Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Security Assessment
YouTube
education
Showing:
120
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Cloud Security Alliance
Threat Modeling Cloud Services Using Crosswalk Between STRIDE Framework and CSA's CCM
0
rewiews
Learn to model cloud service threats using a crosswalk between the STRIDE framework and CSA's Cloud Controls Matrix, enhancing your cloud security assessment skills.
Add to list
1
Lesons
58 minutes
On-Demand
Free-Video
Cyber Mentor
Zero to Hero - MS17-010-EternalBlue, GPP-cPasswords, and Kerberoasting
0
rewiews
Comprehensive tutorial on exploiting MS17-010, GPP/cPasswords, and Kerberoasting, followed by an extensive Q&A session covering various cybersecurity topics and career advice for aspiring pentesters.
Add to list
43
Lesons
1 hour 33 minutes
On-Demand
Free-Video
CISSP Certification Exam Lectures
0
rewiews
Comprehensive preparation for the CISSP certification exam, covering all 8 domains of information security management and providing strategies for exam success.
Add to list
14
Lesons
17 hours
On-Demand
Free-Video
IEEE
A Formal Security Analysis of the W3C Web Payment APIs - Attacks and Verification
0
rewiews
Explore formal security analysis of W3C Web Payment APIs, including potential attacks and verification methods. Learn about browser models and gain insights into API security.
Add to list
8
Lesons
18 minutes
On-Demand
Free-Video
HackerSploit
Cybersecurity Career Paths: CEH vs CISSP, Degrees, and CTFs vs Penetration Tests
0
rewiews
Informative discussion on CEH vs CISSP certifications, cybersecurity degrees, and differences between CTFs and penetration tests, offering insights for aspiring infosec professionals.
Add to list
10
Lesons
39 minutes
On-Demand
Free-Video
Cyber Mentor
How to Build a Pentest Dropbox
0
rewiews
Learn to create a powerful pentest dropbox for remote network access and security testing, enhancing your ethical hacking toolkit and capabilities.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
LASCON
API Security Through External Attack Surface Management
0
rewiews
Integrating APIs into External Attack Surface Management to improve security posture of external-facing APIs. Discusses challenges in asset visibility and strategies for effective protection.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
LASCON
Leveraging Social Engineering in Physical Security Assessment - 2017
0
rewiews
Explore techniques for leveraging social engineering in physical security assessments, enhancing your ability to identify vulnerabilities and strengthen organizational defenses.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
Nmap Class - TCP IP and Basics of Nmap Part 2
0
rewiews
Explore TCP/IP fundamentals and Nmap basics in this cybersecurity session. Learn network scanning techniques from industry experts to enhance your security skills and knowledge.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
Linux Foundation
Analyzing and Improving the Security Properties of Secret Memory
0
rewiews
Explore techniques for enhancing secret memory security in Linux systems, covering trusted kernels, container security, and cloud security considerations.
Add to list
15
Lesons
28 minutes
On-Demand
Free-Video
Application Penetration Testing
0
rewiews
Learn application penetration testing techniques and methodologies to identify vulnerabilities and secure web applications effectively.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
Dangerous Electronic Redteam Practices
0
rewiews
Explore dangerous electronic redteam practices with Luis Santana, covering advanced techniques for ethical hacking and cybersecurity assessments.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
Leveraging Mobile Devices on Pentests - OISF 2013
0
rewiews
Learn to leverage mobile devices in penetration testing with expert Georgia Weidman. Discover techniques and strategies for enhancing security assessments using smartphones and tablets.
Add to list
1
Lesons
1 hour 1 minute
On-Demand
Free-Video
Opening the Treasure Chest: Attacking Network Attached Storage on a Pen Test
0
rewiews
Explore techniques for attacking Network Attached Storage during penetration testing, uncovering vulnerabilities and securing critical data storage systems.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Footprinting Techniques for Offensive Security
0
rewiews
Comprehensive exploration of footprinting techniques, covering DNS, zone transfers, whois, and traceroute for enhanced cybersecurity understanding and practical application.
