Главная
Study mode:
on
1
About Andrew Hay
2
Why Me?
3
Pasteur's Quadrant: Applied vs. Basic Research
4
Do You Look Like a Researcher?
5
Research Pros and cons
6
Should I Research Something?
7
Types of Questions
8
Epicycle of Data Analysis
9
Bootstrapping Research
10
A Word on Asset/Device Acquisition
11
My Favorite Places...
12
Core Research Ideas
13
Example Questions By Research Level
14
The Research Team
15
Sample lor Device Research Workflow
16
Suggested Lab Equipment and Software
17
Introduction
18
What Does Success Look Like?
19
What Does Failure Look Like?
20
Research Pipeline Model
21
Presenting Your Research: Print
22
Presenting Your Research: Visualizations
23
Presenting Your Research: Code
24
Defending Your Research
25
A Word About Responsible Disclosure
26
Summary
27
Further Reading: Courses
Description:
Learn how to bootstrap a security research project in this comprehensive conference talk from BSides Detroit 2016. Explore the fundamentals of applied and basic research, understand the pros and cons of conducting research, and discover various types of research questions. Delve into the epicycle of data analysis, asset acquisition strategies, and core research ideas. Gain insights into building a research team, setting up a lab environment, and developing a research workflow. Master the art of presenting research through print, visualizations, and code, while understanding the importance of responsible disclosure. Acquire valuable knowledge on defining success criteria, handling failure, and utilizing the research pipeline model to enhance your security research projects.

Bootstrapping a Security Research Project

Add to list
0:00 / 0:00