SecurityTrainings

Mentorship Programme Application Form 2015-16

The Application Form for the SecurityXploded Mentorship Programme 2015-2016 is online now.

 

securityxploded mentorship programme

 

To apply in this Mentorship Programme, the aspiring students have to fill the Mentorship Programme Application form. Please download the form from here.

Application form is divided into two parts

  • Basic Information
  • Screening Questions

 

#1 Basic Information – In this section students have to fill their basic information like name, University/college name etc.

#2 Screening Questions – This section is containing 10 screening questions. Selection will be based on the answers to the screening questions. After shortlisting the applications,selected applicant will get an interview call for the final selection.

The final list of selected students will be announced on our website and a confirmation e-mail will be sent to the selected candidates.

Students from the same university or college can send their application forms in a RAR/ZIP file.

 

Important Information:

  1. Last date to apply for the programme is 15-june-2015 (15/06/2015).
  2. Send your application form to: team@securityxploded.com
  3. Keep the subject name: [your_name or college/university name]Mentorship Programme Application Form
  4. Please don’t type anything in the email body.
  5. Final list of selected students will be announced on 15-July-2015 (15/07/2015)

 

For additional queries or questions please discuss on our Mailing List.

 

Similar posts
  • Announcing New Cyber Security Communi... I remember my first meeting with Nagareshwar in 2011. We were sitting in a small cafe with a cup of coffee. we discussed many things but one of the topic was how to build a group of like minded people to solve some real problems with education system, economic system or just to create an [...]
  • SecurityXploded Cyber Security Meet &... Here is the quick update and presentations from our recently concluded ‘SecurityXploded Cyber Security Quarterly Meetup’.     In this meet, Adarsh Agarwal delivered presentation on “Understanding Cryptolocker (Ransomware) with a Case study”, Satyam Saxena covered the topic on “Malicious Client Detection using Machine Learning”, Abhinav Chourasia presented on “Buffer Overflow Attacks”, Anirudh Duggal presented [...]
  • Reversing and Investigating Malware E... In this presentation, Monnappa explained the concept of code injection and hollow process injection. He demonstrated the working of hollow process injection using reverse engineering and showed how such infections can be detected and investigated using memory forensics   Presentation:     Demo 1 – Understanding Hollow Process Injection Using Reverse Engineering:     Demo [...]
  • Fingerprinting Healthcare Institution... In this presentation, Anirudh Duggal covered the techniques used to fingerprint vulnerable hospitals and healthcare infrastructure using web based tools. He also explained the potential attack points and the measures that can be taken to secure such infrastructure.   Presentation: [...]
  • Buffer Overflow Attacks In this presentation, Abhinav chourasia covered the concept of Buffer Overflow and he also demonstrated how one can exploit a vulnerable application and take control of a system and execute arbitrary commands on the system   Presentation: [...]

Leave a Reply

Your email address will not be published. Required fields are marked *