Add to list
23
Lesons
2 hours 27 minutes
On-Demand
Free-Video
I'm a Hacker and I'm a QSA - Notacon 9 Presentation
0
rewiews
Explore the intersection of hacking and QSA roles, examining ethical considerations and professional responsibilities in information security.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
Vulnerability Spidey Sense - Developing Intuition for Security Flaws
0
rewiews
Develop your "vulnerability spidey sense" to identify and exploit security weaknesses in applications, guided by expert insights and practical techniques.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
4140 Ways Your Alarm System Can Fail
0
rewiews
Explore vulnerabilities in alarm systems and learn how they can be compromised, with insights from security experts on improving protection against potential failures.
Add to list
1
Lesons
56 minutes
On-Demand
Free-Video
Maturing the Pen Testing Professional - Challenges and Solutions
0
rewiews
Explore the evolution of penetration testing, its challenges, and future directions. Learn about industry standards, methodologies, and qualifications to enhance your professional skills in cybersecurity.
Add to list
22
Lesons
1 hour 7 minutes
On-Demand
Free-Video
BruCON Security Conference
Red Team Tales: 7 Years of Physical Penetration Testing
0
rewiews
Explore real-world physical penetration testing experiences across diverse facilities, from banks to cheese factories. Gain insights into security vulnerabilities and unconventional tactics used in red team operations.
Add to list
1
Lesons
1 hour 7 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP SAMM2 - Your Dynamic Software Security Journey
0
rewiews
Explore OWASP SAMM2's dynamic approach to software security, enhancing your development practices and strengthening application defenses throughout the lifecycle.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
OWASP Foundation
Scaling Security through Context-Based Security Assessments
0
rewiews
Streamlining security assessments through context-based automation, enabling efficient scaling and tailored workflows for product security teams in rapidly growing organizations.
Add to list
24
Lesons
43 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP Software Assurance Maturity Model - SAMM
0
rewiews
Explore OWASP's Software Assurance Maturity Model (SAMM), a framework for improving software security practices across organizations, presented by expert Bart De Win.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
OWASP Foundation
Software Security 5D Framework - Evolution of Security Verification
0
rewiews
Explore the OWASP Software Security 5D Framework and its impact on integrating security bugs into the software lifecycle, revolutionizing traditional assessment methods.
Add to list
27
Lesons
31 minutes
On-Demand
Free-Video
OWASP Foundation
Using IAC to Accelerate Threat Modeling
0
rewiews
Explore innovative techniques for accelerating threat modeling using Infrastructure as Code (IAC), enhancing security practices in software development and deployment.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
OWASP Foundation
Docker for Pentesters
0
rewiews
Learn essential Docker techniques for penetration testing, enhancing your cybersecurity skills and improving your ability to identify vulnerabilities in containerized environments.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP SAMM Project - Introduction to Software Assurance Maturity Model
0
rewiews
Explore the OWASP SAMM framework for software assurance, learning key strategies to integrate security practices throughout the software development lifecycle.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
OWASP Foundation
OWASP DSOMM Project - Introduction to DevSecOps Maturity Model
0
rewiews
Explore the OWASP DSOMM Project, a framework for enhancing software security practices and measuring DevSecOps maturity in organizations.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
OWASP Foundation
AppSec Awareness - A Blueprint for Security Culture Change
0
rewiews
Discover strategies for building a sustainable security culture through AppSec awareness, focusing on human factors, knowledge sharing, and effective program architecture.
Add to list
45
Lesons
46 minutes
On-Demand
Free-Video
Linux Foundation
reNgine - An Automated Reconnaissance Framework
0
rewiews
Explore an automated reconnaissance framework for efficient cybersecurity assessments, enhancing vulnerability detection and streamlining security workflows.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Linux Foundation
Implementing OpenSSF Best Practices Badges and Scorecards for Project Security
0
rewiews
Learn to enhance open-source project security using OpenSSF Best Practices Badges and Scorecards. Gain practical tips for implementation and addressing common issues to improve your project's security posture.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Breaking ML Services: Finding Zero-Days in Azure Machine Learning
0
rewiews
Uncover critical vulnerabilities in Azure Machine Learning, including credential leaks, information disclosure, and persistence techniques. Learn assessment methods for cloud-based MLaaS platforms and shared responsibility models.
Add to list
1
Lesons
1 hour 6 minutes
On-Demand
Free-Video
USENIX
How to Break, Then Fix, Differential Privacy on Finite Computers
0
rewiews
Exploring vulnerabilities in differential privacy implementations, focusing on precision-based attacks and proposing solutions to address floating-point behavior issues in open-source libraries.
