CyberX: Hands-On Workshop for Future Engineers

Sep 17, 2025 | ECE | 0 comments

Two-Day Cybersecurity Workshop

Target Audience and attended

  • Undergraduate and postgraduate engineering students (CSE, IT, ECE, AIML, and related streams)
  • Beginner to intermediate level (no prior deep security knowledge assumed, but technical aptitude required)

Objectives of This Workshop

  • Understand fundamental cybersecurity concepts
  • Recognize common cyber threats
  • Learn preventive measures
  • Apply best practices for personal and organizational safety
  • Gain awareness of tools used in cybersecurity

Why Cybersecurity Matters

  • Almost every task—from studying and banking to communication and shopping—depends on the internet. This constant connectivity exposes users to cyber threats. Effective cybersecurity helps:
  • – Protect confidential and financial data
  • – Prevent misuse of personal identity
  • – Secure online interactions and transactions
  • – Maintain trustworthy digital environments
  • – Reduce the risk of cybercrime

 Major Cyber Threats to Be Aware Of

  • Malware: Software created to harm devices or steal information. Examples include spyware, ransomware, and trojans.
  • Phishing Attacks: Messages designed to trick users into sharing sensitive information by pretending to be legitimate organizations.
  • Social Engineering: Techniques used by attackers to manipulate people into revealing private data, often by exploiting emotions like fear or urgency.
  • Password-based Attacks: Attempts to guess or steal passwords through brute-force tools, leaked credentials, or malicious programs.
  •  Network Threats: Cybercriminals may intercept or disrupt networks through attacks such as MITM (Man-in-the-Middle) or DDoS.
  • Insider Risks: Threats arising from employees or trusted individuals—either by mistake or intentionally

Duration & Schedule   DAY-1

Date & Venue: VJIT HYDERABAD,
Total Duration: 7–8 hours (single-day intensive, workshop + live hands-on).

Agenda

Session 1: Introduction to Cybersecurity Landscape (9:30 AM – 10:30 AM)

  • Global & Indian cyber threat scenarios
  • Real-world case studies: Aadhaar leaks, ransomware in Indian hospitals, WannaCry, Pegasus spyware
  • Cybersecurity career pathways (Ethical Hacking, Red Teaming, Blue Teaming, Forensics, IoT/Cloud Sec)

Session 2: Fundamentals of Ethical Hacking & Attack Vectors (10:30 AM – 12:00 PM)

  • How hackers think: attacker mindset
  • Stages of hacking: Reconnaissance → Scanning → Exploitation → Post-Exploitation
  • Lab Demo 1: Footprinting and scanning using Nmap, Shodan, Maltego
  • Hands-On Task: Students scan a test lab machine to identify open ports & vulnerabilities

Tea Break (12:00 PM – 12:15 PM)

Session 3: Web & Application Security – Live Hacking (12:15 PM – 1:30 PM)

  • OWASP Top 10 vulnerabilities
  • SQL Injection, XSS, CSRF explained with real-time examples
  • Lab Demo 2: Exploiting a vulnerable demo site (e.g., DVWA / Juice Shop)
  • Hands-On Task: Students try SQL error-based injection & XSS in safe lab setup

Lunch Break (1:30 PM – 2:15 PM)

Session 4: Wireless & Network Security Challenges (2:15 PM – 3:30 PM)

  • Wi-Fi hacking basics – WPA2/WPA3 cracks, network sniffing
  • Lab Demo 3: MitM attack using Ettercap or Wireshark packet capture
  • Hands-On Task: Capture network packets & detect plain-text credentials

DAY-2

Session 5: Incident Response and Digital Forensics (9:30 AM – 11:30 PM)

  • How cyber forensics works in government investigations
  • Basics of log analysis and tracing attackers
  • Lab Demo 4: Memory dump analysis (Volatility framework intro)
  • Hands-On Task: Students find suspicious activity in given log files

Tea Break (4:30 PM – 4:45 PM)

Session 6: Capture The Flag (CTF) Cybersecurity Challenge (11:45 PM – 1:00 PM)

  • Teams of students compete in a mini-CTF event
  • Challenges: Simple hacking tasks on web apps, steganography, password cracking, network forensics
  • Incentives: Top teams get certificates of excellence + cybersecurity book / merchandise

Closing Session & Career Guidance (2:00 PM – 3:00 PM)

  • Recap of the day’s learnings
  • Certification distribution
  • Career roadmap: How to start in cybersecurity, resources, certifications (CEH, OSCP, CHFI, CISSP, etc.)

Key Features of the Workshop

  • 80% practical, 20% theory
  • Real-world case studies tied to Indian ecosystem
  • Live hacking demos & controlled lab environment
  • Mini CTF to build student enthusiasm
  • Certificates for all participants, special awards for winners
  • Access to workshop material, cheat sheets, and free tools

Technical Requirements

  • Linux VM, Kali Linux, vulnerable apps pre-installed
  • Projector + sound system for live demos
  • Isolated Wi-Fi or test network for ethical exercises
  • Pre-installed tools on participant laptops (VMware, Kali ISO, DVWA, Wireshark, Burp Suite Community, etc.)

Pricing (Student-Friendly Model)

  • Individual Registration: ₹1249 per student (includes workshop, tools, material, snacks, certificate)
  • Group Discounts: ₹1099 per student for groups of 5+
  • Institution Sponsorship: Colleges can do bulk registration at ₹95,000 for up to 100 students (easy for departments)

Value-Add Opportunities

  • Best students from the attendees ,3  studentswere  offered internship opportunities in cybersecurity labs
  • Networking with industry professionals invited as guest speakers
  • Follow-up online Q&A support for 1 month

0 Comments

Submit a Comment

Varsha Reddy Polla
Varsha Reddy Polla

Left us a 5 star review

Varsha Reddy Polla January 24, 2026
google

Ok

suresh Jammula January 9, 2026
google
Prakash Power (590) January 5, 2026
google
Radhakrishna T January 3, 2026
google

VJIT is just a average clg. Its neither bad nor good thats how i felt when i studied, factuality is good, supportive bit management isn't.

Srujan Kumar December 13, 2025
google
Sohaib-Khan December 2, 2025
google
Siri Mylarishetty November 21, 2025
google