Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Network Traffic Analysis
YouTube
education
Showing:
98
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Wireshark Masterclass
3
rewiews
Learn essential Wireshark skills: setup, traffic capture, filtering, analysis, and advanced features like file extraction and IP geolocation. Master network packet analysis for improved troubleshooting and security.
Add to list
10
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Linode
HackerSploit Blue Team Series - Network Traffic Analysis with Wireshark
3
rewiews
Comprehensive introduction to network traffic analysis using Wireshark for blue team operations. Covers Wireshark interface, filters, packet analysis, and practical exercises for security analysts and SOC teams.
Add to list
25
Lesons
1 hour 34 minutes
On-Demand
Free-Video
Dynatrace
Leveraging Davis AI for System Analysis and Optimization
0
rewiews
Leverage Davis AI for proactive system analysis and optimization. Learn how to use context-sensitive AI to identify and resolve potential issues before they impact your critical services.
Add to list
10
Lesons
53 minutes
On-Demand
Free-Video
Hussein Nasser
WebSockets
0
rewiews
Comprehensive exploration of WebSocket technology, covering implementation, scaling, security, and integration with modern protocols. Includes practical examples and real-world applications.
Add to list
10
Lesons
10 hours
On-Demand
Free-Video
Wireshark
0
rewiews
Learn to use Wireshark for network traffic analysis, covering installation, environment, capture options, filters, OSI model, and tcpdump for comprehensive packet inspection.
Add to list
8
Lesons
1 hour 30 minutes
On-Demand
Free-Video
How to Use Wireshark
0
rewiews
Practical network analysis techniques using Wireshark, covering filters, troubleshooting, and advanced features for efficient packet capture and analysis.
Add to list
11
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Wireshark and Ethical Hacking Course
0
rewiews
Master Wireshark for ethical hacking: network analysis, packet capture, and security vulnerabilities. Hands-on tutorials cover installation, filters, VoIP, and command-line tools for enhanced cybersecurity skills.
Add to list
16
Lesons
3 hours 30 minutes
On-Demand
Free-Video
Wireshark and Fortigate
0
rewiews
Learn to analyze network traffic, detect security threats, and configure Fortigate firewalls using Wireshark for effective network protection and monitoring.
Add to list
7
Lesons
30 minutes
On-Demand
Free-Video
Basics of Wireshark Tool
0
rewiews
Learn network packet analysis with Wireshark, covering installation, traffic capture, and powerful filters across Windows, Linux, and Mac. Ideal for beginners and intermediate users.
Add to list
10
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Clough42
Troubleshooting the Centroid Acorn and Ether1616 Network - Why Won't It Connect? - Beelink + Realtek
0
rewiews
Troubleshooting guide for Centroid Acorn and Ether1616 network connectivity issues. Explores hardware, software, and network aspects to resolve a subtle bug in Realtek GbE hardware on Beelink computers.
Add to list
12
Lesons
30 minutes
On-Demand
Free-Video
IEEE
A Lustrum of Malware Network Communication: Evolution and Insights
0
rewiews
Explore the evolution of malware network communication over five years, examining trends, insights, and implications for cybersecurity through analysis of 26.8 million samples.
Add to list
15
Lesons
19 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Network Attack Traffic and Data Mining - Lab 6
0
rewiews
Explore network attack traffic and data mining techniques, including statistics, Nmap, Hydra, and crosscorrelation analysis for enhanced cybersecurity understanding.
Add to list
8
Lesons
39 minutes
On-Demand
Free-Video
Kippo Honeypot: Capturing and Analyzing Hacker Behavior - BSides Tampa 2015
0
rewiews
Explore honeypot technology, its evolution, and real-world applications in cybersecurity through a demo showcasing network traffic analysis and hacker interactions.
Add to list
32
Lesons
44 minutes
On-Demand
Free-Video
A Fire in the Eye: Advanced Network Traffic Analysis Techniques
0
rewiews
Explore innovative network traffic detection techniques, focusing on the "Fire in the Eye" project. Learn about challenges, methodologies, and limitations in network security analysis.
