Data structures related to Machine Learning Algorithms |
23 July 2022 |
06.00 P.M - 07.00 P.M |
Know More
|
Identity Theft and Phishing |
23 July 2022 |
06.00 P.M - 07.00 P.M |
Know More
|
Dark web, Deep Web, and Surface Web |
16 July 2022 |
06.00 P.M - 07.00 P.M |
Know More
|
IOT Security Level 100 |
16 July 2022 |
06.00 P.M - 07.00 P.M |
Know More
|
Role of Digital Twin in Industry 4.0 |
9 July 2022 |
06.00 P.M - 07.00 P.M |
Know More
|
Practical implementation of Data Visualization Tool |
2 July 2022 |
06.00 P.M - 07.00 P.M |
Know More
|
Identity and Access Management |
2 July 2022 |
06.00 P.M - 07.00 P.M |
Know More
|
Perimeter Security through firewall |
18 June 2022 |
06.00 P.M - 07.00 P.M |
Know More
|
Story Telling and Advanced Analytics using R and Python on Power BI |
18 June 2022 |
06.00 P.M - 07.00 P.M |
Know More
|
Intelligence for Sales and Marketing through Machine Learning |
11 June 2022 |
06.00 P.M - 07.00 P.M |
Know More
|
Antivirus and it's future |
11 June 2022 |
06.00 P.M - 07.00 P.M |
Know More
|
Bug Bounty - A start towards finding bugs |
04 June 2022 |
06.00 P.M - 07.00 P.M |
Know More
|
Storytelling and Advanced Analytics using R and Python on Power BI |
04 June 2022 |
06.00 P.M - 07.00 P.M |
Know More
|
Cognizant |2023 Batch On-Campus Engagement |
02 June 2022 |
11.00 A.M - 01.30 P.M |
Know More
|
Importance of Ideas and Idea Generation Techniques in Product Design |
06 June 2022 |
11.00 A.M - 12.00 P.M |
Know More
|
Evaluation of Friction and its Impact on Metal Forming Operations |
02 June 2022 |
11.00 A.M - 12.00 P.M |
Know More
|
Green Steel for Sustainable Future |
May 29th, 2022 |
11.30 A.M - 12.30 P.M |
Know More
|
Cyber Security Endpoint protection |
May 28th, 2022 |
6:00 P.M. TO 7:00 P.M. |
Know More
|
Object Detection 101 |
May 28th, 2022 |
6:00 P.M. TO 7:00 P.M. |
Know More
|
End-point Management and Security |
May 14th, 2022 |
6:00 P.M. TO 7:00 P.M. |
Know More
|
One-Hot Encoding for Categorical Variables |
May 14th, 2022 |
6:00 P.M. TO 7:00 P.M. |
Know More
|
Application Security using Threat Modelling |
May 7th, 2022 |
6:00 P.M. TO 7:00 P.M. |
Know More
|
Data Science in Supply Chain Management |
May 7th, 2022 |
6:00 P.M. TO 7:00 P.M. |
Know More
|
Data loss prevention and its uses |
April 30th, 2022 |
6:00 P.M. TO 7:00 P.M. |
Know More
|
Edge AI and its application |
April 30th, 2022 |
6:00 P.M. TO 7:00 P.M. |
Know More
|
Digital Manufacturing and Industrial Internet of Things |
April 20th, 2022 |
2:00 P.M. TO 4:00 P.M. |
Know More
|
Digital Manufacturing and Industrial Internet of Things |
April 20th, 2022 |
2:00 P.M. TO 4:00 P.M. |
Know More
|
Learning Session Testing Manual - LCE25 |
April 13th, 2022 |
3:00 P.M. TO 4:00 P.M. |
Know More
|
Metasploit: A step towards Server Exploitation |
April 9th, 2022 |
6:00 P.M. to 7:00 P.M. |
Know More
|
AI in understanding customer behaviour |
April 9th, 2022 |
6:00 P.M. to 7:00 P.M. |
