Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Multifactor Authentication
YouTube
education
Showing:
20
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
NPTEL
Introduction to Information Security
1
rewiews
The level 1 course is intended to address the basics of information Security Concepts and the general industry trends.From what is Information Security? to web application security.
Add to list
65
Lesons
23 hours
On-Demand
Free-Video
Stanford University
Solving Cybersecurity as an Economic Problem
0
rewiews
Explore innovative approaches to cybersecurity, focusing on economic perspectives and moving target defense strategies to combat prevalent cyberattacks and vulnerabilities.
Add to list
30
Lesons
1 hour 13 minutes
On-Demand
Free-Video
Security BSides London
Breaking Bad Multifactor - MFA Bypasses and How to Assess the Risks
0
rewiews
Explore MFA bypass techniques and risk assessment strategies to enhance cybersecurity defenses and protect against evolving threats in authentication systems.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
RSA Conference
Building Identity for an Open Perimeter
0
rewiews
Explore Netflix's cloud-first approach to identity and security, focusing on SSO, MFA, adaptive authentication, and user-centric solutions for a modern, open perimeter.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
DefCamp
How to Exploit Cloud Adoption for Making Your IT More Secure and Convenient for End Users - DefCamp #10
0
rewiews
Explore cloud adoption strategies to enhance IT security and user convenience, covering encryption, identity protection, and real-life implementation scenarios.
Add to list
22
Lesons
51 minutes
On-Demand
Free-Video
LASCON
On the Internet, Nobody Knows You're a Dog - Revisiting the Meme After 25 Years
0
rewiews
Explore the evolution of online identity verification, from historical trends to current challenges and future opportunities, including AI and ML applications in authentication and access management.
Add to list
31
Lesons
50 minutes
On-Demand
Free-Video
Microsoft
Zero Trust - The Proactive Approach to Cybersecurity
0
rewiews
Explore proactive cybersecurity with Zero Trust, learning to identify threats and address weaknesses before attacks occur. Discover how to manage evolving threats and adopt an "assume breach" mindset.
Add to list
6
Lesons
23 minutes
On-Demand
Free-Video
Black Hat
WebAuthn 101 - Demystifying WebAuthn
0
rewiews
Demystifying WebAuthn: Learn about its use cases, implementation, and future developments in web authentication, essential for any service implementing user login.
Add to list
8
Lesons
26 minutes
On-Demand
Free-Video
RSA Conference
Whom Do You Trust - MSPs and Other Forgotten Risks for SMBs
0
rewiews
Explore cybersecurity risks for SMBs, focusing on MSP vulnerabilities and supply chain attacks. Learn strategies to protect against threats and strengthen your security posture.
Add to list
25
Lesons
55 minutes
On-Demand
Free-Video
RSA Conference
Modern Identity Hacking - Have Hackers Really Adjusted to Constant Remote?
0
rewiews
Explore modern identity hacking techniques, including MFA bypasses and attacks on authentication protocols, in the context of remote work and cloud-based solutions.
Add to list
21
Lesons
1 hour
On-Demand
Free-Video
RSA Conference
No More Firewalls! How Zero-Trust Networks Are Reshaping Cybersecurity
0
rewiews
Explore zero-trust networks and their impact on cybersecurity through live demos. Learn about device health, identity, and automated access conditions for enhanced security in cloud and mobile environments.
Add to list
15
Lesons
45 minutes
On-Demand
Free-Video
Security BSides San Francisco
Navigating Passwordless Authentication with FIDO2 & WebAuthn
0
rewiews
Explore FIDO2 and WebAuthn standards for passwordless authentication, learn implementation strategies, and discover how to enhance security while improving user experience.
Add to list
13
Lesons
33 minutes
On-Demand
Free-Video
media.ccc.de
MFA, OTP, SMS, U2F, WTF - Multifaktor-Authentifizierung ist sehr gut
0
rewiews
Erläutert verschiedene Multifaktor-Authentifizierungsmethoden, ihre Vor- und Nachteile sowie Schutz gegen gängige Angriffe. Demonstriert Technologien und diskutiert neue Konzepte wie Passkeys.
Add to list
1
Lesons
1 hour 4 minutes
On-Demand
Free-Video
Devoxx
Magic Without Password - Passwordless and Federate Identity
0
rewiews
Explore passwordless authentication and federated identities to enhance security, simplify user experience, and streamline development processes in modern online systems.
Add to list
17
Lesons
25 minutes
On-Demand
Free-Video
Practical Attacks Against Multifactor
0
rewiews
Explore practical attacks against multifactor authentication, including keyloggers, remote desktop exploits, and Duo vulnerabilities, with demonstrations and mitigation strategies.
Add to list
12
Lesons
26 minutes
On-Demand
Free-Video
Fighting Advanced Persistent Threats with Advanced Persistent Security
0
rewiews
Explore advanced persistent threats and security strategies with expert insights on risk management, detection, and protection in the digital landscape.
Add to list
31
Lesons
1 hour 2 minutes
On-Demand
Free-Video
The Things You Should Be Doing Defensively Right Now
0
rewiews
Explore essential cybersecurity practices for local governments, focusing on NIST framework priorities and key defensive strategies to protect digital assets and infrastructure.
Add to list
15
Lesons
53 minutes
On-Demand
Free-Video
Phishing U2F Protected Accounts
0
rewiews
Explore advanced phishing techniques targeting U2F-protected accounts and learn proactive defense strategies against sophisticated cyber threats.
Add to list
10
Lesons
22 minutes
On-Demand
Free-Video
Web Summit
The Global Ecosystem - Scaling Beyond the Valley
0
rewiews
Insights on scaling a startup outside Silicon Valley, focusing on Duo Security's journey from a two-person company to a $2.35 billion acquisition by Cisco.
Add to list
13
Lesons
23 minutes
On-Demand
Free-Video
GOTO Conferences
Whispered Secrets
0
rewiews
Explore software engineering's complex world, from secrecy and laws to encryption and architecture. Gain insights on trust, security, and modern development practices.
Add to list
31
Lesons
54 minutes
On-Demand
Free-Video
load more...