Hacking the Future – The Cybersecurity Workshop You Wish You Attended!
- 12 Sep, 2024
- 5 min read

Hacking the Future – The Cybersecurity Workshop You Wish You Attended!
What happens when you mix some of the sharpest minds in tech with cutting-edge cybersecurity topics and a hands-on approach? You get a workshop that’s not just educational but downright exhilarating! That’s exactly what went down on September 12th, 2024, when the Department of Information Security at AIT-CSE, in collaboration with IBM, hosted a “Workshop on Cybersecurity” at Chandigarh University. And let me tell you, it was epic.
Cybersecurity, But Make It Cool
Cybersecurity isn’t just about firewalls and passwords—it’s a high-stakes game where knowledge is your best weapon, and hackers are your competition. This workshop wasn’t your average lecture session. It was a crash course on how to stay ahead of the bad guys, and it had everything from social engineering to making (and breaking) viruses.
With Mr. Om Kant Sharma from IBM—an absolute beast in the cybersecurity game—leading the charge, students got a deep dive into what it really takes to protect data in today’s digital world. With over 8 years of experience in Data Security Analysis and Forensics, Mr. Sharma is like the Gandalf of cybersecurity, guiding us through the dark woods of cyber threats.
Session I: Cracking the Code of Cyber Mind Games
The first session kicked off at 10:00 AM, and it was all about mind games. Social Engineering? Check. SQL Injection? Check. These aren’t just buzzwords—they’re the tactics cybercriminals use to exploit weak spots.
-
Social Engineering: Ever heard of phishing, pretexting, or impersonation? These psychological tricks are how attackers get into your head and trick you into giving up valuable info. Mr. Sharma schooled everyone on how to spot these attacks and keep your guard up.
-
Sniffing: No, it’s not what your dog does. Sniffing is all about intercepting network data. Imagine someone lurking in the shadows, capturing your passwords from an unsecured Wi-Fi network. Scary, right? That’s why encryption is your BFF.
-
SQL Injection: Think of this as a hacker’s version of breaking and entering. By inserting malicious queries into input fields, attackers can sneak into databases and wreak havoc. Mr. Sharma stressed the importance of secure coding practices to keep those sneaky queries out.
-
Brute Force Attack: This is the cyber equivalent of trying every single key on a keychain until one fits. The solution? Strong passwords and multi-factor authentication. Easy peasy!
Session II: From Steganography to Burp Suite – Leveling Up
After a quick break, it was time for Session II, where things got even more intense. It was like the advanced level of a video game, where you’ve got to use all your skills to win.
-
Steganography: Think of this as the art of secret-keeping. It’s all about hiding information in plain sight, like embedding secret messages in images or audio files. Mr. Sharma showed how attackers can use steganography to communicate covertly and how you can spot these hidden messages. Sherlock, much?
-
Making a Virus: Ever wanted to know what goes into making a virus (ethically, of course)? Mr. Sharma broke down the basics, showing how malicious code is crafted. But don’t get it twisted—this wasn’t a how-to guide for wannabe hackers. It was about understanding the enemy to better defend against them.
-
Extracting the IP of a Target OS - Nmap: Enter Nmap, the Swiss Army knife of network scanning. From identifying IP addresses to finding open ports, Nmap is a tool every cyber pro needs in their arsenal. Mr. Sharma’s live demo had everyone hooked as he showed how to use this powerful tool for legitimate network assessments.
-
Burp Suite: If Nmap is the Swiss Army knife, Burp Suite is the Batmobile. It’s a must-have for web app security testing. Mr. Sharma walked everyone through its capabilities—intercepting traffic, scanning for vulnerabilities, and automating attack simulations. By the end of the session, even newbies were ready to take on web app testing like pros.
Session All in All
This workshop wasn’t just about dumping information; it was about engaging with students in a way that made cybersecurity feel like the coolest thing ever. From interactive discussions to hands-on activities, the workshop was a huge success. Students from sections 22BIS-1 and 22BIS-2 were all in, asking questions, trying out tools, and basically getting their cybersecurity geek on.
Wrapping Up
In a world where cyber threats are evolving faster than TikTok trends, workshops like these are pure gold. They equip the next generation of cybersecurity experts with the tools and knowledge they need to keep our digital world safe. So, big props to IBM, Mr. Om Kant Sharma, and the faculty at AIT-CSE for pulling off such an amazing event.
And to everyone who attended—congrats, you’ve just leveled up in cybersecurity! Keep learning, keep hacking (ethically, of course), and remember: the best defense is a good offense. Stay curious, stay safe, and stay tech-savvy!
About the Author

Khushpreet Singh
this is meta description