Add to list
12
Lesons
35 minutes
On-Demand
Free-Video
Security Onion
Diagnosing and Dealing with One-Sided Network Traffic
0
rewiews
Diagnose and address one-sided traffic issues in network security. Learn to identify incomplete data collection and its impact on threat detection and hunting efforts.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
Netflow for Incident Response
0
rewiews
Learn to leverage Netflow data for effective incident response, enhancing network security and threat detection capabilities.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
An Introduction to Traffic Analysis - A Pragmatic Approach
0
rewiews
Practical introduction to network traffic analysis, covering packet capture techniques, processing mechanisms, performance optimization, and analysis tools for both FreeBSD and Linux systems.
Add to list
30
Lesons
1 hour 12 minutes
On-Demand
Free-Video
OWASP Foundation
Temporal: Looking at 4 Years of Web Honeypot Attacks - Tactics, Techniques, and Trends
0
rewiews
Analyze 9 million web honeypot attacks over 4 years, revealing attacker tactics, targeted CVEs, and global trends. Learn to identify common vs. unique threats and investigate web attack logs at scale.
Add to list
10
Lesons
26 minutes
On-Demand
Free-Video
OWASP Foundation
Cloud-based Detection Techniques for Botnets and Malware - AppSecEU 2014
0
rewiews
Explores cloud-based techniques for detecting botnets and malware, highlighting limitations of traditional methods and discussing traffic analysis for pre-infection detection in cloud environments and virtual infrastructures.
Add to list
12
Lesons
51 minutes
On-Demand
Free-Video
Security Onion
Installing Security Onion Hybrid Hunter Beta 1 in a Virtual Machine
0
rewiews
Step-by-step guide to installing Security Onion Hybrid Hunter Beta 1 in a virtual machine, demonstrating the setup process for this network security monitoring platform.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Security Onion
Building a Security Onion Virtual Machine for so-import-pcap
0
rewiews
Learn to build a Security Onion virtual machine and use so-import-pcap to analyze network traffic. Gain hands-on experience with this powerful open-source security tool for network monitoring and threat detection.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
Security Onion
Pcaps Ahoy! Commodity Malware Infections on Windows Hosts - Security Onion Conference 2018
0
rewiews
Explore commodity malware infections on Windows hosts through packet capture analysis, enhancing your network security skills and threat detection capabilities.
Add to list
1
Lesons
33 minutes
On-Demand
Free-Video
Security Onion
Quick Data Exfiltration Exercise with Security Onion
0
rewiews
Hands-on exercise using Security Onion to analyze data exfiltration in a PCAP file. Learn to detect and investigate network security threats with practical tools and techniques.
Add to list
1
Lesons
17 minutes
On-Demand
Free-Video
Security Onion
Malware Traffic and CyberChef Magic - 2021-08-19
0
rewiews
Explore malware traffic analysis using CyberChef in Security Onion. Learn to investigate pcap files, analyze TCP streams, and interpret hunt analysis results for effective threat detection.
Add to list
7
Lesons
15 minutes
On-Demand
Free-Video
Security Onion
Quick Malware Analysis with Security Onion - Malware-Traffic-Analysis.net PCAP from 2021-08-05
0
rewiews
Analyze malware traffic using Security Onion, focusing on a pcap file from malware-traffic-analysis.net. Learn practical techniques for identifying and investigating malicious network activity.
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
Docker
Building a DDoS Testbed with Docker
0
rewiews
Learn to build a DDoS testbed using Docker, exploring attack types, research challenges, and practical implementation strategies for cybersecurity professionals and researchers.
Add to list
11
Lesons
25 minutes
On-Demand
Free-Video
Black Hat
Privacy Detective - Sniffing Out Your Data Leaks for Android
0
rewiews
Discover techniques to detect privacy-infringing behaviors in Android apps. Learn about hooking system functions, decrypting TLS traffic, and automating privacy data transmission analysis.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Scarlet OT - Adversary Emulation for Operational Technology
0
rewiews
Herramienta de emulación de adversarios OT de código abierto que combina ataques IT y OT, reproduce acciones de malware ICS y soporta múltiples protocolos para pruebas de seguridad industrial eficientes.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
USENIX
Measuring Privacy Risks in Mobile Apps at Scale
0
rewiews
Explore Internet Safety Labs' research on privacy risks in K-12 EdTech apps, including methodology, key findings, and challenges in large-scale privacy measurement.
