
Digital Marketing
What is this course about?
This Workshop covers all the key aspects of Digital Marketing which include Search Engine Optimization, Pay Per Click (PPC), Email Marketing, Mobile Marketing, Social Media Marketing, Digital Display Marketing, and Web Project Development Basics. The program syllabus is designed and developed keeping in mind the latest trends in the global digital industry. High ranking jobs such as Digital Marketing Strategist, Digital Marketing Developer, Digital Marketing Traffic Specialist, Mobile Marketing Specialists,
Highlights of workshop
• Certificate of IIT Kanpur .
• Certificate of Participation to all Zonal participants
• Certificate of Merit to all Zonal Winners
• Enhance your Knowledge through various Live Projects
Digital Marketing |
Day 1 (Session 1) |
Ethics and Hacking |
Hacking History- How It All Began |
Need For Ethical Hacking |
Why We Require Ethical Hackers |
Types Of Hackers |
Steps In Ethical Hacking |
Scopes In Hacking |
Windows Hacking |
To exploit the vulnerabilities of windows using live devices and Universal Serial Bus (USB). |
Steganography |
What is Steganography? |
Hiding data behind Images, PDFs, Audio and Videos files |
Day 1 (Session 2) |
Basics Of Internet, Networking And Hacking |
What is a Network? |
Types of network – LANs, WANs & WLANs |
What is Internet? |
Basic Structure |
What is a Server? |
What is an IP Address? |
What is a domain name? |
IP-Domain Relation |
Client-Server Relationship Model |
Internet networking |
Set up Ad-hoc networks |
Basic explanation of exploitation of loopholes |
SQL Injection Using DVWA |
Introduction of SQL |
What are SQL INJECTION and DVWA? |
Checking SQL injection vulnerability (Demo) |
Basic strategy of SQL injection (Demo) |
Getting login credentials using SQL injections (Live Demo) |
URL and Forms (Demo) |
SQL Query SELECT, DROP etc. (Demo) |
SQL cheat sheets (Demo) |
Using source changes to bypass client side validation (Demo) |
Live demonstration of the attack (Demo) |
Using SQL injection tools (Demo) |
How to protect your system from attacks |
Day 2 (Session 3) |
Man In The Middle Attack(MITM) |
What is Backtrack Linux? |
What is Man-in-the-middle attack? |
Preparation for Man-in-the-middle attack (Demo) |
Setting Ettercap tool for the attack (Demo) |
Identifying victim (Demo) |
Countermeasures against MITM attack (Demo) |
Phishing, Trojan, Worms And Viruses |
What is phishing? |
Preparation for phishing |
Introduction to the concepts of Trojans, worms and viruses |
Day 2 (Session 4) |
Zonal Competition |
After the hand on theory and practical experience from the workshop, Zonal Round Competition will be conducted for the participants. |
Certificate Distribution |
On behalf of Embedded Design Locomotive Certificate of Merit will be provided to all Zonal Round Winners and Certificate of Participation will be provided to all the Zonal Round Participants (Excluding Merit Participants). |