Toggle navigation
n|u
Upcoming Events
Archive
Events
Sessions
Chapter
Northeastern University
VIT Bhopal Student Chapter
Coimbatore, Tamil Nadu [Status - Seed]
Aurangabad (Maharashtra)
Nashik, Maharashtra [Status - Seed]
More
Engage
Join Mailing List
Become a Volunteer
Request a Session
Propose a Session
Pages
Projects
About Us
FAQ
Start a Chapter
Mailing List Charter
Hall of Fame
Office Bearers
Research Papers
Security
Sponsors
Supporting Events
API
Blog
Login / Register
About
Sessions Archive
Displaying event sessions
1301 - 1350
of
2821
in total
No filter set
Show sessions with reference (Presentation or Video)
Query
Filter
Date
Topic
Speaker
Resources
2018-12-08
Meet
Mumbai
Port knocking
Akshay
2018-12-08
Meet
Mumbai
Port Knocking
Swapnil
2018-12-08
Meet
Mumbai
NewsBytes
Govind Ray
2018-12-08
Meet
Mumbai
GRC: Governance, Risk managment, and Compliance
Sujith Ambady
2018-12-08
Meet
Mumbai
CHFI: A roadmap
Nishant Grover
2018-11-25
Bachaav
Bhopal
Secure Wordpress Deployment
Faiz
2018-11-24
Meet
Mumbai
Security: A CISO’s Perspective
Sheshadri
2018-11-24
Meet
Pune
Bypassing Edge security policies
Nikhil Mittal
2018-11-24
Meet
Kolkata
Exploit - Drink - Sleep - Repeat
Prasenjit Kanti Paul
2018-11-24
Meet
Mumbai
Abusing MSSQL Part I
Chirag Savla
2018-11-24
Meet
Kolkata
Evolution of Vulnerability Management Practice
Arijit Das
2018-11-24
Meet
Mumbai
NewsByte
ashwani kumar
2018-11-24
Meet
Pune
Introduction to Reverse Engineering with radare2
Sudhakar Verma
2018-11-24
Meet
Mumbai
Dissecting Linux's ELF Fromat
Munawwar Hussain Shelia
2018-11-24
Meet
Pune
Common Crypto Failures : 2
Ajit
2018-11-24
Humla
Bangalore
Firmware Reverse Engineering and Exploitation
Vaibhav Bedi
2018-11-24
Humla
Bangalore
Stepping into IoT Security
Mr-IoT
2018-11-18
Meet
Ahmedabad
Finding W4ld0: How to get noticed by a hiring manager in cyber security
Darshan
2018-11-18
Meet
Ahmedabad
Introduction to reversing using IDA
Bhargav Gajera
2018-11-18
Meet
Ahmedabad
Social engineering case studies
Namrata Brahmkshatriya
2018-11-18
Meet
Ahmedabad
Master The Post exploitation with Metasploit Framework
Ravi Rajput
2018-11-17
Meet
Chennai
Static Analysis of NodeJS
Rajsek
2018-11-17
Meet
Chennai
Pentesting Email
vengatesh
2018-11-17
Meet
Chennai
String Malware
Bhaskar
2018-11-17
Meet
Bangalore
Return Oriented Programming ROP
Mihir Shah
2018-11-17
Meet
Bangalore
Secure Compilation Options
Bharath
2018-11-17
Meet
Bangalore
Vulnerable Implementation of OAuth 2
Neelkamal Singh Gaharwar
2018-11-17
Meet
Bangalore
OWASP Application Security Verification Standard Project (ASVS)
Vandana Verma
2018-11-17
Meet
Bangalore
Intro to Browser Security Features
Bharath
2018-11-03
Bachaav
Chandigarh
Secure Code Warrior Tournament
Jaap Karan Singh
2018-10-28
Meet
Ahmedabad
Introduction to Responder
Parth
2018-10-28
Meet
Ahmedabad
Basics of Metasploit Framework
Sanjay Makwana
2018-10-28
Meet
Ahmedabad
Basics of BlockChain
Sanjay Gondaliya
2018-10-27
Meet
Chennai
Reversing RAT
Bhaskar
2018-10-27
Meet
Chennai
Deception Technology
Sai Ganesh T
2018-10-27
Meet
Chennai
Newsbytes
ashok kumawat
2018-10-27
Humla
Bangalore
Wi-Fi Pen testing and beyond
Harsh Thakur
2018-10-27
Meet
Chennai
Securing S3 bucket, IAM, VPC
Chirag Jariwala
2018-10-27
Workshop
Pune
Basics of SQL Injection and techniques of exploitation
Urvesh Thakkar
2018-10-27
Workshop
Pune
Common Crypto Failures
Ajit
2018-10-27
Humla
Bangalore
Wi-Fi Pen testing and beyond
Mihir Shah
2018-10-26
Meet
Dubai
Techniques for Bypassing NAC - Case Study
Teck_K2
2018-10-26
Meet
Dubai
Intro to Format string attacks
Khalilov
2018-10-26
Meet
Dubai
Application Threat Modelling
Seid Yassin
2018-10-26
Meet
Dubai
Windows Kernel Driver Fuzzing
Michael
2018-10-21
Meet
Bhopal
Pentesting BlackMarket VM
Sahil Khan
2018-10-21
Meet
Bhopal
Newsbytes
Shreyasi
2018-10-20
Meet
Chandigarh
Getting Started with NMAP: Swiss Army Knife for Network Security Testing
Pankaj Mouriya
« First
‹ Prev
…
23
24
25
26
27
28
29
30
31
…
Next ›
Last »