This workshop is specifically designed to provide the right knowledge to the aspiring Hacking and Cyber Security enthusiasts. This workshop will explore the various means that an intruder has available to gain access to computer resources.
It will investigate weaknesses by discussing the theoretical background behind, and whenever possible, actually performing the attack.
Participants have access to an exclusive online portal to:
Anybody interested in enthusiasts in ethical hacking and security, interested in meddling with Android devices etc
*Each participant should bring his/her own laptop