SecurityTrainings

Final List of Candidates for the Student Mentorship Programme 2014-15

We are very glad to announce the results of our Mentorship Programme, 2014. In the selection process we first shortlisted the participants on the basis of the answers they provided for questionnaire. The shortlisted candidates were then interviewed by our members. On the basis of their comments following students are selected for this programme.

 

 

1. Ravinder Verma – MS, Indian Institute of Information Technology (IIIT), Allahabad, UP (India)

2. Raghvendra Pratap Singh – MS, Indian Institute of Information Technology (IIIT) Allahabad, UP (India)

3. Tri Nguyen –  Ho Chi Minh City University of Technology, Ho Chi Minh City (Vietnam)

 

We would like to wish all the best to rest of the candidates for their future and would advise them to participate in next year programme.

 

For more details, check out our Mentorship Programme page or Join our Mailing List

Similar posts
  • SecurityXploded 4th Quarterly Meetup ... Here is the quick update and presentations from our recently concluded Fourth ‘SecurityXploded Cyber Security Quarterly Meetup’.     In this meet, Subrat Sarkar delivered presentation on “Exposing the secrets of Windows Credential Provider”, Raghav Pande covered the topic on “Defeating Public Exploit Protections(EMET v5.2 and more)”, Amit Malik presented the topic “Return Address – [...]
  • SecurityXploded Cyber Security Meetup... This is an announcement for the upcoming SecurityXploded cyber security community meetup on 23rd May 2015 in Bangalore, India. This meet is completely free and doesn’t require any registration or any other formalities to attend. The meet will start at 10 AM IST.   After the meet, we will upload the presentations/videos for our online [...]
  • SX 3rd Meetup – Hunting Ghost R... In this awesome presentation, Monnappa KA explained the details of Ghost RAT malware used in various Cyber Espionage attacks. He showcased the sandbox analysis, traffic pattern and decrypting the communications of Ghost RAT from packet capture. He also demonstrated both manual and automated method of detecting and decrypting the communications of Ghost RAT using memory [...]
  • SX 3rd Meetup – Malicious Url D... In this awesome presentation, Satyam Saxena explained the concept of detecting malicious urls using machine learning.The presentation mainly focused on using various infrastructure based features of an url, to design a machine learning system which can automatically predict the probability of its maliciousness.   Presentation:       [...]
  • PE File Overview PE stand for Portable Executable that is native file format for Win32. Portable Executable file format is universal across all win32 platform. All Win32 executables like Control Panel Applets (.CPL ), 32bit DLLs, COM files, .NET executables and also NT’s kernel mode drivers. Note that VxDs(virtual device drivers)  and 16 bit DLLs not use PE [...]

Leave a Reply

Your email address will not be published. Required fields are marked *