Page 7 - Triumphus - April 2024 - 4
P. 7

St. Joseph’s Institute of Technology




                                                    PLACEMENT









      Mr.Jerrish      Michael,     Ai     Data     Operator,
      Metaphysics.ai, London gave a lecture on Real time
      End  to  End  ML  Applications  for  our  Artificial
      Intelligence and machine Learning PEP students on
      26-04-2024. He explained the process to leanr and
      excel  in  real-time  ML  principles,  design,  and
      implementation. Also, the need of gaining skills to
      effectively  integrate  and  manage  real-time  ML  in
      projects and businesses. At the end of this lectured
      AML PEP students can able to build and maintain
      end-to-end ML pipelines for real-time applications.

















                                                              A  one-day  hands-on  workshop  titled  "Getting
                                                              Started with Appsec & Bugbounty" was conducted
                                                              by St. Joseph's Group of Institutions on 26/4/2024
                                                              from 9:40 AM to 3:00 PM at the PEP Cybersecurity
                                                              Centre.  The  workshop  aimed  to  provide  practical
                                                              training  in  application  security  and  bug  bounty
                                                              hunting.  Abisheik  M,  an  Application  Security
                                                              Engineer  at  Synchrony  Financial,  shared  his
                                                              expertise  as  the  resource  person.  Participants
                                                              gained  insights  into  identifying  and  responsibly
                                                              reporting  security  vulnerabilities  in  applications,
                                                              earning  rewards  through  bug  bounty  programs.
                                                              The  interactive  session  equipped  students  with
                                                              skills   to   contribute     to   the    cybersecurity
                                                              community  while  exploring  ethical  hacking  career
                                                              paths.















     Trimpuhus                                              7
   2   3   4   5   6   7   8   9   10   11   12