Technical workshop organised at Datta Meghe College of Engineering, Airoli

Jayita Ekka updated on : 30 Jun 2016

Datta Meghe College of Engineering, Airoli organised a technical workshop on “Network Security and Ethical Hacking” on 24th September, 2015.

Datta Meghe College of Engineering, Airoli

It has become highly important to spread network security awareness in today’s ubiquitous world. Gauging its importance, Datta Meghe College of Engineering, Mumbai is conducting a workshop on Network Security and Ethical Hacking between 24th and 26th Sept 2015. The workshop is being organised by Department of Information Technology and Department of Computer Engineering. The workshop highlights the ethical hacking techniques educating the young minds about the threats and ways of network security. The workshop aims on cutting edge technologies like internet foot printing, web reconnaissance, network and vulnerability scanning, etc.

The purpose of workshop is to bridge the gap between the knowledge of system security and its application by using the tools and techniques like backtracking and penetration testing. This will open the doors for the researchers with network and system security as domain.

The event was inaugurated by Honourable Principal Datta Meghe College of Engineering Dr. S.D. Sawarkar, Dean Academics Dr. S.R Devane, HOD Computers Prof. A.P. Pande (Chief Convener) along with all the Heads of Departments of Datta Meghe College of Engineering. The workshop is being guided by highly experienced speaker Prof. Ambawade from Sardar Patel Institute of Technology, Department of Electronics and Telecommunication, who has addressed more than 30 workshops as a resource person. The workshop will also have imminent speakers from TCS, Mr. Deepak Shirdhonkar and Mr.Koustubh Joshi who will focusing on Network Security and Ethical Hacking with industrial perspective. The workshop has seen the active participation from various disciplines. 

As an outcome the participants will be able to identify and mitigate software security vulnerabilities in existing systems, understand the role of firewalls, IPSec, Virtual Private Networks and identity management, Web Server vulnerabilities and their counter measures.

Recommended articles

Leave Your Comments Views or Questions here