Add to list
4
Lesons
17 minutes
On-Demand
Free-Video
Dr Josh Stroschein
Analyzing Malicious Network Traffic with Suricata - Malware Mondays Episode 06
0
rewiews
Learn to analyze malicious network traffic using Suricata in REMnux. Explore alert generation, protocol dissection, file identification, and contextual flow information for effective threat detection.
Add to list
1
Lesons
1 hour 6 minutes
On-Demand
Free-Video
OWASP Foundation
Collective Detection of Harmful Requests
0
rewiews
Explore collective detection techniques for identifying harmful web requests, enhancing application security through shared threat intelligence and collaborative defense strategies.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
OWASP Foundation
Scripting Android Applications for Social Botnet Creation - Network Exploitation Techniques
0
rewiews
Explore techniques for scripting Android applications, including APK manipulation, API exploitation, and creating realistic social botnets using JRuby sessions and network data.
Add to list
29
Lesons
42 minutes
On-Demand
Free-Video
OWASP Foundation
HTTP Time Bandit: Identifying and Exploiting Web Application Performance Bottlenecks
0
rewiews
Explore a tool for identifying web application performance bottlenecks and vulnerabilities, enabling efficient DOS/DDOS attacks. Learn about data normalization, testing methods, and attack strategies.
Add to list
9
Lesons
35 minutes
On-Demand
Free-Video
HackerSploit
Installing & Configuring Wireshark for Traffic Analysis
0
rewiews
Learn to install and configure Wireshark, a powerful open-source tool for network traffic analysis. Gain hands-on experience in capturing and troubleshooting network traffic for enhanced cybersecurity skills.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
Linux Foundation
Network Flow Monitoring in Kubernetes with Contiv/VPP CNI and Elastic Stack
0
rewiews
Explore powerful network flow monitoring in Kubernetes using Contiv/VPP CNI and Elastic Stack for real-time visibility, debugging, bottleneck identification, and security incident investigation.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Linux Foundation
Understanding What Happens Inside Kubernetes Clusters Using BPF Tools
0
rewiews
Explore Kubernetes cluster internals using BPF tools to gain deep insights into system behavior, performance, and security.
Add to list
1
Lesons
1 hour 48 minutes
On-Demand
Free-Video
USENIX
OctoSketch - Enabling Real-Time, Continuous Network Monitoring over Multiple Cores
0
rewiews
Innovative framework for scaling sketching algorithms across multiple cores, enhancing network monitoring accuracy and performance with continuous, change-based aggregation mechanism.
Add to list
1
Lesons
14 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
What Is Going on Within My Network? A Subtle Introduction to Cilium Hubble
0
rewiews
Explore Cilium Hubble for enhanced cloud-native network observability. Learn its eBPF-powered features, real-time monitoring capabilities, and how to implement it for improved visibility and security in your systems.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
NorthSec
Hacking K-12 School Software in a Time of Remote Learning
0
rewiews
Análisis de vulnerabilidades en software educativo durante la pandemia, explorando ataques potenciales y sus implicaciones para la seguridad de dispositivos escolares y domésticos.
