x
null Global Committee elections are coming up! See the
election repository
for more information.
n|u
Toggle navigation
Upcoming Events
Archive
Events
Sessions
Chapter
Chandigarh
Vizag - Andhra Pradesh [Status - Seed]
Ganpat University Student
Ahmedabad
VIT Bhopal Student Chapter
More
Engage
Join Mailing List
Become a Volunteer
Request a Session
Propose a Session
Pages
Projects
About Us
FAQ
Start a Chapter
Mailing List Charter
Hall of Fame
Office Bearers
Privacy Policy
Research Papers
Return & Refund Policy
Security
Sponsors
Supporting Events
Terms and Conditions
API
Blog
Login / Register
About
Sessions Archive
Displaying event sessions
2751 - 2800
of
3113
in total
No filter set
Show sessions with reference (Presentation or Video)
Query
Filter
Date
Topic
Speaker
Resources
2015-09-26
Meet
Chennai
Hearbleed vulnerability exploit
sriram
2015-09-26
Meet
Chennai
IOT security issues
vengatesh
2015-09-12
Meet
Mumbai
Secure Code Review
Badrish Dubey
2015-09-12
Meet
Pune
Demystifying scada malware analysis- Havex
Arun Mane
2015-09-12
Meet
Mumbai
Windows Audit
Kaustubh Padwad
2015-09-12
Meet
Pune
Ethical Hacking - Identifying the Vulnerabilities
Sarwar Jahan M
2015-09-12
Meet
Pune
Security News Bytes
Sumedh Bhalerao
2015-09-12
Meet
Mumbai
Cacti & Netflow
Archit Mehta
2015-09-06
Humla
Mumbai
Malware Analysis & Reverse Engineering
Rohan Bhavsar
2015-09-05
Meet
Delhi NCR
Cyber Warfare Capabilities, A Reality Check by Rajeev Chauhan
aarcee
2015-09-05
Meet
Delhi NCR
Undersurf: Dark Reading
Aakash Goel
2015-09-05
Meet
Delhi NCR
Setting Up a Cost Effective Application Security Program from Scratch - Part 2
Ram Awasthi
2015-09-05
Meet
Delhi NCR
Setting Up a Cost Effective Application Security Program from Scratch - Part 1
tusnin das
2015-09-05
Meet
Delhi NCR
News Bytes
Shantanu Goel
2015-08-29
Meet
Chennai
Manual Source Code Analysis
Nalla Muthu S
2015-08-29
Meet
Chennai
Windows Tokens
vengatesh
2015-08-29
Meet
Chennai
iOS - Run time Analysis using Cycript
naveen
2015-08-29
Meet
Chennai
iOS - Run time Analysis using GDB
santosh
2015-08-29
Meet
Chennai
Mobile Security - M7
adarsh
2015-08-29
Meet
Bangalore
Kerberos Golden Ticket
Asish
2015-08-29
Meet
Bangalore
Android rooting Internals
Anto joseph
2015-08-29
Meet
Bangalore
Cross Origin Resource Sharing
Ishan Girdhar
2015-08-29
Meet
Bangalore
Exploiting Version Control Systems
Anant Shrivastava
2015-08-29
Meet
Bangalore
Owasp Mobile Top 10 - M9: Improper Session Handling
Apoorva
2015-08-22
Humla
Mumbai
Incident Response with YARA | A pattern matching swiss knife | Part 1
D.M.Reddy
2015-08-08
Bachaav
Chennai
Exploits and Mitigation
Prasath K
2015-08-08
Meet
Mumbai
Content Security Policy By Taufiq Ali
TAS
2015-08-08
Meet
Pune
Social engineering : a brief introduction
Sumedh Bhalerao
2015-08-08
Meet
Mumbai
Smashing the Stack - Stack Overflow Basics
Kaustubh Padwad
2015-08-08
Meet
Pune
Cyber Crimes and Forensic Tools
Amit
2015-08-08
Meet
Mumbai
OWASP Secure Application Design
ashish
2015-08-08
Meet
Pune
Windows Kernel Exploitation 6
Ashfaq Ansari
2015-08-08
Meet
Mumbai
Security News Bytes
Mahesh Hegde
2015-08-08
Meet
Pune
Security News Bytes
Priya Panke
2015-08-08
Bachaav
Chennai
Application Security Process
Nalla Muthu S
2015-07-25
Humla
Chennai
capturing and analysing the pcaps
Balasubramaniam Natarajan
2015-07-25
Meet
Delhi NCR
Cloud Security 101
MADHAV CHABLANI
2015-07-25
Humla
Chennai
Writing your own sniffers
Chintu Philips Koshy
2015-07-25
Meet
Bangalore
Content security Policy
Riyaz Walikar
2015-07-25
Meet
Delhi NCR
GSM Security - Part II
Sushil Kr Singh
2015-07-25
Meet
Bangalore
Grinder Tool
AMol NAik
2015-07-25
Meet
Delhi NCR
GSM Security - Part I
Dheeraj
2015-07-25
Meet
Delhi NCR
New Bytes
null/OWASP Delhi Team
2015-07-25
Meet
Bangalore
Quantum Cryptography
Sidhant Dogra
2015-07-25
Humla
Chennai
Intro to Git
Chintu Philips Koshy
2015-07-25
Meet
Bangalore
PHP Remote Code Execution
Rahul Sasi
2015-07-25
Humla
Pune
null humla on Malware Analysis
Krishs
2015-07-25
Meet
Bangalore
Demystifying Mobile Top 10 - M8
Shivang Desai
2015-07-25
Humla
Chennai
Introduction
Balasubramaniam Natarajan
2015-07-18
Meet
Dharamshala
Cyber Security Trends and Advanced Persistent Threats
Nitish Chandan
« First
‹ Prev
…
52
53
54
55
56
57
58
59
60
…
Next ›
Last »