Sessions
-
Android Pentesting - Hands-On
beginnerhands-on-
Gatin Shah
Redhuntlabs
-
Shivang Desai
Microsoft
-
Gatin Shah
-
Attackers and Defenders Strategies for Containers Security
beginnerhands-on-
Karthik Palnati
HighRadius
-
Sartaj Ahmed
HighRadius
-
Karthik Palnati
-
Attacking Serverless Applications
beginnerhands-on-
Rachana Umaraniya
INE
-
Shantanu Kale
INE
-
Rachana Umaraniya
-
Blockchain and Smart Contract Security Fundamentals
beginnerhands-on-
Shashank
CredShields
-
Shashank
-
Drone Hacking Workshop
beginnerhands-on-
Mohd Arif
Paytm
-
Seedon Dsouza
NSEIT
-
Sheeraz Ali
Hack The Box
-
Mohd Arif
-
Hands-On Threat Hunting Workshop
beginnerhands-on-
Maninder Mohan
Beagle Security
-
Nash Sulthan
Beagle Security
-
Maninder Mohan
-
Hardware Hacking Workshop
beginnerhands-on-
Mohd Arif
Paytm
-
Seedon Dsouza
NSEIT
-
Sheeraz Ali
Hack The Box
-
Mohd Arif
-
How We Got Into A Unicornβs Private Codebase
beginnerhands-on-
Arshit Jain
Cloudsek
-
Arshit Jain
-
Machine Learning for Cyber Security β Hands on Workshop
beginnerhands-on-
Bhaskarjit Sarmah
BlackRock
-
Bhaskarjit Sarmah
-
Multi Cloud Security
beginnerhands-on-
Manish Gupta
CyberWarFare Labs
-
Yash Bharadwaj
CyberWarFare Labs
-
Manish Gupta
-
Network Pentesting
beginnerhands-on-
Ashish Bhangale
INE
-
Divya Nain
INE
-
Ashish Bhangale
-
Tech Talk β Threat Hunting for Cloud Compromising Technique and Threat Actor Profiling for Group βTeam TNTβ
beginnerhands-on-
Chetan Kawley
Security Researcher
-
Chetan Kawley
-
Threads App - Emulating Real World Vulnerabilities For Fun And Profit
beginnerhands-on-
Akarsh Singh
Enciphers
-
Samiul Hussain
Enciphers
-
Akarsh Singh
-
Tool Demonstration of CANalyse
beginnerhands-on-
Kartheek Lade
Payatu
-
Kartheek Lade
-
Tool Demonstration of CANalyse
beginnerhands-on-
Kartheek Lade
Payatu
-
Kartheek Lade
-
Web Application Security
beginnerhands-on-
Swathi Kudva
Appsecco
-
Swathi Kudva