17-02-2021 | Introduction to Digital Forensics tools with demo | Mr. Shashidhar. T.K, Senior Consultant, Data Security Council of India | NA |
10-02-2021 | Primer to Digital Forensics | Mr. K. Venkatesh Murthy, Director, Data Security Council of India | NA |
20-01-2021 | Threat Modelling | Mr. Abhishek Nayak & Eby Mohan | View |
23-12-2020 | Cyber Security Maturity Model Certification | Geet Kukreja & Neelima Tople | View |
9-12-2020 | Zero Trust Decoded- Hands on | Unisys | View |
2-12-2020 | Zero Trust Decoded | Unisys | View |
11-11-2020 | Attack and Defense Methodologies | Fortinet | View |
28-10-2020 | AI in Cyber Security | IBM | View |
07-10-2020 | IOT Security | Neeraj Thakur, Chinkle Urmania | View |
30-09-2020 | Governance, Risk & Compliance (inclusive of framework and tools) | Deepti Joshi, Siddharth Srivastava | View |
23-09-2020 | Data centric security with focus on Digital Rights Management | Bala Senthil Rajan(Seclore) | View |
16-09-2020 | Applying the principles of privacy and security to product design | Chiranth S & Ashish Vakhariya | View |
09-09-2020 | Secure SDLC | Shailender Rajput and Prajakta Sharma (ReBIT) | View |
02-09-2020 | Business Continuity & Disaster Recovery (BCP & DR) | Sriram Srinivasan & Lavanya Dakshinamoorthy | View |
26-08-2020 | Privacy concerns in Social media | Ashish Vakhariya | View |
19-08-2020 | Network Security Architecture for Data Centres | Pramod Potharaju | View |
12-08-2020 | Identity & Access Management (IAM) | Ravindra Usmanpurkar & Pankaj Joshi | View |
05-08-2020 | Privacy law and it’s implications | Shikha Pathak (CySecK) | View |
29-07-2020 | Introduction to Cloud Access Security Broker (CASB) | McAfee | View |
22-07-2020 | Introduction to Intrusion Prevention Systems | McAfee | View |
15-07-2020 | Holistic endpoint security | McAfee | View |
08-07-2020 | Malware trends and analysis | McAfee | View |
01-07-2020 | Cybersecurity for Power and Energy Infrastructure | IIT-Dh | View |
24-06-2020 | Introduction to MITRE ATT&CK framework | Kirtar Oza | View |
17-06-2020 | Security at the hardware level | IIT-Dh | View |
10-06-2020 | Placement New Attacks, Function-based Attacks and Graph HMAC | Ciphense | View |
03-06-2020 | Security and Privacy in Cyber-Physical Systems | IISc | View |
27-05-2020 | Blockchain and the Vedas connection | Ciphense | View |
20-05-2020 | Meltdown and Spectre | IISc | |
13-05-2020 | Network Security and Application Security | Cisco | View |
06-05-2020 | Secure Multi Party Computation | IISc | View |
30-04-2020 | Cybersecurity: Emergence of Software Defined Network | Cisco | View |
24-04-2020 | Application Security beyond VAPT | Synopsys | View |
16-04-2020 | Zero Trust – The perimeter is dead | Unisys | View |
09-04-2020 | Threat intel using OSINT | PurpleSynapz | View |
03-04-2020 | Career in Cyber Security | CySecK | View |
27-03-2020 | NASSCOM’S FutureSkills platform for skill building | NASSCOM | |