Add to list
10
Lesons
30 minutes
On-Demand
Free-Video
DefCamp
Deanonymization of TOR HTTP Hidden Services
0
rewiews
Explore techniques for deanonymizing TOR hidden services, presented by an Application Security Engineer. Gain insights into vulnerabilities and potential risks in anonymous web services.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
nullcon
Careful Who You Trust - Compromising P2P Cameras At Scale
0
rewiews
Explore vulnerabilities in P2P protocols used by smart cameras, including Kalay Platform analysis, device-specific exploits, and remote code execution demonstrations. Learn about IoT security risks and mitigation strategies.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
nullcon
Flowinspect - A Network Inspection Tool
0
rewiews
Introducing flowinspect: a powerful network monitoring tool that extracts and filters layer 4 flows, providing detailed match statistics and analysis for enhanced network inspection and security.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Detectando RAT Malware en Teléfonos Celulares usando el IDS Slips
0
rewiews
Detección de malware RAT en teléfonos Android utilizando el IDS Slips, una herramienta innovadora del laboratorio Stratosphere para proteger a personas en riesgo de ataques silenciosos y difíciles de detectar.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
media.ccc.de
IT-Sicherheit in vernetzten Gebäuden
0
rewiews
Einführung in Sicherheitsprobleme und Lösungsansätze für vernetzte Gebäude am Beispiel des KNX-Standards. Beleuchtet Risiken, Datenschutzaspekte und Möglichkeiten zur nachträglichen Verbesserung der IT-Sicherheit in Gebäudeautomatisierungssystemen.
Add to list
22
Lesons
46 minutes
On-Demand
Free-Video
RSA Conference
IoT Bug Hunting - From Shells to Responsible Disclosure
0
rewiews
Explore techniques to circumvent security controls in IoT devices, from uncovering vulnerabilities to responsible disclosure. Gain insights into remote attacks and manufacturer security shortcomings.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
BruCON Security Conference
pMap - The Silent Killer
0
rewiews
Discover network vulnerabilities with pMap, a tool that silently extracts information from auto-configuration protocols to identify hosts, perform port scans, and fingerprint systems without sending packets.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
NorthSec
Trick or Treat - Unveil the "Stratum" of the Mining Pools
0
rewiews
Unveil mining pool strategies, identify Stratum servers, and explore cryptomining malware detection techniques through static and dynamic analysis, web scraping, and network scanning.
Add to list
23
Lesons
40 minutes
On-Demand
Free-Video
Cooper
Information Flows and Leaks in Social Media
0
rewiews
Explore social media's impact on information flow, opinion formation, and real-world events. Analyze case studies of online campaigns and their consequences across different regions and contexts.
Add to list
19
Lesons
46 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Radio Experimentation - Dispositivos Inteligentes, ¿Decisiones Inteligentes? - Luis Lubeck - Ekoparty Security Conference - 2020
0
rewiews
Explora los riesgos de seguridad en dispositivos inteligentes, analizando su código fuente, tráfico de red y configuraciones inseguras para tomar decisiones informadas sobre su uso.
Add to list
6
Lesons
40 minutes
On-Demand
Free-Video
Security BSides London
Open Source Malware Lab
0
rewiews
Explore open-source tools for malware analysis, including Cuckoo Sandbox, Thug, Bro Network Security Monitor, and Volatility Framework. Learn to build an automated lab for comprehensive threat assessment.
Add to list
14
Lesons
50 minutes
On-Demand
Free-Video
Security BSides London
Breaking Binary Protocols and Bad Crypto
0
rewiews
Explore reverse-engineering techniques for binary protocols and cryptography, focusing on methodologies to uncover vulnerabilities in network devices through real-world examples.
Add to list
25
Lesons
44 minutes
On-Demand
Free-Video
nullcon
Contextomy - Let's Debug Together
0
rewiews
Explore a critical iOS design flaw allowing remote code execution through debug session hijacking. Learn about the vulnerability's discovery, research, exploitation, and Apple's fix.
Add to list
24
Lesons
44 minutes
On-Demand
Free-Video
0xdade
Deep Learning for Realtime Malware Detection
0
rewiews
Explore an ensemble deep learning model for real-time malware detection, combining CNN, LSTM, and NLP techniques to analyze domain names and identify potential threats with high accuracy.
Add to list
40
Lesons
46 minutes
On-Demand
Free-Video
USENIX
Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms
0
rewiews
Exploring security vulnerabilities in smart home platforms through reverse engineering and phantom device testing, revealing unexpected state transitions and potential attacks.
Add to list
16
Lesons
22 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Cognitive Automation With Machine Learning In Cybersecurity
0
rewiews
Explore cognitive automation and machine learning in cybersecurity, covering risk analytics, threat detection, and incident management. Learn how ML enhances fraud detection and security operations.
