Toggle navigation
n|u
Upcoming Events
Archive
Events
Sessions
Chapter
Dharamshala
Delhi NCR
Chandigarh
Hyderabad
Doha
More
Engage
Join Mailing List
Become a Volunteer
Request a Session
Propose a Session
Pages
Projects
About Us
FAQ
Start a Chapter
Mailing List Charter
Hall of Fame
Office Bearers
Research Papers
Security
Sponsors
Supporting Events
API
Blog
Login / Register
About
Sessions Archive
Displaying event sessions
1601 - 1650
of
2816
in total
No filter set
Show sessions with reference (Presentation or Video)
Query
Filter
Date
Topic
Speaker
Resources
2018-02-10
Meet
Bangalore
Getting Started with Bug Bounty
Aamer Shah
2018-02-10
Meet
Mumbai
Performance Evaluation on Hybrid Cryptography
parvin
2018-02-10
Meet
Bangalore
Android Pentesting for Beginners
Subash
2018-02-10
Meet
Mumbai
Infosec Compliance Implementation Challenges - Part 2
Manasdeep
2018-02-10
Meet
Bangalore
Java Deserialization
Truptiranjan Nayak
2018-02-10
Meet
Mumbai
NewsBytes
Gaurav Kumar
2018-02-10
Meet
Bangalore
Privacy,Anonymity & the Internet
Faiz
2018-02-10
Meet
Bangalore
Scapy for Beginners
Udaykumar
2018-01-28
Meet
Bhopal
Insecure file upload vulnerability[remote]
Atul Singh
2018-01-28
Meet
Bhopal
Social Media and Internet Addiction
YOgesh Pandit
2018-01-27
Meet
Pune
Bitcoin Forensics
Apurv Singh Gautam
2018-01-27
Meet
Pune
Exploiting vulnerable virtual machine (Kioptrix: Level 1.2)
Ankit Saini
2018-01-27
Puliya
Mumbai
Mobile Security part-2 (iOS Pentesting).
Romansh Yadav
2018-01-27
Meet
Pune
Blockchain Technology
Shrutirupa Banerjiee
2018-01-26
Meet
Dubai
GPO vs App Locker Restrictions
Pralhad Chaskar
2018-01-26
Meet
Dubai
Deconstructing an ELF File
Muhammad Samaak Ahmed
2018-01-26
Meet
Dubai
Phishing Attack Simulation
Rupam Bhattacharya
2018-01-26
Meet
Dubai
Introduction to Password Cracking
Antu Prabha
2018-01-20
Meet
Chennai
64-bit Egg hunting
Bhaskar
2018-01-20
Meet
Chennai
REST API Pentesting
PradeepKumar P
2018-01-20
Meet
Chennai
Demystifying CTF
Balasubramaniam Natarajan
2018-01-20
Meet
Bangalore
Accelerating your Security Learning
Jayesh Singh Chauhan
2018-01-20
Meet
Delhi NCR
Getting Started with Containers
Sandeep Singh
2018-01-20
Meet
Bangalore
Pentesting Docker
Riddhi Shree
2018-01-20
Meet
Bangalore
TPM Basics
Rishi
2018-01-20
Meet
Delhi NCR
IETF's role and mandate in Internet Governance
Mohit Batra
2018-01-20
Meet
Delhi NCR
News Bytes
Pratul
2018-01-20
Meet
Bangalore
Pentesting AWS Lambda Functions
Riyaz Walikar
2018-01-20
Meet
Bangalore
Metasploit Basics
vasanthan
2018-01-20
Meet
Bangalore
Live Forensics on Windows
Arpan Raval
2018-01-13
Meet
Mumbai
Did you get subscribed ?
Dhiraj Mishra
2018-01-13
Meet
Mumbai
Compliance implementation challenges in infosec
Manasdeep
2018-01-13
Humla
Delhi NCR
Getting Started with Binary Exploitation
Rajesh Majumdar
2018-01-13
Meet
Mumbai
Privilege Escalation using Powershell
Avkash Kathiriya
2018-01-13
Meet
Mumbai
NewsBytes
Malla Reddy
2018-01-13
Meet
Mumbai
Crowd-sourced Vulnerable Machine Exploitation - CTF Series
Sudhendu K Lenka
2018-01-13
Humla
Bangalore
Binary Exploitation using Protostar
upendra singh
2017-12-23
Meet
Chennai
OSINT
Nibin
2017-12-23
Meet
Chennai
Compliance Overview & GRC
Arun Venkatesan
2017-12-23
Meet
Pune
Debugging iOS Binaries with LLDB
Sneha Rajguru
2017-12-23
Meet
Pune
Cracking Nordic-Bluetooth’s Read back protection.
Arun magesh
2017-12-23
Meet
Pune
Attacking the malloc's heap on linux
Sudhakar Verma
2017-12-23
Meet
Pune
News Bytes - '2017 Revisited'
Aman Aryan
2017-12-22
Meet
Dubai
Introduction to Atomic Red Team Framework for defender
Pralhad Chaskar
2017-12-22
Meet
Dubai
Windows Privilege Escalation Techniques
Riyaz Walikar
2017-12-22
Meet
Dubai
Introduction to assembly x86
Avinash Kumar Thapa
2017-12-22
Meet
Dubai
Introduction to RFID security
Abdul Rasheed
2017-12-17
Meet
Bhopal
Server Side template Injection[remote]
narendra kumar
2017-12-17
Meet
Bhopal
ARM Exploitation[remote]
jitendra kumar
« First
‹ Prev
…
29
30
31
32
33
34
35
36
37
…
Next ›
Last »