Cyber Security Workshop

[vc_row][vc_column][ultimate_heading main_heading=”Cyber Security Workshop” alignment=”left” spacer=”line_only” spacer_position=”middle” line_height=”3″ line_color=”#059d80″ main_heading_style=”font-weight:bold;” line_width=”80″ spacer_margin=”margin-top:22px;margin-bottom:22px;” main_heading_margin=”margin-top:0px;margin-bottom:0px;”][/ultimate_heading][vc_single_image image=”6739″ img_size=”1024px” alignment=”center”][vc_row_inner][vc_column_inner width=”1/4″][/vc_column_inner][vc_column_inner width=”1/2″][ult_buttons btn_title=”REGISTER NOW” btn_link=”|||” btn_align=”ubtn-center” btn_size=”ubtn-large” btn_title_color=”#ffffff” btn_bg_color=”#059d80″ icon_size=”32″ btn_icon_pos=”ubtn-sep-icon-at-left” btn_font_size=”desktop:20px;” btn_font_style=”font-weight:bold;”][/vc_column_inner][vc_column_inner width=”1/4″][/vc_column_inner][/vc_row_inner][vc_column_text]Difficulty: ⭐️⭐️☆☆☆[/vc_column_text][vc_column_text]


Now more than ever before, people entrust their personal information to large tech companies. Unfortunately, with so much sensitive data up for grabs, there has been a rise in massive data breaches and hacks. Tech giants like Facebook, Target, Equifax, and Adobe have all suffered major data breaches in 2019. In fact, the two largest data exposures of all time happened in this past year. This threat is not going away. Organizations are under more pressure than ever to secure their systems against these attacks.

Like it or not, cybersecurity is becoming a must-know skill not just for organizations, but also for individuals. Tokyo Techies Cybersecurity Workshop is a unique opportunity to gain hands-on experience with the tools and techniques used by modern cybercriminals under the guidance of our cybersecurity professionals.

Perform your own cyberattacks in a safe and welcome learning environment so that you can use them to defend your systems in the future. Whether you’re an IT professional wanting to skill up, or a programming novice, this workshop arms you with a great foundation upon which to build your cybersecurity skills.[/vc_column_text][vc_column_text]

What you will learn?

In this workshop, you will step into the shoes of a penetration tester, performing an ethical hack of a WIFI Range Extender to identify its vulnerabilities to a cyberattack. Follow step-by-step as our security professionals with industry experience teach you the exact process that they use to identify weaknesses in a system.

By the end of the workshop, you will be able to apply these methods to any device. Have you ever wondered just how secure the WIFI router you use at home is? After taking this workshop, you will be able to find out for yourself. You might be surprised at just how vulnerable these devices we use every day are.

In this workshop, you will learn:

  • The exact method that professional hackers use to identify and document vulnerabilities in a system
  • The most common techniques hackers use to exploit systems and why they still work in 2019
  • How to find security weaknesses in a network
  • Tools and techniques to discover and exploit vulnerabilities in binaries stored on IoT devices
  • Reverse engineering using Ghidra, the tool developed by the NSA, originally revealed on WikiLeaks in 2017 and made available to the public earlier this year



This workshop requires basic programming knowledge.

  • IT professionals who want to skill up
  • Beginners who are interested in security, safety, and privacy
  • Business owners who want a deeper understanding of cyber threats
  • Anyone who wants to protect their personal information and documents from cyber criminals
  • Anyone who aspires to become an expert in security, safety, and privacy

Bring your own laptop.

First come, first served! Maximum of 30 attendees only. Register ahead to secure your seat. The door will be open at 9:00 AM for walk-in registrants. We will close the door once the workshop starts, so please don’t be late![/vc_column_text][vc_tta_accordion active_section=”1″ title=”Workshop Details”][vc_tta_section title=”Introduction” tab_id=”1543936612705-e46c9953-07ba”][vc_column_text]- Overview of the target device
– How to approach IoT security analyses[/vc_column_text][/vc_tta_section][vc_tta_section title=”Network Penetration Testing” tab_id=”1543936612735-81f91a80-6d35″][vc_column_text]- Overview of the Network attack surface
– TCP port scanning[/vc_column_text][/vc_tta_section][vc_tta_section title=”Web interface attack vectors” tab_id=”1543936612760-b2823396-8b9d”][vc_column_text]- Overview of the web interface attack vector
– Analysis of the configuration file[/vc_column_text][/vc_tta_section][vc_tta_section title=”Firmware acquisition / extraction” tab_id=”1573109256792-06b24322-9b03″][vc_column_text]- Overview of firmware acquisition methods
– Firmware extraction[/vc_column_text][/vc_tta_section][vc_tta_section title=”Finding vulnerabilities in firmware” tab_id=”1543936612791-a1733383-8b0f”][vc_column_text]- Searching for interesting parts
– Hash brute-forcing[/vc_column_text][/vc_tta_section][vc_tta_section title=”Vulnerability discovery in binaries” tab_id=”1573109342538-c61708da-55cd”][vc_column_text]- Reverse engineering using a disassembler and decompiler[/vc_column_text][/vc_tta_section][vc_tta_section title=”Bypassing client-side validation” tab_id=”1573109381585-6f87c1ce-ad24″][vc_column_text]- Using web developer tools to change JavaScript[/vc_column_text][/vc_tta_section][vc_tta_section title=”Applying learned methods to encryption” tab_id=”1573109509645-2edd112c-046a”][vc_column_text]- Reverse-engineering the encryption algorithm
– Using the identified algorithm[/vc_column_text][/vc_tta_section][vc_tta_section title=”Conclusion” tab_id=”1573109571184-89fec3c9-9d40″][vc_column_text]- Putting all discovered vulnerabilities together
– Summarizing what was learned[/vc_column_text][/vc_tta_section][/vc_tta_accordion][vc_empty_space][vc_column_text]




[/vc_column_text][vc_row_inner][vc_column_inner width=”1/2″][ult_buttons btn_title=”Register for a 1-on-1 class” btn_link=”|||” btn_size=”ubtn-block” btn_title_color=”#ffffff” btn_bg_color=”#7cc243″ icon_size=”” btn_icon_pos=”ubtn-sep-icon-at-left” btn_border_style=”solid” btn_border_size=”0″ btn_radius=”3″ btn_font_style=”font-weight:bold;” btn_font_size=”desktop:20px;”][/vc_column_inner][vc_column_inner width=”1/2″][ult_buttons btn_title=”Course for companies” btn_link=”|||” btn_size=”ubtn-block” btn_title_color=”#ffffff” btn_bg_color=”#7cc243″ icon_size=”32″ btn_icon_pos=”ubtn-sep-icon-at-left” btn_border_style=”solid” btn_color_border=”#059d80″ btn_border_size=”0″ btn_radius=”3″ btn_font_style=”font-weight:bold;” btn_font_size=”desktop:20px;”][/vc_column_inner][/vc_row_inner][vc_column_text]

Below are the courses that you may want to take after this course:

[/vc_column_text][dt_portfolio_masonry post_type=”posts” image_border_radius=”0px” project_icon_border_width=”0px” posts_offset=”0″ posts=”5144″][vc_separator][vc_column_text]


NIck Hummel

Cyber Security Specialist & Tech Mentor

Nick is an expert in project management, process improvement, Cyber Security and Robotics.

Nick was a founder of an IoT startup company. He also worked at major international management consultancy

He provides a wide variety of services, such as Network Penetration Testing, Code Review and Reverse Engineering.[/vc_column_text][/vc_column][/vc_row]

© 2020 Tokyo Techies. All rights reserved.