All Articles (384)

Sort by

8669941481?profile=original

Application Security Testing &Web Hacking

oswlj6.jpg?width=150

Workshop Duration: 2 days
Date: 4 & 5th June,2015

Price: INR 25,000

Description:

If you are looking at an Application Security training, then this is for you. Get your hands dirty with a deep dive into App

Comments: 0

8669941660?profile=original

Network Forensics & Practical Packet Analysis

oswlj6.jpg?width=150

Workshop Duration: 2 days
Date: 4 & 5th June,2015

Price: INR 25,000

Description:

The knowledge of computer and network forensics has become essential in securing today’s network-centric computing envir

Comments: 0

8669940865?profile=original

Certified Cyber Forensics & Incident Response Essentials

oswlj6.jpg?width=150

Workshop Duration: 2 days
Date: 19 & 20th November,2015
Venue: The Leela, Mumbai

Price: INR 25,000

Description:

"In describing the advanced persistent threat (APT) and advanced adversaries,

Comments: 0

8669938897?profile=original

Reverse Engineering & Malware Analysis 

oswlj6.jpg?width=150

Workshop Duration: 2 days
Date: 5 & 6th June,2015

Price: INR 25,000

Description:

Basic understanding of programming,debugging,x86 assembly language,reverse engineering and malware analysis. This will include

Comments: 0

Data Loss Prevention (DLP)

  • DLP Drivers
  • Types of DLP: Network, Endoint, Data Identification, Data leakage detection, Data at rest
    • Types of data-structured & unstructured
    • Data detection techniques
      • Pattern Macthing
      • Tagging & fingerprinting
    • When to
Comments: 0

Data Loss Prevention (DLP)

  • DLP Drivers
  • Types of DLP: Network, Endoint, Data Identification, Data leakage detection, Data at rest
    • Types of data-structured & unstructured
    • Data detection techniques
  • Pattern Macthing
  • Tagging & fingerprinting
    • When to
Comments: 0
8669940091?profile=original

CISO Platform Decision Summit 2015

The information security world needs to transition from the verbose and opinions based approaches to precise, measurable, metrics oriented approach. Decision Summit is aimed at practical discussions, specific

Comments: 0

Webinar Registration on "Advanced Threats In The Enterprise"

Date   : Tuesday, March 24th, 2015

Time  : 3:00 PM - 4:00 PM IST

What will you Learn:

1. How to gain endpoint visibility and detection capabilities to expose malware and respond with precision

Comments: 0

Discount codes are only applicable for conference pass. Group discounts will be automatically applicable in the billing based on the number of pass you choose .

Terms & Conditions

  • When registering, you explicitly agree to our Terms and Conditions.
Comments: 0
8669938475?profile=original

Call for Speakers- CISO Platform Decision Summit 2015

The information security world needs to transition from the verbose and opinions based approaches to precise, measurable, metrics oriented approach. Decision Summit is aimed at practical dis

Comments: 0