security Manager (ESM)

Time: 11:00 - 13:00
Venue: HDFL Lab - 4ndfloor

Synopsis

With advanced correlation rules and associated actions such as notification and case management, an organization can now spot and address security incidents, and even zero day attacks, with a level of speed and efficiency that was not possible before HP ArcSight. In addition, HP ArcSight provides a complete and automated reporting solution to enable visibility into both the security and compliance status of your organization. Also, if time allows, HP ArcSight Reputation Security Monitor (RepSM) will be presented. The HP ArcSight Reputation Security Monitor (RepSM) solution uses Internet threat intelligence to detect malware infection, zero day attacks, and dangerous browsing on your network. This RepSM Overview dashboard gives a good overview of this activity, including internal infections, dangerous browsing, and contact with malicious entities.

Profile

Covering EMEA Regions as Pre-Sales Technical Consultant and ArcSight Specialist with approximately 8 years of security experience. He has working experience on different leading SIEM, Network monitoring and Assessment technologies. Prior to HPE, Pavan worked as Analyst, Implementer and Consultant in Wipro, Paramount Computer Systems and Paladion and started off his career in SIEM specialization. He hold different technical certificates like CCNA, CEH, JHCNP, Lancope, Stealth Technologies. He holds a Diploma in Electronics and Telecommunication from Bangalore University.



Asad Raza

Workshop IV – Security Issues in Wireless Networks

Time: 14:00 - 16:00
Venue: HDFL Lab - 4ndfloor

Synopsis

The risks to users of wireless technology have increased as the service has become more popular. There were relatively few dangers when wireless technology was first introduced. Hackers had not yet had time to latch on to the new technology, and wireless networks were not commonly found in the work place. However, there are many security risks associated with the current wireless protocols and encryption methods, and in the carelessness and ignorance that exists at the user and corporate IT level. Hacking methods have become much more sophisticated and innovative with wireless access. Hacking has also become much easier and more accessible with easy-to-use Windows- or Linux-based tools being made available on the web at no charge.

In this workshop we will demonstrate how open source tools can be used to hack wireless networks and gain unauthorized access to wifi network which can further be used to gain access to systems and networks. We will also discuss the security concerns of GSM networks in this workshop.

Profile

MR Asad is associated with the field of information security for the past 10 years. He has a Master’s degree in information Security from KTH Royal Institute of Technology, Sweden and holds professionals certifications like (CCNA, CWNA, CEH and CompTIA Security+ etc ). He has to his credit several research papers which are published in reputed Journals and Conferences. Mr Asad has delivered workshops and trainings in many international conferences and symposiums. He is an active member of PISA-CERT.

He not only has deep understanding of wireless security protocols but also has practical knowledge in this particular domain.

Prerequisites
  • A basic understanding of wireless networks.
  • A general understanding of IT security issues


Zahid Khan

Workshop V – Security in Social Networks

Time: 14:00 - 16:00
Venue: Cyber Lab - 2ndfloor

Synopsis

Love it or hate it, social media is part of the business world. It's how to connect with customers and business peers, as well as continues to define a brand. Social networking is profoundly changing the way people communicate and interact on a daily basis. Online social networks are serving as a vital means for supporting information and resource sharing, aiding discovery of connected individuals, improving communication between globally dispersed individuals, and even measuring scientific impact.

Social networking privacy issues have dominated the headlines in the first half of 2011. With most social networks, the default settings share everything and users have to reset their options to make their accounts more private. This opens up a host of security issues because so many people—both friends and not—have access to your information.

This workshop is aimed at creating awareness about privacy issues in social networks, attacks going beyond just gaining user credentials and privacy preserving techniques.

Profile

Mr. Zahid has been working in the field of Information Security for last 6 years. His areas of expertise include but are not limited to Penetration Testing, Network Security and Network Administration.

He holds several internationally renowned certification including OSCP, ECSA, CEH, Security Plus and CCNA.

Prerequisites
  • A general understanding of IT security issues.

Organizers


Sponsors