Toggle navigation
n|u
Upcoming Events
Archive
Events
Sessions
Chapter
Ganpat University Student
Jaipur [Status: Seed]
Coimbatore, Tamil Nadu [Status - Seed]
Singapore
VIT Bhopal Student Chapter
More
Engage
Join Mailing List
Become a Volunteer
Request a Session
Propose a Session
Pages
Projects
About Us
FAQ
Start a Chapter
Mailing List Charter
Hall of Fame
Office Bearers
Research Papers
Security
Sponsors
Supporting Events
API
Blog
Login / Register
About
Sessions Archive
Displaying event sessions
1501 - 1550
of
2801
in total
No filter set
Show sessions with reference (Presentation or Video)
Query
Filter
Date
Topic
Speaker
Resources
2018-04-27
Meet
Dubai
The "E" in MalwarE - Evolution, Exploit, Evasion
Rami
2018-04-27
Meet
Dubai
Cyber Threats Intelligence and Analytics
Surendra
2018-04-22
Meet
Bhopal
Introduction to Nmap
Yugansh Holani
2018-04-22
Meet
Bhopal
The Lazy Script
Sudhanshu kashyap
2018-04-22
Meet
Bhopal
Getting Started with Burp Suite
Shreya Pohekar
2018-04-21
Meet
Chennai
Pentesting VOIP - Part2
vengatesh
2018-04-21
Meet
Chennai
Data Science,Machine Learning and AI
Teja Kummarikuntla
2018-04-21
Meet
Chennai
Cryptojacking
Sai Ganesh T
2018-04-21
Meet
Chennai
Host based IDS
Gopi Krishnan S
2018-04-21
Public Puliya
Bangalore
Kubenetes Security
Nemo
2018-04-21
Public Puliya
Bangalore
Kubernetes 101
hashfyre
2018-04-21
Meet
Bangalore
Selenium+Zap+Jenkins
Narendra
2018-04-21
Meet
Bangalore
Report Automation
Zakeer
2018-04-21
Meet
Bangalore
Rest API Pentesting
Sagar
2018-04-21
Meet
Bangalore
Block Chain
Sadhana
2018-04-21
Meet
Bangalore
Hardware Hacking
Likith
2018-04-15
Meet
Ahmedabad
Hands-on Challenge
Bhashit Pandya
2018-04-15
Meet
Ahmedabad
Pawning JS
Jaimin Gohel
2018-04-15
Meet
Ahmedabad
Detect Before Attack
Santhosh Baswa
2018-04-15
Meet
Ahmedabad
Firewall Testing - An art of Intrusion
Ravi Rajput
2018-04-15
Meet
Ahmedabad
Social Engineering - II
Namrata Brahmkshatriya
2018-04-15
Meet
Ahmedabad
News Bytes
Manju Chufal
2018-04-15
Meet
Ahmedabad
Introduction to Null Community
Bhashit Pandya
2018-04-14
Meet
Mumbai
The domain will fall - Evolved strategies to break Internal networks and avoid detection
Sudarshan
2018-04-14
Meet
Mumbai
Vulnerability analysis on cyber-physical systems: MELSOFT protocol
mihirraj dixit
2018-04-14
Meet
Mumbai
NewsBytes
Gaurav Kumar
2018-04-14
Meet
Mumbai
Code Review
kavita Ghaitadke
2018-04-07
Humla
Bangalore
Post Exploitation with PowerShell Empire (Getting started)
Riyaz Walikar
2018-03-30
Meet
Dubai
Phishing Methodology
Mayank
2018-03-30
Meet
Dubai
Hacking Radio Frequencies Part 2
Rajesh TV
2018-03-30
Meet
Dubai
Hacking Radio Frequencies Part 2
Abdul Rasheed
2018-03-30
Meet
Dubai
DevSecOps 101
Shaikh Raashid
2018-03-30
Meet
Dubai
Computer Forensics Methodology
Mousa Alfalayleh
2018-03-25
Meet
Chennai
The key to Enumeration
Nibin
2018-03-25
Meet
Chennai
XOR Encryption
Anmol Maurya
2018-03-25
Meet
Chennai
Host based IDS
Gopi Krishnan S
2018-03-25
Meet
Bhopal
Vagrant for Devops
Deepanshu Gajbhiye
2018-03-25
Meet
Chennai
Pentesting Series - II - VoIP Pentesting
vengatesh
2018-03-25
Meet
Bhopal
Beef Exploitation Framework
Saurabh Chaudhary
2018-03-25
Meet
Ahmedabad
Can You See My Meterpreter!?
Ravi Rajput
2018-03-25
Meet
Bhopal
News Bytes
Yugansh Holani
2018-03-25
Meet
Ahmedabad
OWASP Top 10 - A1 Injection Explained
Jaimin Gohel
2018-03-25
Meet
Ahmedabad
Red Teaming - A real-world attack simulation
Bhashit Pandya
2018-03-25
Meet
Ahmedabad
Introduction to Wireshark
Vishal
2018-03-24
Meet
Kolkata
Basics of Windows Privilege Escalation
Souhardya Sardar
2018-03-24
Meet
Kolkata
Hack RFID with Live Demo
Tanmoy Khanra
2018-03-24
Humla
Bangalore
Reverse Engineering and Malware Analysis : Part II
Faiz
2018-03-24
Meet
Delhi NCR
Cloud Security Assessments
Aakash Goel
2018-03-24
Meet
Delhi NCR
Docker fundamentals
Divneet Singh
2018-03-24
Meet
Kolkata
Get Your Response Matured, Apply Intelligence.
Amiya Dutta
« First
‹ Prev
…
27
28
29
30
31
32
33
34
35
…
Next ›
Last »