IITM Cyber Netrik
Offensive Strategies for Defensive Readiness!
Cybersecurity Training for Banking CISOs, CIOs, CTOs and their teams, SOC members, and security practitioners to secure cloud and hybrid environments
In today’s evolving threat landscape, passwords, policies, and passive tools are no longer enough. Cyberattacks are increasingly exploiting cloud identities, automation pipelines, endpoint misconfigurations, and hybrid environments – with devastating consequences.
The Cyber Netrik by IIT Madras is a hands-on, immersive training program designed for senior technology and security leaders in the Banking sector. This is not a classroom lecture – it’s a live-fire simulation environment where you’ll walk through the attacker’s playbook to strengthen your own defense.
Program Structure
Track 1: Practitioners & Technical Teams
- Step into real-world attack simulations with guided offensive & defensive labs.
- Use industry-grade tools to simulate, detect & respond to threats like Kerberoasting, IAM abuse, token replay, S3 misconfigurations.
- Learn to think like an attacker, and stop them in their tracks.
- Hosted at IIT Madras: ₹1,00,000 /-
- Hosted outside IIT Madras: ₹1,10,000 /-
Track 2: Leadership & Strategic Roles
- Walk through live attack flows with a decision-maker’s lens.
- Interpret key threat signals from detection dashboards to assess risk in real-time.
- Prioritize responses, coordinate across teams, and understand business-level impact.
- Hosted at IIT Madras: ₹70,000 /-
- Hosted outside IIT Madras: ₹75,000 /-
Program Curriculum
Identity & Credential Threats in Enterprise Environments (Cloud & On-prem)
Abusing Cloud Automation & Platform Services
Endpoint and Enterprise Device Exploitation
Hybrid Identity & Active Directory Attacks
Multi-Factor Authentication Bypass Techniques
Cross-Cloud Attack Paths and Token Replay Techniques
Full Attack Chain Simulation in Azure
Threat Detection and Hunting Across Cloud Platforms
Web Application Vulnerabilities Enabling Cloud Exploits
IAM Role Misuse and Privilege Escalation in AWS
Red Team vs Blue Team Exercise
Hardening and Security Best Practices
Program Schedule
Track 1 (2-day program)
Practitioners & Technical Teams
Day 1 | Day 2 |
---|---|
10:00 – 10:30 Welcome & Opening Remarks |
09:00 – 10:15 Morning Session I |
10:30 – 11:30 Morning Session I |
10:15 – 11:30 Morning Session II |
11:30 – 11:45 Tea Break |
11:30 – 11:45 Tea Break |
11:45 – 13:00 Morning Session II |
11:45 – 13:00 Morning Session III |
13:00 – 14:00 Lunch Break |
13:00 – 14:00 Lunch Break |
14:00 – 15:30 Afternoon Session I |
14:00 – 15:30 Afternoon Session I |
15:30 – 15:45 Tea Break |
15:30 – 15:45 Tea Break |
15:45 – 17:15 Afternoon Session II |
15:45 – 17:30 Afternoon Session II |
17:15 – 18:00 Q&A |
17:30 – 18:00 Feedback & Wrap-Up |
Track 2 (1-day program)
Leadership & Strategic Roles
Day 1 |
---|
10:00 – 10:30 Welcome & Opening Remarks |
10:30 – 11:30 Morning Session I |
11:30 – 11:45 Tea Break |
11:45 – 13:00 Morning Session II |
13:00 – 14:00 Lunch Break |
14:00 – 15:30 Afternoon Session I |
15:30 – 15:45 Tea Break |
15:45 – 17:00 Afternoon Session II |
17:00 – 17:30 Leadership Roundtable & Wrap-Up |
Why Participate?
- Curated at IIT Madras: Designed using insights from real-world red team operations and cutting-edge cloud security research.
- Focused on Critical Threats: Emphasizes high-impact, financially motivated attack vectors with special relevance to the banking and financial sector.
- Two Tracks, One Goal: Whether you are a decision-maker (CISO, CIO, CTO, security manager) or a hands-on practitioner (SOC member, security engineer, red/blue teamer), the program equips you with the right skills and perspectives.
- Leadership & Technical Depth: Leaders gain the ability to interpret threats, assess business risk, and coordinate responses, while technical teams immerse in realistic attack-defense scenarios using industry-grade tools.
- Future-Ready Skills: Stay ahead of adversaries by understanding attacker tradecraft and building robust detection and defense strategies across both cloud and on-premise environments.
Requirements and Prerequisites
Participants are required to bring the following:
- A personal laptop (latest version preferred)
- Administrative privileges on the device (to allow installation of VPN and any required tools or configurations)
- Basic familiarity with Windows and Linux environments
- Mode: Comfort using the command line interface (CLI) on both platforms
- Google Chrome or Microsoft Edge browser installed
All you need is an open mind, curiosity, and a willingness to learn and engage with real-world challenges. The hands-on exercises are guided, and no prior offensive security experience is required.
Registration
- Track 1 (Practitioners & Technical Teams): November 14 & 15, 2025
Registration Deadline: November 12, 2025 11:59 PM - Track 2 (Leadership & Strategic Roles): December 13, 2025
Registration Deadline: December 11, 2025 11:59 PM
Both workshops will be held in BKC, Mumbai.
Participants may register through the link below and select their preferred track during the registration process.
Registration will be confirmed via email notification once the program fee is received.
Glimpses from the Inaugural Program
The first Cyber Netrik cohort was successfully hosted at IIT Madras on July 18 & 19, 2025, under the ISEA initiative of MeitY, Government of India and sponsored by IDBI Bank.
Participating Banks:








Contact Us
Sponsors


IDBI Bank

Information Security Education and Awareness
