
_edited.png)
.png)
CyberX
The Next-Gen Security Series
Hosted by Centre of Cybersecurity, School of Computer Science, UPES, Dehradun
Sunday,
02 November 2025
Powered by Mile2.
Learn from the Best, Train for the Future.
Mr. Vedang Sandhansive,
IIT Kanpur
Certified Penetration Testing Engineer | Certified Threat Intelligence Analyst
Cybersecurity Expert at Mile2 Asia

06:00 PM - 08:00 PM (IST)
.webp)
CyberX
Offensive Arena
Defensive Shield
Offensive Arena
Offensive Security Essentials: The Five-Step Engagement Process
Defensive Shield
Defend Against Hackers - Identify and mitigate real-world attack techniques
Networking Attacks on Modern Systems
Offensive Security Essentials guides participants through the Five-Step Engagement Process, providing hands-on experience in reconnaissance, scanning, exploitation, and professional reporting. This workshop is designed to elevate your ethical hacking skills with advanced penetration testing techniques and real-world offensive security strategies used by Red Team experts globally.
As cyber threats evolve, defending digital ecosystems requires more than just tools—it requires strategy. In this power-packed workshop, learn how modern defenders protect systems, networks, and data using proactive security techniques, threat analysis, and incident readiness practices followed by Blue Teams across industries.
Cyber attackers today exploit modern network infrastructures across cloud, IoT, and hybrid environments. This special session exposes participants to evolving network threats, live demonstrations, and defence mechanisms to protect critical systems.
06:00 PM - 08:00 PM (IST)
Sunday,
02 November 2025

Topics Covered
Offensive Security Essentials: The Five-Step Engagement Process
Defend Against Hackers - Identify and mitigate real-world attack techniques
Networking Attacks on Modern Systems
1. Offensive Security Essentials & Goal-Based Reconnaissance
-
Identify hidden assets, misconfigurations, and weaknesses missed by standard tools.
2. Scanning & Enumeration Deep Dive
-
Discover how to uncover hidden network assets and vulnerabilities beyond traditional scanning tools.
3. Real-World Exploitation & Access Gaining
-
Practical exploitation of systems, services, and applications with guided execution.
4. Reporting & Risk Communication
-
Learn professional documentation and reporting methods used by Red Teamers.
1. Threat Landscape Awareness
-
Understand modern cyber threats, attacker tactics, and evolving cyber risks.
2. Digital Footprint Defence
-
Reduce your online exposure and minimize attack surfaces for individuals & organizations.
3. Intrusion Detection Basics
-
Detect early signs of attacks using logs, monitoring, and security tools.
4. Vulnerability Management
-
Learn how defenders prioritize, patch, and combat potential exploitation.
5. Incident Response Readiness
-
Frameworks & steps to contain, mitigate, and recover from cyber attacks.
1. Traditional vs Modern Network Attacks
-
Understand the evolution from basic LAN attacks to advanced hybrid and cloud-based attacks.
2. Live Demo / Attack Simulation
-
Experience how attackers compromise modern networks in real time.
3. Modern Attack Surfaces
-
Uncover how IoT, cloud, APIs, and remote infra have expanded threat vectors.
4. Defence Mechanisms
-
Practical strategies and controls to secure modern network environments.


Why This Program
is Different
Offensive Security Essentials: The Five-Step Engagement Process
-
Move beyond basic ethical hacking into real-world offensive security execution
-
Learn directly from industry security experts with hands-on experience
-
Strengthen your penetration testing, attack strategy, and analytical skills
-
Earn recognition and certification from GCA Learning & Mile2
-
Gain Blue Team and defence-ready competencies against modern cyber threats
-
Learn using simulations, real case examples, and scenario-based training
Defend Against Hackers - Identify and mitigate real-world attack techniques
-
Build a strong foundation in system hardening, risk reduction, and incident response
-
Earn recognition and certification from GCA Learning & Mile2
Networking Attacks on Modern Systems
-
Understand the evolving landscape of network-based cyber attacks across modern infrastructures
-
Experience live demonstrations and simulations of real network exploitation techniques
-
Learn how cloud, IoT, remote connectivity, APIs & modern architectures expand attack surfaces
-
Gain practical defence skills to secure networks using modern security frameworks and controls
-
Earn recognition and certification from GCA Learning & Mile2