Add to list
9
Lesons
22 minutes
On-Demand
Free-Video
Black Hat
From False Positives to Actionable Analysis
0
rewiews
Modeling human behavior in network traffic to automatically label security events, using distributed forensic AI for threat detection and response optimization.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
No Easy Breach Challenges and Lessons from an Epic Investigation
0
rewiews
Explore advanced attack techniques, stealthy network traffic, and lessons from a major cybersecurity investigation. Gain insights into evolving tactics and improving threat detection.
Add to list
24
Lesons
53 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Android RATs Detection With a Machine Learning-Based Python IDS
0
rewiews
Explore Android RATs detection using machine learning and Python IDS. Learn about dataset creation, Slips IDS implementation, and live demo of RAT activity detection in mobile device network traffic.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Secure and Scalable Anomaly-Based Network Intrusion Detection
0
rewiews
Presentation on a secure, scalable framework for anomaly-based network intrusion detection, implemented in Go. Explores feature extraction, data collection, and machine learning applications for detecting network threats.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Squashing Low-hanging Fruit in Embedded Software
0
rewiews
Discover advanced techniques for identifying and mitigating critical vulnerabilities in embedded systems, focusing on NicheStack TCP/IP stack vulnerabilities and automated vulnerability detection methods.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
Security BSides London
Offensive Pcap
0
rewiews
Explore libpcap for offensive security: bypass firewalls, intercept traffic, manipulate network connections, and evade detection. Hands-on techniques with source code provided.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
USENIX
Re-architecting Traffic Analysis with Neural Network Interface Cards
0
rewiews
Innovative approach to enhance network traffic analysis using binary neural networks on SmartNICs, offering improved scalability, lower latency, and higher throughput compared to traditional software-based systems.
Add to list
1
Lesons
14 minutes
On-Demand
Free-Video
The Use of Covert Communications in Modern Cyber Attacks
0
rewiews
Explore covert communication techniques in cyber attacks, including behavior patterns, encryption, and common methods. Learn to identify and mitigate risks in modern digital threats.
Add to list
23
Lesons
40 minutes
On-Demand
Free-Video
Black Hat
What Goes Around Comes Back Around - Exploiting Fundamental Weaknesses in Botnet C&C Panels
0
rewiews
Explore techniques for exploiting vulnerabilities in botnet command and control panels, including detection methods, reverse attacks, and automated tools for gathering intelligence.
Add to list
21
Lesons
27 minutes
On-Demand
Free-Video
Black Hat
Putting Intrusion Detection into Intrusion Detection Systems
0
rewiews
Explore advanced intrusion detection techniques, focusing on proactive strategies and internal network monitoring to enhance cybersecurity beyond traditional perimeter defenses.
Add to list
1
Lesons
2 hours 2 minutes
On-Demand
Free-Video
Black Hat
Active & Passive Fingerprinting Microsoft Operating Systems Using ICMP Protocol
0
rewiews
Explore active and passive fingerprinting techniques for Microsoft operating systems using ICMP protocol, enhancing network security knowledge and system identification skills.
Add to list
1
Lesons
1 hour 18 minutes
On-Demand
Free-Video
Black Hat
Honeypots
0
rewiews
Explore honeypot technology for network security, including deployment strategies, data analysis, and legal considerations in this comprehensive presentation by Lance Spitzner.
Add to list
1
Lesons
1 hour 10 minutes
On-Demand
Free-Video
P2P Forensics
0
rewiews
Explore peer-to-peer network forensics techniques, uncovering digital evidence and investigating file-sharing activities for cybersecurity and legal purposes.
Add to list
1
Lesons
1 hour 6 minutes
On-Demand
Free-Video
Intro to Network Traffic Analysis - Part 1
0
rewiews
Learn network traffic analysis fundamentals, including packet capture, protocol analysis, and traffic monitoring techniques to enhance your cybersecurity skills and detect network threats.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Intro to Network Traffic Analysis - Part 2
0
rewiews
Learn network traffic analysis techniques, including packet inspection and protocol analysis, to enhance your cybersecurity skills and detect potential threats.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
Network Situational Awareness with Flow Data
0
rewiews
Explore network security monitoring using flow data. Learn to generate, collect, and analyze flow records with tools like SILK and FlowBAT for enhanced situational awareness and threat detection.
