BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:Asia/Kolkata
BEGIN:STANDARD
DTSTART:19451014T230000
TZOFFSETFROM:+0630
TZOFFSETTO:+0530
TZNAME:IST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20251223T165926Z
UID:2F72B518-DBEA-4D62-A1B9-3799BA5ECE10
DTSTART;TZID=Asia/Kolkata:20251124T083000
DTEND;TZID=Asia/Kolkata:20251128T163000
DESCRIPTION:The Five-Day Workshop on Network Security is designed to impart
  foundational and practical knowledge on securing modern communication net
 works. The workshop addresses key cybersecurity challenges\, secure commun
 ication techniques\, and defensive mechanisms used in real-world networks.
  Through expert lectures\, demonstrations\, and hands-on sessions\, partic
 ipants will gain practical exposure to network security tools\, threat ana
 lysis\, and best practices. The program supports skill development in emer
 ging technologies and aligns with Outcome-Based Education (OBE) and accred
 itation quality requirements.\n\nCo-sponsored by: SJB Institute of Technol
 ogy \n\nSpeaker(s): Saritha\n\nAgenda: \n-\nOverview of networking and sec
 urity fundamentals\n\n-\nTypes of cyber threats and vulnerabilities\n\n-\n
 Security requirements and attack surfaces\n\n-\nPrinciples of cryptography
 \n\n-\nSymmetric and asymmetric encryption\n\n-\nSecure communication prot
 ocols\n\n-\nMalware\, phishing\, and DoS attacks\n\n-\nFirewalls and acces
 s control\n\n-\nIntrusion detection and prevention systems\n\n-\nWireless 
 and mobile network security\n\n-\nVPNs and secure tunneling techniques\n\n
 -\nCase studies on cyber incidents\n\n-\nNetwork security tools and demons
 trations\n\n-\nRisk assessment and security auditing\n\nRoom: Seminar Hall
 \, Bldg: SJB Institute of Technology-ECE Block\, No.67\, BGS Health &amp; Educ
 ation City\, Dr.Vishnuvardhan Rd\, Kengeri\, Bengaluru\, Karnataka\, India
 \, 560060
LOCATION:Room: Seminar Hall\, Bldg: SJB Institute of Technology-ECE Block\,
  No.67\, BGS Health &amp; Education City\, Dr.Vishnuvardhan Rd\, Kengeri\, Ben
 galuru\, Karnataka\, India\, 560060
ORGANIZER:dr.dilipraju@gmail.com
SEQUENCE:12
SUMMARY:Five-Day Workshop on Network Security
URL;VALUE=URI:https://events.vtools.ieee.org/m/524905
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;The &lt;strong data-start=&quot;1302&quot; data-end=&quot;13
 43&quot;&gt;Five-Day Workshop on Network Security&lt;/strong&gt; is designed to impart f
 oundational and practical knowledge on securing modern communication netwo
 rks. The workshop addresses key cybersecurity challenges\, secure communic
 ation techniques\, and defensive mechanisms used in real-world networks. T
 hrough expert lectures\, demonstrations\, and hands-on sessions\, particip
 ants will gain practical exposure to network security tools\, threat analy
 sis\, and best practices. The program supports skill development in emergi
 ng technologies and aligns with Outcome-Based Education (OBE) and accredit
 ation quality requirements.&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;ul data-start=&quot;1
