Register Now
Cybersecurity Day - Training & Discussions
8 January 2025

Cybersecurity Day - Training & Discussions

Location

offline
Microsoft Office, Gurugram

Speaker

4 Professional
Speakers

Days:

1 Day

About

Understanding Common Cyber Threats
In today’s interconnected world, cyber threats pose a significant challenge to individuals and organizations alike. Understanding Common Cyber Threats is an engaging offline event designed to provide participants with essential knowledge about prevalent cyber threats such as phishing, malware, and identity theft.

This event is ideal for professionals, students, and anyone interested in improving their digital security awareness. Through expert-led sessions and real-world examples, you’ll learn how to identify, prevent, and respond to cyber attacks effectively. Gain insights into the latest cybersecurity trends and practical strategies to protect your personal and professional data.

Join us at Understanding Common Cyber Threats to empower yourself with the knowledge and tools needed to stay safe in the ever-evolving digital landscape.

Benefits

  • Learning
  • Mentorship
  • Networking
  • Industry connect

Cybersecurity Day - Training & Discussions

Date: 8 January
Timing: 11:00 AM - 2:00 PM
Location: offline
Microsoft Office, Gurugram
Speaker: 4 Professional
Speakers
Days: 1 Day

Speakers

Jatin Jain
Jatin Jain
Senior Manager CyberYaan Training & Consultancy
Pankaj Yadav
Pankaj Yadav
Director CyberYaan Training & Consultancy ·
Vijay Negi
Vijay Negi
Sr. Consultant - Identity and Security, Microsoft
Jatin Arora
Jatin Arora
Sr. Consultant, Microsoft

Schedule

11:00 AM - 11:10 AM
Deep Dive Into CyberSec

• Understanding common cyber threats (e.g., phishing, malware, identity theft)
• Legal & Illegal Hacking Methodology
• Learning actionable steps to protect devices, accounts, and personal data.
• Cybersecurity Career Pathways

11:10 AM - 2:00 PM
Hands-on activities and real-world examples to build cybersecurity habits:-

• Rate your Password security
• Password Manager
• Analyzing Phishing Mail
• Phishing URL & Malicious File Identifier
• Malware Creation & System Hacking
• Instagram Hacking
• Real Time Hacking Case Studies
• Benefit & usage of VPN
• Aadhar biometric lock/unlock
• Restricting Debit & Credit cards for International use
• RFID Blocking cases to protect credit cards/ debit
cards from hacking
• Enabling 2FA
• Don't use keyboards for banking transactions
• *#21#
• Juice Jacking