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
Passive Reconnaissance Techniques for Ethical Hacking - Webinar 3
0
rewiews
Explore passive reconnaissance techniques for ethical hacking and cybersecurity, focusing on gathering information without direct interaction with target systems.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
OWASP Foundation
Why Security Fails and How to Solve It - Lessons from Real-World Assessments
0
rewiews
Explore real-world security failures and innovative solutions with insights from Praetorian's field experiences. Learn actionable steps to enhance cybersecurity through smarter practices and cutting-edge tools.
Add to list
14
Lesons
24 minutes
On-Demand
Free-Video
BSides SATX
Offensive Security Awareness: Understanding Assessment Types and Methodologies
0
rewiews
Demystify offensive security techniques, tools, and assessment types. Gain insights into vulnerability management strategies and learn to choose the right approach for your organization's security needs.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
NDC Conferences
Reviewing NuGet Packages Security Using OpenSSF Scorecard
0
rewiews
Explore OpenSSF Scorecard for assessing NuGet package security. Learn to evaluate maintenance, workflows, and security tools to improve application safety and make informed decisions.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
LASCON
Unlocking Startup Success: The Vitality of Security Assessments and How to Master Them
0
rewiews
Discover essential security assessment strategies for startups. Learn to establish robust security controls, navigate audits, and build a strong security posture to protect innovative ideas and ensure market success.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
NahamSec
How to Use WPScan - A Walkthrough with the Author
0
rewiews
Comprehensive walkthrough on using WPScan for WordPress security assessment, featuring insights from the tool's creator ethicalhack3r during a Live Recon episode.
Add to list
1
Lesons
1 hour 38 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Security TAG Closing - Highlights and Future Work
0
rewiews
Wrap-up of Cloud Native Security Con, highlighting Security TAG's work, future plans, and ways to get involved. Covers whitepapers, assessments, audits, and ecosystem insights.
Add to list
13
Lesons
16 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Assessing Environments Against Cloud Native Security Best Practices
0
rewiews
Insights on assessing cloud native environments against security best practices, including CNCF white papers and NIST controls. Explores open-source automation for efficient audits and cross-mapping frameworks.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
OWASP Foundation
Using the O2 Platform to Automate Application Security Knowledge and Workflows
0
rewiews
Explore the O2 platform for automating web application security reviews, enhancing visibility, and streamlining security workflows for both experts and non-experts.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
OWASP Foundation
ASVS Testing: Understanding Access Requirements for Verification
0
rewiews
Analyzing ASVS requirements to identify necessary access for accurate verification, aiding test case generation and helping companies understand the effort required for comprehensive security assessments.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
Cyber Mentor
New Web Hacking Tool CAIDO: A Potential Burp Suite Alternative
0
rewiews
Explore CAIDO, a potential Burp Suite alternative for web hacking. Learn setup, project creation, targeting, sitemap, scope, replay, automation, and conversion features.
Add to list
12
Lesons
12 minutes
On-Demand
Free-Video
Cyber Mentor
Fuzz Faster with Turbo Intruder - Account Bruteforcing and MFA Bypass
0
rewiews
Learn to use Turbo Intruder for efficient fuzzing, including account bruteforcing and bypassing MFA timers. Hands-on lab exercises demonstrate practical application of this powerful security testing tool.
Add to list
7
Lesons
16 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Empowerment Through Autonomy - SIG Security Overview and Updates
0
rewiews
Explore Kubernetes security initiatives, including documentation, audits, and tooling. Learn about the new Self-Assessments subproject and how to contribute to improving Kubernetes safety.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
HackerSploit
Linux Essentials for Hackers: File and Directory Permissions - Part 4
0
rewiews
Comprehensive guide on Linux file and directory permissions for ethical hackers, covering essential concepts to enhance system security and penetration testing skills.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Securing Kubernetes Clusters: A Collaborative Approach to Self-Assessment
0
rewiews
Explore the collaborative security assessment of Kubernetes Cluster API, covering threat modeling, global teamwork challenges, and lessons for future sub-project evaluations across the Kubernetes ecosystem.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
OWASP Foundation
Scaling Security Assessment for DevOps - Norad Framework Introduction
0
rewiews
Learn to scale security assessments for DevOps with Norad, a distributed testing framework. Automate open-source and vendor tools, aggregate results, and develop custom security tests using the SDK.
