Past Speakers of THM
Information Warfare
Digital Forensics Present & Future
Cyber Security Present & Future
Cyber Crimes in Times of COVID19
Cyber Laws Present & Future
Data Protection and Privacy Issues
Cyber Law in Times of COVID19
Changing Cyber Security Paradigm
Volatile Memory Forensics
Communication Techniques on Darkweb
Balakot Strike Image Analysis
Hacking : Legal Issues & Challenges
Cyber Criminology in Pandemic Scenario
Data Security
Finding Logical Vulnerabilities in Windows Application
Securing data using encryption
SOC Implementation
Threat Hunting
Edge AI in Cyber Security
Critical Infrastructure Protection
Iot Security
Introduction to Exploit Writing
Introduction x86
Menka- The FrameWork
Modern Network Perimeter Security
OSINT
Data Breach & Privacy Issues
Pentesting ios Apps
Thick Client Application Security
Buffer Overflow
Android Pentesting
XXE Everywhere
Introduction to SSDLC
Firewall Rules Set and Configuration Review
Approach for Finding Critical Vulnerabilities
Bug Bounty Ins & Outs
Bug Bounty
Hacking MI Bands
Network Forensics
Security A Network Administrator Perspective
Defense in Depth of Network Security
Security of IOT Framework
Malware Analysis & Detection
Ransomware Analysis
Design Security
VPN A Secure Network
Malware Analysis Using Open Soure
Intro to Modern Identity
Cyber Security - Case Studies
Safe Cyber Streets
Banking Fraud
Security in IOMT
Data Security with Blockchain
Biometric Authentication
Data Security in Cloud Computing
Steps Towards Data Security
How to Get Started with Bug Bounty
AI in Cyber Security
Why DLP is Need of the Hour
Apps that Steal Data
Predection of Ransomeware Intrustion
Data Security in E- Commerce
Cyber Secuirty Tips & Tricks