x
null Global Committee elections are coming up! See the
election repository
for more information.
n|u
Toggle navigation
Upcoming Events
Archive
Events
Sessions
Chapter
Madurai, Tamil Nadu [Status: Seed]
Bangalore
Jeddah chapter [Status: Seed]
Kalyan, Maharashtra
VIT Bhopal Student Chapter
More
Engage
Join Mailing List
Become a Volunteer
Request a Session
Propose a Session
Pages
Projects
About Us
FAQ
Start a Chapter
Mailing List Charter
Hall of Fame
Office Bearers
Privacy Policy
Research Papers
Return & Refund Policy
Security
Sponsors
Supporting Events
Terms and Conditions
API
Blog
Login / Register
About
Sessions Archive
Displaying event sessions
2401 - 2450
of
3113
in total
No filter set
Show sessions with reference (Presentation or Video)
Query
Filter
Date
Topic
Speaker
Resources
2016-10-15
Meet
Pune
HTTP/2 : A Security Perspective
Sunil Kumar
2016-10-15
Meet
Pune
Car Hacking (Risks to digitized vehicles)
Hiren Bhensdadia
2016-10-15
Meet
Pune
Security News Bytes
Siddharth Bezalwar
2016-10-15
Humla
Mumbai
Open Source Intelligence
Shubham Mittal
2016-10-08
Meet
Mumbai
PHP Security
Siddharth Mahajan
2016-10-08
Meet
Mumbai
Lesser Known Web Attacks
Kaushal Parikh
2016-10-08
Meet
Mumbai
News Bytes
Mugdha
2016-10-08
Meet
Mumbai
VPN Technologies - How secure are SSL and IPsec VPN encryptions
Uday Bhatia
2016-10-08
Meet
Mumbai
Veils Framework
Sukesh Shetty
2016-10-08
Public Puliya
Bangalore
Getting Started with Windows Security
Kaushal Banninthaya
2016-10-08
Meet
Mumbai
Security Certifications
Manasdeep
2016-10-08
Meet
Mumbai
Trends in Payment Industry – Host Computing Environment & Secure Element
Raakhi Radhakrishnan
2016-10-08
Public Puliya
Bangalore
Getting Started with Android Security
Kartik Lalan
2016-10-01
Public Puliya
Bangalore
Getting started with the Cloud (Or Rather Public Infrastructure As A Service Cloud)
Akash Mahajan
2016-09-24
Meet
Chennai
Intro to SIEM
Raghavendran Gopal
2016-09-24
Meet
Chennai
Security Leaks in SMB
vengatesh
2016-09-24
Meet
Chennai
Malicious Adversaries Vs ML
Naresh
2016-09-24
Meet
Chennai
DLL Hijacking
Bhaskar
2016-09-24
Meet
Kolkata
Hacking with Raspberry Pi
Koustav Chanda
2016-09-24
Meet
Delhi NCR
Pwning Windows Mobile Applications
Ankit Giri
2016-09-24
Meet
Mumbai
Middleware Dissection
Kaustubh Padwad
2016-09-24
Meet
Kolkata
Android Exploitation
Animesh Roy
2016-09-24
Meet
Delhi NCR
Machine Learning in Information Security - The Relationship
Mohammed Zuber
2016-09-24
Meet
Mumbai
NewsBytes
pratik Mahale
2016-09-24
Meet
Delhi NCR
Escape Plan - Evading Web Application Firewalls (WAF) for XSS Attacks
Divya
2016-09-24
Meet
Mumbai
Abusing TARGET
Sanoop Thomas
2016-09-24
Meet
Delhi NCR
Infosec News Bytes
Arpit
2016-09-24
Meet
Kolkata
'What' and 'How' of a CTF
Govind Singh
2016-09-24
Meet
Mumbai
Linux Kernel Internals & Memory Management
Ganesh Naik
2016-09-23
Meet
Dubai
Panel Discussion & Live Q&A - Bug Bounties
Rupam Bhattacharya
2016-09-23
Meet
Dubai
Panel Discussion & Live Q&A - Bug Bounties
TAS
2016-09-23
Meet
Dubai
Exploiting Software Update Vulnerabilities
V B
2016-09-23
Meet
Dubai
Exploiting a Domain using Rogue Kerberos Server
TAS
2016-09-23
Meet
Dubai
Ransomware Preface
Arjun PN
2016-09-17
Humla
Mumbai
Drozer for Android Application Security
Vivek Mahajan
2016-09-17
Meet
Pune
Secure Coding in C#
Siddharth Bezalwar
2016-09-17
Meet
Pune
Android Application Exploitation
Sumedh Bhalerao
2016-09-17
Humla
Mumbai
Drozer for Android Application Security
Vivek Mahajan
2016-09-17
Meet
Pune
Security News Bytes
swapnil shukla
2016-09-17
Meet
Pune
Pwning Computers Using USB HID Devices
Rashid feroz
2016-09-17
Workshop
Bangalore
Python School of Security - Class 2
Bharath
2016-09-17
Workshop
Bangalore
Python School of Security - Class 2
Abhinav Chourasia
2016-09-11
Meet
Bhopal
What it takes to defend an application
Anant Shrivastava
2016-09-11
Meet
Bhopal
Admissibility of electronic evidence in India
YOgesh Pandit
2016-09-11
Meet
Bhopal
News Bytes
Jaskaran Singh Narula
2016-09-10
Meet
Bangalore
CTF(Capture The Flag) Approach
Chandrakant
2016-09-10
Meet
Bangalore
Using Hydra
Sankalp Bastakoti
2016-09-10
Meet
Bangalore
IOT Exploitation - II
Abhinav Chourasia
2016-09-10
Meet
Bangalore
Bypassing Corporate Security
Aamer Shah
2016-09-10
Meet
Bangalore
iOS App Runtine Analysis
Swaroop Yermalkar
« First
‹ Prev
…
45
46
47
48
49
50
51
52
53
…
Next ›
Last »