Add to list
26
Lesons
50 minutes
On-Demand
Free-Video
OWASP Foundation
Continuous Patch and Security Assessment with InSpec
0
rewiews
Discover InSpec: an open-source tool for automated infrastructure security testing. Learn to assess and enforce secure configurations across your IT fleet, integrating with CI/CD for continuous testing.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
Cooper
BtleJuice: The Bluetooth Smart Man-in-the-Middle Framework
0
rewiews
Explore BtleJuice, a framework for intercepting and manipulating Bluetooth Low Energy communications. Learn to perform man-in-the-middle attacks, assess device security, and discover vulnerabilities in smart objects.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
Bash Scripting for Pentesters
0
rewiews
Learn essential Bash scripting techniques for penetration testing, enhancing your cybersecurity skills and automating security tasks effectively.
Add to list
1
Lesons
2 hours 23 minutes
On-Demand
Free-Video
nullcon
A Kernel Hacker Meets Fuchsia OS
0
rewiews
Explore Fuchsia OS from a security perspective as a Linux kernel expert examines its architecture, design principles, and potential vulnerabilities, offering insights for both developers and security professionals.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
nullcon
Application Security Opportunities and Challenges in a DevOps World
0
rewiews
Panel discussion exploring application security challenges and opportunities in DevOps, featuring insights from industry leaders on integrating security into modern development practices.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
Ekoparty Security Conference
The Unbelievable Insecurity of the Big Data Stack
0
rewiews
Explore new attack vectors in Big Data infrastructure layers, addressing the lack of security assessment methodologies and technical resources for this rapidly growing field.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
WEareTROOPERS
Automotive Penetration Testing with Scapy
0
rewiews
Learn to conduct automotive penetration testing using Scapy, enhancing your skills in identifying and exploiting vulnerabilities in vehicle networks and systems.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
WEareTROOPERS
Security Assessment of Microsoft DirectAccess
0
rewiews
Explore security vulnerabilities in Microsoft DirectAccess, learning assessment techniques and potential exploits to enhance network protection.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
Security BSides San Francisco
Using Ancient Math to Speed Up Security Assessments of Windows Executables
0
rewiews
Discover how to accelerate Windows executable security assessments using Euclidean Distance and Bayes Theorem, enabling rapid triage and efficient risk reduction in regulated environments.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
44CON Information Security Conference
For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems
0
rewiews
Explore vulnerabilities in mobile point-of-sale systems, including MitM attacks, arbitrary code injection, and firmware exploitation. Learn to identify weaknesses and conduct security assessments in payment technologies.
Add to list
48
Lesons
42 minutes
On-Demand
Free-Video
44CON Information Security Conference
Aviation Security 101
0
rewiews
Explore aviation security vulnerabilities through pen testing research, covering access risks, performance calculations, maintenance mode issues, and potential misunderstandings in the industry.
Add to list
12
Lesons
28 minutes
On-Demand
Free-Video
BruCON Security Conference
Introducing the Smartphone Penetration Testing Framework
0
rewiews
Comprehensive framework for assessing smartphone security in organizations, covering various attack vectors and providing tools for penetration testing across multiple platforms.
Add to list
22
Lesons
56 minutes
On-Demand
Free-Video
LASCON
You're Going to Need a Bigger Shovel
0
rewiews
Explore software security assurance, application security, and organizational strategies for effective resource planning and process building in cybersecurity.
Add to list
6
Lesons
20 minutes
On-Demand
Free-Video
OWASP Foundation
Topics of Interest - Attacking the Microservice Systems - Methods and Practical Tips
0
rewiews
Explore methods and practical tips for attacking microservice systems, focusing on security assessment approaches to identify vulnerabilities specific to this architecture.
Add to list
11
Lesons
30 minutes
On-Demand
Free-Video
Security BSides San Francisco
Assessing the Embedded Devices On Your Network
0
rewiews
Explore embedded device security challenges, threat modeling, and assessment techniques through a VoIP phone case study. Learn hardware tricks, debugging methods, and potential mitigations for vulnerabilities.
Add to list
12
Lesons
34 minutes
On-Demand
Free-Video
RSA Conference
How to Get the Most Value out of Your Penetration Test
0
rewiews
Maximize penetration test value: Learn strategies for internal buy-in, aligning with business goals, choosing testers, and evaluating results. Gain practical insights from industry expert Ed Skoudis.
