You are on page 1of 3

Name: Aldrian G.

Hernandez
Hosting Institution: De La Salle Lipa
Seminar Date and Venue: February 22, 2018 – CBEAM Building (CB403)
Seminar Title: ETHICAL HACKING SEMINAR

Objective of the Seminar:


The objectives of the seminar is to:
 To give the 5th year Computer Engineering students an insight of the job
opportunities regarding Ethical Hacking and Threat Security
 To prepare the 5th year Computer Engineering students in the requirements
to become a specialist in Malware Detection and Security

The Speaker
Engr. Bernadette Cañubas
-BS Computer Engineering Graduate Batch 2008 at De La Salle Lipa
-Malware Researcher at Trend Micro (November 2008 – July 2009)
-Detection Specialist at Threat Track Security Inc. (January 2010 - Present)

The Seminar
The seminar held at the CB-403 in De La Salle Lipa on the 22th day of February
2018 began around 08:30AM when the guest speaker arrived with a opening prayer
which was led by a host group member. The guest speaker was then presented by our
teacher-in-charge of the course Semtrip. She gave a handful of professional credentials
about the guest speaker and I was again surprised because the speaker, Engr. Bernadette
Cañubas, was also a graduate of BS Computer Engineering in De La Salle Lipa similar to
the last speaker we had two weeks ago. The guest speaker took the floor and further
introduced herself and presented in her introduction that the Cyber Security career is one
of the most highly demand jobs that companies are currently looking for, and with
the booming emergence of the internet and technology there are various path careers in
Cyber Security that we as graduating students could take. There are at least six career
paths in the job of Cyber Security, these are; Forensic Analyst, Security, Analyst,
Malware Analysts, Network Security Engineer, Vulnerability Researchers, and
Penetration Tester Crypt Analyst. Forensic Analysis can be described as about gathering
and retrieving information from computers and storage devices. As the said occasion
advanced, the speaker inquired as to whether ever we have encountered dealing with
malware in our gadgets and none of us could share possibly in light of the fact that we
thought she was alluding to an abnormal state contamination. Our SEMTRIP instructor
in-control shared one of her encounters which gave route for the speaker to examine
about the diverse kinds of Trojan infections. One sort of Trojan infection the speaker
characterized was the flooder which causes movement in correspondence channels
subsequently coming about into an impeded preparing. Another is the adware which is a
non-destructive kind of malware on the grounds that it simply indicate promotions and is
simply irritating. The speaker at that point went ahead to talk about how she identifies
infections in a PC, she demonstrated to us various strides in the wake of contaminating
the virtual workstation with a malware. The speaker said that through time and practice
we could get over the trouble that amateurs normally encounter. The workshop had a
short stop for noon and we had a pragmatic test directly after to check whether we
completely comprehend what was educated by the speaker. We ran the malware in the
virtual workstation and took after similar advances the speaker did yet for a clench hand
clock like me, it was entirely difficult to do fortunately some of my companions could do
it so I requested help. Toward the end I could comprehend it and expectation that I could
use it later on.
Figure 1. Discussion of Cyber Security

Figure 2. Photo with the Guest Speaker


Evaluation
A lot of terms that were discussed during the seminar were new to our ears which
made it interesting and with the speaker’s professionalism and expertise in sharing her
knowledge about threat detection and computer network security, the said event could not
have gone any better. She explained her points so well that it gave us a deeper
understanding on what it is like to be a software security specialist and other
opportunities in that area. All the topics were explained to the class in a tactical method
that made it easy for the class to apprehend how malwares are detected and removed
from a workstation. The class was also introduced to new terms such as the types of
Trojan viruses and the possible jobs in the area of computer network security. This
seminar was also very helpful in giving as background of Cyber Security, the various
fields in cyber security, making us aware of the various types of malware and ensuring
prevention from being infected. Overall, the seminar was informative and very helpful in
furthering our knowledge in Computer Engineering and making us aware of other areas
that we were not taught in our curriculum, and giving us a basic knowledge in Ethical
Hacking, and Cyber Security. I also learned in this seminar that what we are taught and
the education we gained may not be enough, and there might be other areas and fields in
Computer Engineering that may be available in the corporate world, and it implies from
this dissertation that we would still have a lot to learn outside of the school, and expand
our knowledge, and learn from new emerging technology that goes beyond areas that we
were thought. The topics handed in the seminar showed the class the significance of
computer engineering to various industries especially on software security side and what
career opportunities are waiting for us when we finish our course.

You might also like