Cyber Security Workshop

csworkshop1

Difficulty: ⭐️⭐️☆☆☆

Description

Computers are great! They help to automate our lives and make things easier, but what dangers does this expose us to? More than ever, computer systems are vulnerable to cyber attack, and the consequences can be disastrous.

Therefore it is important for everyone to know how to defend themselves in the digital era. Come to Tokyo Techies and meet our white-hat hackers and cyber security professionals, where they will teach you the tools and techniques used by modern cyber criminals, so that you can use them to defend yourself against cyber attacks.

Why join our Cyber Security Workshop?

Forbes projects that the cost of Cyber crime to the world economy in 2019 to exceed 2 trillion dollars, and Symantec’s 2016 report showed that 43% of attacks target small businesses. Whether you are a business owner, an employee, or a home user, the chances of being threatened by cyber attacks is greater than ever.

Come to the weekend workshops and you will, under the direction of our white-hat hackers, obtain hands-on experience performing your own cyber attacks in a safe and welcome learning environment. Learning how cyber attacks work is a valuable skill for digital professionals and consumers, so that they can operate computers and software in a safe, secure manner. Additionally if you have questions about other cyber attacks or recent cyber news, our instructors will be glad to help you with it.

So whether you are a manager, a computer programmer, or someone who doesn’t consider themselves a “computer person,” you are sure to learn useful skills at our workshop. We hope to see you soon!

Requirements

Beginners are welcome. Bring your own laptop.

First come, first served! Maximum of 25 attendees only. Register ahead to secure your seat. The door will be open at 1:30 PM for walk-in registrants. We will close the door once the workshop starts, so please don’t be late!

Workshop Details

Summary:

Wi-Fi is the go-to technology for wireless communications. We use it in our homes, in our offices, and at the local starbucks. But how secure is it, really? Unfortunately, the wireless nature of the technology makes it particularly vulnerable to eavesdropping and hijacking.

In this class, participants will learn the basic workings of wi-fi networking, how wi-fi implements security for private networks, and how to break into and test the security of wi-fi networks.

Duration: 2 hours

Topics:

  1. Getting a signal
  2. How WiFi authentication works
  3. Capturing authentication keys
  4. Cracking authentication keys
  5. Injecting packets into WiFi networks
  6. Eavesdropping in wi-fi
  7. WiFi Denial-of-Service

Summary:

Passwords are by far the most popular authentication tool. We have passwords for all of our online accounts, but this means that cyber attackers can impersonate us if they can crack our password.

In this class, participants will learn how passwords are handled, how to crack passwords, how to take advantage of the password encryption algorithms, and how to use statistics to optimize the password cracking process.

Duration: 2 hours

Topics:

  1. How passwords work
  2. How to identify password hashes
  3. How to obtain password hashes
  4. How to do a basic brute-force attack
  5. Using pre-calculated hash tables
  6. Scraping data breaches
  7. Using rainbow tables
  8. Password dictionaries and mutators
  9. Using Multi-Factor Authentication

 

Summary:

Malware: the diseases of the cyber world. Malware is software that does harmful things, and it is evolving into a more sophisticated and dangerous threat than ever. Cyber security experts are predicting that ransom payouts to malware distributors is exceeding 1 billion dollars per year.

In this class, participants will learn how malware is created and spread through a network, how malware makes money for cyber-criminals, and participants will create their own malware. (FOR INFORMATION AND PRACTICE ONLY!)

Duration: 2 hours

Topics:

  1. How to diagnose your computer
  2. Programming languages 101
  3. Compiling a virus
  4. Customizing a virus
  5. Execution and distribution
  6. Monetization: Spam, Spying, Cryptojacking, and File Ransom

 

Summary:

Confidence tricks are still alarmingly effective at bypassing computer security. It is simply amazing what secrets one can get simply by asking for them.

In this class, learn about how cyber-criminals are taking advantage of new technology and old con techniques to trick people into giving away passwords, money, and confidential information. Learn how cyber-criminals are faking legitimate programs to abuse the trust of internet users.

Duration: 2 hours

Topics:

  1. Phishing Emails
  2. Domain spoofing
  3. Attacking through hyperlinks
  4. Using social media
  5. Tailgaiting

 

UPCOMING COURSES/WORKSHOPS

Group name Start date Session duration Number of sessions Standard price

LOOKING FOR OTHER OPTIONS?

Below are the courses that you may want to take after this course:

FEATURED MENTOR

Tokyo Techies Lecturer

Marlin Arnall

Cyber Security Engineer

Marlin is a passionate hacker and computer engineer. From an early age, he has always wondered how to circumvent security measures and find exploits in software that lead to unexpected results.

In his off time, he advocates for ethical technology, open software, and digital freedom.

Ask him how you can use simple measures to protect your devices and personal life from cyber threats.