Add to list
24
Lesons
55 minutes
On-Demand
Free-Video
Network Forensics Using Kali Linux and SANS Sift
0
rewiews
Explore network forensics techniques using Kali Linux and SANS SIFT, learning essential skills for digital investigations and cybersecurity analysis.
Add to list
1
Lesons
2 hours 21 minutes
On-Demand
Free-Video
Going Deep and Empowering Users - PCAP Utilities and Combating Phishing in a New Way
0
rewiews
Explore advanced PCAP utilities and innovative strategies for empowering users to combat phishing attacks effectively.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
Network Forensics Using Kali Linux and SANS Sift
0
rewiews
Learn network forensics techniques using Kali Linux and SANS SIFT, covering tools and methods for investigating digital evidence and analyzing network traffic.
Add to list
1
Lesons
1 hour 44 minutes
On-Demand
Free-Video
The Unmanaged Device Tsunami - Surf or Suffer
0
rewiews
Explore the security challenges of IoT devices in various sectors, including smart offices and healthcare, and learn about recent vulnerabilities and their impact on critical systems.
Add to list
20
Lesons
51 minutes
On-Demand
Free-Video
Linux Plumbers Conference
Traffic Footprint Characterization of Workloads Using BPF
0
rewiews
Explore eBPF-based network traffic analysis for containerized workloads, enabling improved scheduling and resource allocation in clusters to enhance performance of diverse applications.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
Gopher Academy
Go at the DARPA Cyber Grand Challenge
0
rewiews
Explore how Go's features enabled efficient data capture and analysis during DARPA's Cyber Grand Challenge, with insights on optimization, profiling, and resilience in network traffic handling.
Add to list
30
Lesons
36 minutes
On-Demand
Free-Video
USENIX Enigma Conference
The Golden Age of Bulk Surveillance
0
rewiews
Explore bulk surveillance concepts, their effectiveness, implementation, and key industry players. Learn about potential threats and the importance of secure communication in the digital age.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
Black Hat
I Know What You Saw Last Minute - The Chrome Browser Case
0
rewiews
Explore HTTP Adaptive Streaming vulnerabilities in Chrome, focusing on YouTube's DASH implementation and potential privacy risks through traffic analysis and machine learning techniques.
Add to list
20
Lesons
28 minutes
On-Demand
Free-Video
Tech Field Day
Container Network Observability with Kubernetes and eBPF Technology
0
rewiews
Discover how to effectively manage and visualize Kubernetes network traffic using Kentik's observability solutions and eBPF technology for enhanced cluster monitoring and traffic analysis.
Add to list
5
Lesons
12 minutes
On-Demand
Free-Video
DPDK Project
Monitoring 400G Traffic in DPDK Using FPGA-Based SmartNIC with RTE Flow
0
rewiews
Discover how to monitor 400G network traffic using FPGA-based SmartNIC and DPDK, featuring hardware acceleration techniques and RTE flow configuration for optimal packet processing performance.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
DPDK Project
Debug Functional and Performance Issues in Rte_flow
0
rewiews
Discover effective debugging techniques for rte_flow hardware offloads using MARK, META, COUNT actions and group miss actions to enhance visibility and troubleshoot complex pipeline performance issues.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
Tech Field Day
Orchestrating SD-WAN Policies and Monitoring Traffic with Fortinet Secure SD-WAN
0
rewiews
Master SD-WAN policy orchestration and monitoring with Fortinet's secure solution, featuring Zero Trust implementation, centralized management, and seamless integration with Security Fabric for enhanced protection.
Add to list
1
Lesons
12 minutes
On-Demand
Free-Video
Tech Field Day
Modern Network Traffic Observability and Packet Broker Architecture
0
rewiews
Discover modern network packet broker architecture and integrated observability techniques for automated incident analysis in enterprise networks.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
DEFCONConference
Hacking Millions of Modems and Investigating Modem Security Vulnerabilities
0
rewiews
Dive into a real-world investigation of modem vulnerabilities, ISP security flaws, and the concerning centralization of broadband infrastructure through a personal hacking incident analysis.
