#GKHack
21
Home
Industrial Discussion
Previous Years
2019
IgniteHack
GKHack17
GKHack16
GKHack15
GKHack14
Mentors and Judges
#GeeksCare
Resources
Feature Challenges
Water Challenge
Marternal Health
SkateHacks
NDP Challenge
Register
Some guidelines for
#SecureByDesign
Proactive Capability (ML/AI)
Proactive Cyber Defense
Detecting Malicious Requests with Keras & Tensorflow
Power of Deep Learning for Cyber Security
Machine Learning for Cyber Security
Document Tools and Resources
Apply Data Science to Cybersecurity Network Attacks
Machine Learning Driven Firewall
Network/Enterprise Security
WiFi Security
Top 10 Network Threats
Tensor Flow
Threat and Solutions
Secure Socket Programming
Mastering Python for Networking and Security
Production Best Practices: Security ExpressJS
How to make your NodeJS application or API secure
Civic Tech Tools (End Users)
A CYBER SECURITY STRATEGY FOR GLOBAL CIVIL SOCIETY
Cybersecurity: Public Sector Threats
OWASP Top Ten
Managing security vulnerabilities
Common Vulnerabilities and Exposures
OWASP Zed Attack Proxy
10 Best Practices to Build Secure Applications
Capture The Flag Challenge
An Introduction to Cybersecurity, Capture the Flag Contests, and Basic Security Concepts
What is CTF and how to get started!
How to Prepare for a Capture the Flag Hacking Competition
Capture The Flag 101
What is a Cybersecurity Capture the Flag?
CTF for Beginners