Add to list
18
Lesons
55 minutes
On-Demand
Free-Video
Security BSides San Francisco
The IoT Hacker's Toolkit
0
rewiews
Explore essential hardware and software tools for IoT security assessment, covering interfaces, analysis techniques, and skill-building for embedded device evaluation.
Add to list
13
Lesons
28 minutes
On-Demand
Free-Video
Black Hat
Like Lightning From the Cloud - Finding RCEs in an Embedded TLS Library
0
rewiews
Explore techniques for discovering remote code execution vulnerabilities in embedded TLS libraries, with insights on improving security in IoT and embedded systems.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
Black Hat
AutoSpear - Towards Automatically Bypassing and Inspecting Web Application Firewalls
0
rewiews
Explore techniques for automatically bypassing and inspecting web application firewalls, examining vulnerabilities in WAF-as-a-service solutions and cloud security services.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Black Hat
HTTP Fingerprinting and Advanced Assessment Techniques
0
rewiews
Explore advanced HTTP fingerprinting techniques and assessment methods for enhanced web security and vulnerability detection.
Add to list
1
Lesons
1 hour 33 minutes
On-Demand
Free-Video
Manufactorum Terminatus - The Attack and Defense of Industrial Manufacturers
0
rewiews
Explore strategies for attacking and defending industrial manufacturers, focusing on cybersecurity challenges and solutions in the manufacturing sector.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
DefCamp
OSSTMM - The "Measure, Don't Guess" Security Testing Methodology
0
rewiews
Explore the OSSTMM security testing methodology, emphasizing precise measurement over guesswork. Learn practical approaches to enhance your organization's information security practices.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
NahamSec
Attacking Wide Scopes
0
rewiews
Explore techniques for attacking wide-scope targets in bug bounty programs. Learn strategies to identify vulnerabilities and maximize your impact when dealing with extensive attack surfaces.
Add to list
1
Lesons
17 minutes
On-Demand
Free-Video
Black Hat
Into the Core - In-Depth Exploration of Windows 10 IoT Core
0
rewiews
Explore Windows 10 IoT Core internals, security features, attack surfaces, and assessment methods. Learn to secure IoT devices and understand their role in the evolving Internet of Things landscape.
Add to list
36
Lesons
50 minutes
On-Demand
Free-Video
BSidesLV
Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers
0
rewiews
Explore WPA2 password generation algorithms in wireless routers, uncovering vulnerabilities and improving network security through in-depth analysis and practical insights.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
BSidesLV
Automation of Penetration Testing and the Future
0
rewiews
Explore the future of automated penetration testing, its impact on the industry, and strategies for adapting to evolving cybersecurity challenges.
Add to list
18
Lesons
25 minutes
On-Demand
Free-Video
Devoxx
WebRTC Security - Is Web-Based Peer-to-Peer Ready for Primetime?
0
rewiews
Explore WebRTC security, architecture, and challenges in web-based peer-to-peer communication. Gain insights into deployment scenarios, potential weaknesses, and open security issues in this emerging technology.
Add to list
36
Lesons
54 minutes
On-Demand
Free-Video
GOTO Conferences
Common API Security Pitfalls
0
rewiews
Explore common API security pitfalls, their root causes, and actionable solutions to protect your APIs from unauthorized access and account compromises.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
Linux Foundation
Matrix - Open, Secure, Decentralised, Real-Time Communication Across Networks
0
rewiews
Explore Matrix: an open, secure, decentralized communication protocol. Learn key features, architecture, encryption, implementations, integrations, and real-world applications for cross-network messaging.
Add to list
24
Lesons
31 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Owning Electronic Locks Without Leaving A Trace
0
rewiews
Unveiling vulnerabilities in widely-used electronic locks, demonstrating potential for undetectable breaches. Explores implications beyond hotel security, offering insights into long-term research and ethical hacking.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Physics of Security
0
rewiews
Exploring IC reverse engineering techniques for security assessment, including failure analysis tools, delayering methods, and circuit editing. Learn how to analyze and modify chip structures for hardware hacking.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Attacking Industrial Remote Controllers
0
rewiews
Exploring vulnerabilities in industrial RF remote controllers, revealing security flaws and potential attacks. Includes demos, findings, and recommendations for improving safety in IIoT applications.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
iNalyzer - No More Blackbox iOS Analysis
0
rewiews
Discover iNalyzer, an open-source framework for iOS app security assessment. Learn how it transforms the app into a testing tool, enabling efficient server-side attacks and overcoming traditional analysis limitations.
