Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#DerbyCon
Showing:
183
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Cobalt Strike: Advanced Threat Tactics - Lecture 332
0
rewiews
Explore advanced hacking techniques and strategies with Raphael Mudge in this insightful presentation from Derbycon 2012.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Social Zombies: Rise of the Mobile Dead
0
rewiews
Explore the rise of mobile vulnerabilities and social engineering threats in this insightful presentation on cybersecurity challenges in the mobile era.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
The Badmin Project
0
rewiews
Explore the Badmin Project, a cybersecurity initiative presented at Derbycon 2012, offering insights into advanced network administration and security techniques.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Wielding Katana - A Live Security Suite
0
rewiews
Explore Katana, a live security suite, with experts JP Dunning and Chris Silvers as they demonstrate its capabilities and applications in real-time.
Add to list
1
Lesons
56 minutes
On-Demand
Free-Video
Practical Osint
1
rewiews
Explore practical Open Source Intelligence techniques for gathering and analyzing publicly available information, enhancing your cybersecurity and investigative skills.
Add to list
1
Lesons
58 minutes
On-Demand
Free-Video
Powershell and Windows Throw the Best Shell Parties
0
rewiews
Explore Windows shell parties with PowerShell, learning combat techniques, configuration, and leveraging PowerShell for enhanced system interaction and security testing.
Add to list
15
Lesons
21 minutes
On-Demand
Free-Video
Rawr - Rapid Assessment of Web Resources
0
rewiews
Explore rapid web resource assessment techniques, including crawling, scanning, and fuzzing, to enhance cybersecurity and identify potential vulnerabilities in web applications.
Add to list
20
Lesons
47 minutes
On-Demand
Free-Video
Cyber False Flags and Adversarial Counterintelligence - Oh My
0
rewiews
Explore cyber false flags and adversarial counterintelligence techniques, uncovering deception strategies and countermeasures in the digital realm.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Stable 10 - Getting Dirty on the CANBUS
0
rewiews
Explore CANBUS technology and its applications in automotive systems, focusing on security implications and potential vulnerabilities in modern vehicles.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
How Do I Detect Technique X in Windows - Applied Methodology to Definitively Answer This Question
0
rewiews
Learn a systematic approach to detect specific techniques in Windows, enhancing your ability to identify and analyze potential security threats and vulnerabilities.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
Scientific Computing for Information Security - Forging the Missing Link
0
rewiews
Explore scientific computing's role in information security, focusing on data analytics, automation, and practical examples to enhance effectiveness and solve industry challenges.
Add to list
25
Lesons
41 minutes
On-Demand
Free-Video
Social Engineering is a Fraud
0
rewiews
Explore social engineering tactics and their role in fraud, uncovering deceptive techniques used to manipulate individuals and organizations for malicious purposes.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
Scanning Darkly - HD Moore Keynote
0
rewiews
Explore network scanning techniques and cybersecurity insights with HD Moore's keynote address, offering valuable perspectives on digital vulnerabilities and defensive strategies.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
Look Ma No Exploits - The Recon-ng Framework
0
rewiews
Comprehensive framework for reconnaissance in cybersecurity, covering host harvesting, data manipulation, and social engineering techniques with practical demonstrations.
Add to list
49
Lesons
45 minutes
On-Demand
Free-Video
Kinetic Pwnage - Obliterating the Line Between Computers and the Physical World
0
rewiews
Explore the intersection of digital and physical security, examining vulnerabilities where computer systems control real-world objects and environments.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
Practical Exploitation Using A Malicious Service Set Identifier - SSID - