Cs - FDP - Schedule-7 2
Cs - FDP - Schedule-7 2
9:30 – 12:00 9:30 – 12:00 9:30 – 12:00 9:30 – 12:00 9:00 – 1:00 9:30 – 12:00
Session 1 Session 3 Session 5 Session 7 Industrial visit Session 10
1. Name of the Expert : 1. Name of the 1. Name of the 1. Name of the Expert : 1. Name of the 1. Name of the Expert :
DR.A.P.Burnwal Expert : Mr. Balaji Expert : Prof. Prof. Shri. A.G.P kujur Organization: Dr Dilip Kumar.
2. Designation :Associate Venketeshwar Dr. S.C.Dutta 2. Designation : Asst. BSL 2. Designation : Assistant
Professor 2. Designation :Cyber 2. Designation : Controller of Exam 2. Complete address with Professor,
3. Organization: Defense Researcher Associate pincode : Computer Science and
GGSESTC,JUT 3. Organization: Cyber professor 3. Organization: JUT Bokaro Steel City, Engineering
4. Experience in Years:20 vidyapeeth Foundation 3. Organization: Jharkhand ,827001
4. Experience in BIT sindri 4. Experience in Years: 15 Industry Type: 3. Organization: NIT
Years: 20 4. Experience in PSU Jamshedpur
5. Topic to be taught: The Years: 30 3. Area of
Evolving Cyber Threat 5. Topic to be taught: 5. Topic to be taught: specification :cyber 4. Experience in Years:23
Landscape: Network Security: Emerging Threats: Social security
Understanding the Firewalls, Intrusion 5. Topic to be Engineering, Ransom
motivations, tactics, and Detection Systems taught: ware, Block chain 5. Topic to be taught:
tools used by attackers. (IDS), Secure Cloud Security: security, Internet of ● The Future of Cyber
network Threats and Things (IoT) security
challenges in challenges. security: Emerging
architecture design.
cloud trends, technologies like
environments, block chain, and their
securing cloud- impact on security.
based data and ● Career Opportunities in
applications. Cyber security: Different
career paths, skills
required, and ongoing
professional
development.
1.Title of the Research Paper : 1.Title of the Research 1.Title of the Research 1.Title of the Research
A systematic literature review on Paper : Paper : The rise of ransom Paper : Data Security 12:00 – 1:00
advanced persistent threat A Review and Comparative ware and emerging Challenges and Its Solutions in Article Summary
behaviors and its detection Analysis of Relevant security challenges in the Cloud Computing
strategy Approaches of Zero Trust Internet of Things 2. Name of the journal:
2. Name of the journal: Network Model 2. Name of the journal: Elsevier
Journal of Cyber security 2. Name of the journal: Elsevier 3. Year of Publication: 22
3. Year of Publication: Sensors, MDPI 3. Year of Publication: May 2015
02 January 2024 3. Year of Publication: December 2017
19 February 2024
1:00 – 2:00 1:00 – 2:00 1:00 – 2:00 1:00 – 2:00 1:00 – 2:00 1:00 – 2:00
Lunch Lunch Lunch Lunch Lunch Lunch
2:00 – 4:30 2:00 – 4:30 2:00 – 4:30 2:00 – 4:30 2:00 – 4:30
Session 2 Session 4 Session 6 Session 8 Session 9
1. Name of the Expert : 1. Name of the Expert: 1. Name of the 1. Name of the Expert : 1. Name of the Expert :
Prof. Bhaskra Nand Mr. Shashank Expert : Prof. (Dr.) Prof. Prashant Panse Dr. S.K .Jha 2:00 – 4:00
2. Designation : Assistant Shekhar Garuryar Shubhash Chandra 2. Designation :Assistant 2. Designation : Director MCQ & Reflection Journal
Professor 2. Designation : Yadav professor 3. Organization: Sityog
3. Organization: Department Chairman 2. Designation : 3. Organization: Medi- Institute of Technology
of Computer Science & 3. Organization: Cyber Professor, Caps University Indore Aurangabad, Bihar
Engineering (Cyber Vidyapeeth Department of 4. Experience in
Security) GEC, Jehanabad foundation Computer Science 4. Experience in Years: Years:30
4. Experience in Years:10 4. Experience in and Technology 15
Years: 20 3. Organization:
Central University of 5. Topic to be taught:
5. Topic to be taught: 5. Topic to be taught: Jharkhand 5. Topic to be taught: Cyber security Law and
Cyber security Cryptography & 4. Experience in Cyber security in Policy: Legal aspects of
Fundamentals: CIA triad Data Security: Years:21 AI/ML: Security risks in data breaches, cybercrime
(Confidentiality, Integrity, Encryption 5. Topic to be Machine Learning models, investigations, international
Availability), Risk algorithms, digital taught: adversarial attacks. frameworks.
management, Security signatures, key Application Security: Cyber security in
policies and frameworks. management OWASP Top 10, secure Critical Infrastructure:
practices. coding practices, Protecting power grids,
vulnerability scanning transportation systems, and
for web applications. other critical assets.
4:30 – 5:30 4:30 – 5:30 4:30 – 5:30 4:30 – 5:30 4:30 – 5:30 4:00 – 5:00
Hands on training Hands on training Hands on training Hands on training Hands on training Valedictory Session
/Labs /Labs /Labs /Labs /Labs
Identifying common vulnerabilities in Hands-on: Using cryptography tools Identifying vulnerabilities in web Secure coding practices in specific Tabletop exercise simulating a cyber
software. for secure communication. applications. programming languages (e.g., Python, attack on a specific system (e.g., e-
Java). commerce platform).