Add to list
1
Lesons
1 hour 5 minutes
On-Demand
Free-Video
Black Hat
Internet-Scale Analysis of AWS Cognito Security
0
rewiews
Reveals findings from large-scale AWS Cognito security analysis, exposing vulnerabilities in identity pools granting access to thousands of S3 buckets, DynamoDB tables, and Lambda functions.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Realizing Software Security Maturity - The Growing Pains and Gains
0
rewiews
Explore software security maturity stages, from low to high, and learn strategies for building effective application security programs with practical insights and metrics.
Add to list
43
Lesons
39 minutes
On-Demand
Free-Video
You're Going to Need a Bigger Shovel - A Critical Look at Software Security Assurance
0
rewiews
Explore software security assurance strategies, from assessment to implementation, and learn how to adapt to evolving threats and disruptive technologies in this comprehensive overview.
Add to list
11
Lesons
53 minutes
On-Demand
Free-Video
Dirty Red Team Tricks
0
rewiews
Explore devious tactics and advanced techniques for penetration testing and red team operations, enhancing your cybersecurity skills and strategies.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
Installing Nessus on Kali Linux and Doing a Credentialed Scan
0
rewiews
Learn to install Nessus on Kali Linux and perform credentialed scans for comprehensive vulnerability assessments, enhancing your cybersecurity skills and network protection capabilities.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
Seeing Purple - Hybrid Security Teams for the Enterprise
0
rewiews
Explore hybrid security teams for enterprise, combining blue and purple team strategies for proactive protection, threat modeling, and effective exercises.
Add to list
24
Lesons
37 minutes
On-Demand
Free-Video
Web App Hacking and So Can You
0
rewiews
Learn web application hacking techniques and methodologies to identify vulnerabilities and improve security posture. Gain practical skills for ethical hacking and penetration testing.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
Gray Hat PowerShell
0
rewiews
Explore advanced PowerShell techniques for ethical hacking and security testing, focusing on leveraging built-in Windows tools for penetration testing and system analysis.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
Pentesting with Docker
0
rewiews
Learn to leverage Docker for efficient and scalable penetration testing. Explore containerization techniques to enhance your security assessment toolkit and streamline your workflow.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Submersion Therapy - Security Frameworks - What Was Once Old Is New Again
0
rewiews
Explore 10 security frameworks, their evolution, benefits, and challenges. Learn to choose the right framework, assess security, set priorities, and measure results for effective information security management.
Add to list
22
Lesons
31 minutes
On-Demand
Free-Video
Cross Industry Collaboration
0
rewiews
Explore cross-industry collaboration in cybersecurity, covering research, talent acquisition, public boards, assessments, and risk transfer with insights from Helen Patton.
Add to list
15
Lesons
45 minutes
On-Demand
Free-Video
Metasploit Townhall
0
rewiews
Explore Metasploit's latest developments and future plans with key team members in this informative townhall discussion from DerbyCon 2016.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
Red Team Yourself - Thomas Richards
0
rewiews
Learn adversary emulation techniques, build an in-house red team, and master reconnaissance and attack planning for comprehensive security assessments.
Add to list
29
Lesons
46 minutes
On-Demand
Free-Video
Extending Burp
0
rewiews
Explore techniques for enhancing Burp Suite's functionality through extensions, improving web application security testing capabilities and efficiency.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
Python Static Analysis
0
rewiews
Explore Python static analysis techniques for security assessments, focusing on AST modules, Bandit tool, and practical demonstrations.
Add to list
14
Lesons
27 minutes
On-Demand
Free-Video
Common Assessment Mistakes Pen Testers and Clients Should Avoid
0
rewiews
Explore common pitfalls in penetration testing and client assessments, learning strategies to enhance security evaluations and avoid critical mistakes.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
SDR RF Hacking Primer
0
rewiews
Comprehensive primer on SDR and RF hacking techniques, covering essential concepts and practical applications for security professionals and enthusiasts.
Add to list
1
Lesons
4 hours 7 minutes
On-Demand
Free-Video
Wacky and Wild Security - Getting Things Under CIS Controls V7
0
rewiews
Explore CIS Controls V7 implementation strategies, from history to practical application, including matrix creation, heat mapping, and assessment techniques.
Add to list
15
Lesons
40 minutes
On-Demand
Free-Video
load more...