top of page
Event card GCA.png
Krapesh Bhatt.png
GCA LOGO NEW (9).png

CyberX

The Next-Gen Security Series

Hosted by Centre of Cybersecurity, School of Computer Science, UPES, Dehradun

Saturday,

01 November 2025

Powered by Mile2.

Learn from the Best, Train for the Future.

Mr. Krapesh Bhatt,

Cybersecurity Consultant & Senior Trainer
Cybersecurity Expert at Mile2 Asia

06:00 PM - 07:00 PM (IST)

Untitled.png
MILE-2-LOGO (1).webp

CyberX

Defensive Shield

Web Application Security 

Build Resilience Against Modern Web Attacks

In a world where web applications power businesses, education, and daily life, securing them is no longer optional - it’s essential.


CyberX: Defensive Shield (Web Application Security) is designed to equip participants with practical defensive strategies, secure architecture principles, and hands-on knowledge to safeguard modern web applications from real-world cyber threats.


This workshop takes you beyond theory into applied defensive security, combining foundational knowledge, industry frameworks, and real attack scenarios to help you think and act like a seasoned Blue Team professional.

Saturday,

01 November 2025

Untitled.png

06:00 PM - 08:00 PM (IST)

Topics Covered

Web Application Security

1. C-I-A Triad – Conceptual Primer

Understand the fundamental pillars of security: Confidentiality, Integrity & Availability.

2. Essential Concepts – Threat, Risk & Vulnerability

Gain clarity on core security terminology used in security assessments.

3. Security Basics – CVE, CWE & CVSS

Learn how vulnerabilities are classified, scored, and tracked worldwide.

4. Security Controls

Explore preventive, detective, and corrective controls essential for secure systems.

5. Secure Software Development Models

Understand SDLC, Secure SDLC, and secure coding practices followed by enterprises.

6. Web Application Security Architecture

Learn key architectural components required to protect web applications.

7. Defense-in-Depth & Zero Trust Architecture + OWASP Top 10

Master modern frameworks and the most critical web risks recognized globally.

8. Risk Management Concepts

Build the ability to identify, evaluate, and treat security risks effectively.

9. Threat Modeling with STRIDE & DREAD Models

Understand attacker perspectives and anticipate threats before exploitation.

10. Root Cause Analysis Models

Learn to analyze security issues and prevent repeated failures in systems.

11. Web Application Attacks

Hands-on coverage of:

  • Authentication & Authorization attacks

  • Session management attacks

  • Data validation & Injection attacks

  • Business logic attacks

  • Attacks targeting web servers

Untitled.png
Modern Workspace_edited_edited.jpg

Why This Program

is Different

  • Learn web application defence techniques used by modern Blue Teams

  • Understand real-world attack patterns & secure architecture countermeasures

  • Gain practical exposure to OWASP Top 10, Zero Trust & STRIDE/DREAD models

  • Build hands-on skills in identifying, assessing, and mitigating web risks

  • Earn recognition and certification from GCA Learning & Mile2

Untitled.png
bottom of page