 996&quot; data-end=&quot;2141&quot;&gt;\n&lt;li data-start=&quot;1996&quot; data-end=&quot;2048&quot;&gt;\n&lt;p data-sta
 rt=&quot;1998&quot; data-end=&quot;2048&quot;&gt;Overview of networking and security fundamentals
 &lt;/p&gt;\n&lt;/li&gt;\n&lt;li data-start=&quot;2049&quot; data-end=&quot;2095&quot;&gt;\n&lt;p data-start=&quot;2051&quot; 
 data-end=&quot;2095&quot;&gt;Types of cyber threats and vulnerabilities&lt;/p&gt;\n&lt;/li&gt;\n&lt;li
  data-start=&quot;2096&quot; data-end=&quot;2141&quot;&gt;\n&lt;p data-start=&quot;2098&quot; data-end=&quot;2141&quot;&gt;
 Security requirements and attack surfaces&lt;/p&gt;\n&lt;/li&gt;\n&lt;/ul&gt;\n&lt;ul data-star
 t=&quot;2195&quot; data-end=&quot;2300&quot;&gt;\n&lt;li data-start=&quot;2195&quot; data-end=&quot;2225&quot;&gt;\n&lt;p data
 -start=&quot;2197&quot; data-end=&quot;2225&quot;&gt;Principles of cryptography&lt;/p&gt;\n&lt;/li&gt;\n&lt;li d
 ata-start=&quot;2226&quot; data-end=&quot;2265&quot;&gt;\n&lt;p data-start=&quot;2228&quot; data-end=&quot;2265&quot;&gt;Sy
 mmetric and asymmetric encryption&lt;/p&gt;\n&lt;/li&gt;\n&lt;li data-start=&quot;2266&quot; data-e
 nd=&quot;2300&quot;&gt;\n&lt;p data-start=&quot;2268&quot; data-end=&quot;2300&quot;&gt;Secure communication prot
 ocols&lt;/p&gt;\n&lt;/li&gt;\n&lt;/ul&gt;\n&lt;ul data-start=&quot;2358&quot; data-end=&quot;2476&quot;&gt;\n&lt;li data-
 start=&quot;2358&quot; data-end=&quot;2396&quot;&gt;\n&lt;p data-start=&quot;2360&quot; data-end=&quot;2396&quot;&gt;Malwar
 e\, phishing\, and DoS attacks&lt;/p&gt;\n&lt;/li&gt;\n&lt;li data-start=&quot;2397&quot; data-end=
 &quot;2429&quot;&gt;\n&lt;p data-start=&quot;2399&quot; data-end=&quot;2429&quot;&gt;Firewalls and access control
 &lt;/p&gt;\n&lt;/li&gt;\n&lt;li data-start=&quot;2430&quot; data-end=&quot;2476&quot;&gt;\n&lt;p data-start=&quot;2432&quot; 
 data-end=&quot;2476&quot;&gt;Intrusion detection and prevention systems&lt;/p&gt;\n&lt;/li&gt;\n&lt;/u
 l&gt;\n&lt;ul data-start=&quot;2521&quot; data-end=&quot;2638&quot;&gt;\n&lt;li data-start=&quot;2521&quot; data-end
 =&quot;2561&quot;&gt;\n&lt;p data-start=&quot;2523&quot; data-end=&quot;2561&quot;&gt;Wireless and mobile network
  security&lt;/p&gt;\n&lt;/li&gt;\n&lt;li data-start=&quot;2562&quot; data-end=&quot;2602&quot;&gt;\n&lt;p data-star
 t=&quot;2564&quot; data-end=&quot;2602&quot;&gt;VPNs and secure tunneling techniques&lt;/p&gt;\n&lt;/li&gt;\n
 &lt;li data-start=&quot;2603&quot; data-end=&quot;2638&quot;&gt;\n&lt;p data-start=&quot;2605&quot; data-end=&quot;263
 8&quot;&gt;Case studies on cyber incidents&lt;/p&gt;\n&lt;/li&gt;\n&lt;/ul&gt;\n&lt;ul data-start=&quot;2698
 &quot; data-end=&quot;2829&quot;&gt;\n&lt;li data-start=&quot;2698&quot; data-end=&quot;2743&quot;&gt;\n&lt;p data-start=
 &quot;2700&quot; data-end=&quot;2743&quot;&gt;Network security tools and demonstrations&lt;/p&gt;\n&lt;/li
 &gt;\n&lt;li data-start=&quot;2744&quot; data-end=&quot;2785&quot;&gt;\n&lt;p data-start=&quot;2746&quot; data-end=&quot;
 2785&quot;&gt;Risk assessment and security auditing&lt;/p&gt;\n&lt;/li&gt;\n&lt;/ul&gt;
END:VEVENT
END:VCALENDAR