Know More
|
Clustering and Model Validation using Python |
March 26th, 2022 |
6:00 P.M. to 7:00 P.M. |
Know More
|
Gradient boosting algorithm using Python |
March 19th, 2022 |
6:00 P.M. to 7:00 P.M. |
Know More
|
Penetration Testing |
March 26th, 2022 |
6:00 P.M. to 7:00 P.M. |
Know More
|
Vulnerability Management |
March 19th, 2022 |
6:00 P.M. to 7:00 P.M. |
Know More
|
Hacking, Bug Bounties & how to land your first job into the CyberSecurity domain like a pro! |
March 12th, 2022 |
6:00 P.M. to 7:00 P.M. |
Know More
|
AI's Impact on Business and Personal Spheres |
March 12th, 2022 |
6:00 P.M. to 7:00 P.M. |
Know More
|
Breaking the Glass Ceiling |
March 8th, 2022 |
11:00 A.M. to 12:00 P.M. |
Know More
|
Unsupervised Machine Learning algorithm - Spectral clustering |
March 5th, 2022 |
6:00 P.M. to 7:00 P.M. |
Know More
|
Threat Modelling using MS Threat Modelling Tool |
March 5th, 2022 |
6:00 P.M. to 7:00 P.M. |
Know More
|
Supervised Machine Learning Algorithm - Random Forest |
February 26th, 2022 |
6:00 PM to 7:00 PM |
Know More
|
Driving Skills Development For Engineers |
February 23rd, 2022 |
3:00 PM to 4:00 PM |
Know More
|
Supervised Machine Learning Algorithm - K Nearest Neighbour |
February 19th, 2022 |
6:00 PM to 7:00 PM |
Know More
|
Robot & a Bent Rod |
February 16th, 2022 |
3:00 PM to 4:00 PM |
Know More
|
Supervised Machine Learning Algorithm - Support Vector Machine |
February 12th, 2022 |
6:00 PM to 7:00 PM |
Know More
|
Industrial Automation & Robotics Landscape |
February 12th, 2022 |
3:00 PM to 4:00 PM |
Know More
|
Drone Intelligent System |
February 9th, 2022 |
3:00 PM to 4:00 PM |
Know More
|
Deep Learning |
February 5nd, 2022 |
6:00 PM to 7:00 PM |
Know More
|
Cloud Virtualization |
February 12th, 2022 |
6:00 PM to 7:00 PM |
Know More
|
Application Security |
February 19th, 2022 |
6:00 PM to 7:00 PM |
Know More
|
3rd Party Risk Management |
February 26th, 2022 |
6:00 PM to 7:00 PM |
Know More
|
Relevant in Today's World |
February 5th, 2022 |
2:00 PM to 3:00 PM |
Know More
|
Industry Expectation from Early Talents |
January 12th, 2022 |
2:00 PM to 3:00 PM |
Know More
|
Advanced Machine Learning |
January 8th, 2022 |
7:00 PM to 7:00 PM |
Know More
|
Building AI Models using Deep Learning Applications |
January 15th, 2022 |
6:00 PM to 7:00 PM |
Know More
|
Introduction to Computer Vision and Image processing |
January 22nd, 2022 |
6:00 PM to 7:00 PM |
Know More
|
Diving into the Secrets of Pentesting, CyberSecurity and Bug Bounties!!! |
January 8th, 2022 |
6:00 PM to 7:00 PM |
Know More
|
Introduction to Applications Security | Tools, Tricks and Techniques |
January 15th, 2022 |
6:00 PM to 7:00 PM |
Know More
|
Diving into Application Security: Bugs, Approach and Recon Part 1 |
January 22nd, 2022 |
6:00 PM to 7:00 PM |
Know More
|
Diving into Application Security: Bugs, Approach and Recon Part 2 |
January 29th, 2022 |
6:00 PM to 7:00 PM |
Know More
|