16-09-2020 | Applying the principles of privacy and security to product design | Chiranth S & Ashish Vakhariya |
09-09-2020 | Secure SDLC | Shailender Rajput and Prajakta Sharma (ReBIT) |
02-09-2020 | Business Continuity & Disaster Recovery (BCP & DR) | Sriram Srinivasan & Lavanya Dakshinamoorthy |
26-08-2020 | Privacy concerns in Social media | Ashish Vakhariya |
19-08-2020 | Network Security Architecture for Data Centres | Pramod Potharaju |
12-08-2020 | Identity & Access Management (IAM) | Ravindra Usmanpurkar & Pankaj Joshi |
05-08-2020 | Privacy law and it’s implications | Shikha Pathak (CySecK) |
29-07-2020 | Introduction to Cloud Access Security Broker (CASB) | McAfee |
22-07-2020 | Introduction to Intrusion Prevention Systems | McAfee |
15-07-2020 | Holistic endpoint security | McAfee |
08-07-2020 | Malware trends and analysis | McAfee |
01-07-2020 | Cybersecurity for Power and Energy Infrastructure | IIT-Dh |
24-06-2020 | Introduction to MITRE ATT&CK framework | Kirtar Oza |
17-06-2020 | Security at the hardware level | IIT-Dh |
10-06-2020 | Placement New Attacks, Function-based Attacks and Graph HMAC | Ciphense |
03-06-2020 | Security and Privacy in Cyber-Physical Systems | IISc |
27-05-2020 | Blockchain and the Vedas connection | Ciphense |
20-05-2020 | Meltdown and Spectre | IISc |
13-05-2020 | Network Security and Application Security | Cisco |
06-05-2020 | Secure Multi Party Computation | IISc |
30-04-2020 | Cybersecurity: Emergence of Software Defined Network | Cisco |
24-04-2020 | Application Security beyond VAPT | Synopsys |
16-04-2020 | Zero Trust – The perimeter is dead | Unisys |
09-04-2020 | Threat intel using OSINT | PurpleSynapz |
03-04-2020 | Career in Cyber Security | CySecK |
27-03-2020 | NASSCOM’S FutureSkills platform for skill building | NASSCOM |