Add to list
6
Lesons
25 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Detecting Botnets via DNS Traffic Analysis Using Machine Learning
0
rewiews
Discover advanced techniques for detecting botnet-infected devices through DNS traffic analysis, combining natural language processing and machine learning for enhanced network security monitoring.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
DEFCONConference
Leveraging macOS Networking Frameworks to Heuristically Detect Malware
0
rewiews
Discover advanced techniques for detecting macOS malware through network monitoring, exploring low-level APIs, private frameworks, and user-mode extensions for comprehensive threat detection.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
DEFCONConference
Leveraging Private APNs for Mobile Network Traffic Analysis and Security
0
rewiews
Discover how to monitor and control mobile device network traffic using private APNs, enabling affordable security testing and traffic analysis for IoT and mobile devices on 4G/5G networks.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
DEFCONConference
Signature-Based Detection Using Network Timing - Malware Traffic Analysis
0
rewiews
Explore advanced malware detection techniques using network timing patterns and Python, learning to identify malicious behavior through transaction intervals rather than traditional code signatures.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
DEFCONConference
A New Side Channel Attack on AI Assistants - Exploiting Vulnerabilities in Encrypted Messages
0
rewiews
Uncover a critical side-channel vulnerability affecting AI assistants like ChatGPT, exploring how encrypted conversations can be intercepted and the broader implications for privacy and security.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
Centre for Networked Intelligence, IISc
Understanding Performance of Internet Video Using Network Measurement Data
0
rewiews
Explore techniques for measuring video streaming QoE metrics using network data, focusing on encrypted HTTP Adaptive Streaming and video conferencing applications through machine learning approaches.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
NANOG
Reelin' in Unwanted Traffic: Analyzing and Addressing IoT Attack Traffic
0
rewiews
Explore insights from a global IoT honeyfarm project analyzing malicious traffic patterns, attack behaviors, and potential solutions for reducing unwanted Internet traffic while maintaining open networks.
Add to list
1
Lesons
12 minutes
On-Demand
Free-Video
NANOG
Measuring and Analyzing Zoom Network Performance - A Passive Monitoring Approach
0
rewiews
Discover techniques for analyzing Zoom's network protocol through packet-level examination, enabling performance measurement and monitoring in production environments without end-host cooperation.
Add to list
6
Lesons
29 minutes
On-Demand
Free-Video
NANOG
The New Encrypted Protocol Stack: Understanding QUIC, HTTP/3, and Modern Network Traffic - Session 4760
0
rewiews
Delve into the evolution of encrypted network protocols, focusing on QUIC's rapid adoption, its impact on traffic visibility, and strategies for managing modern network communications.
Add to list
22
Lesons
48 minutes
On-Demand
Free-Video
SNIAVideo
Exploring Optimizations of Content Delivery Networks
0
rewiews
Explore optimization techniques for Content Delivery Networks through simulation studies, examining over 100,000 configuration variants to enhance performance and reduce operational costs.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
VoiceAttack: Fingerprinting Voice Commands on VPN-Protected Smart Home Speakers
0
rewiews
Uncover how voice commands on VPN-protected smart speakers can be fingerprinted and potentially compromised, exploring security vulnerabilities in smart home systems.
Add to list
1
Lesons
17 minutes
On-Demand
Free-Video
USENIX
CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled Abuse
0
rewiews
Explore how CalcuLatency uses network latency measurements to detect proxy-enabled abuse, combining application and network layer analysis for effective proxy identification.
Add to list
1
Lesons
11 minutes
On-Demand
Free-Video
USENIX
Using Throttling and Traffic Shaping to Combat Botnet Spam
0
rewiews
Discover effective strategies for combating botnet spam through traffic shaping and throttling techniques, while understanding spammer behavior patterns and implementing practical connection management solutions.
Add to list
1
Lesons
1 hour 14 minutes
On-Demand
Free-Video
load more...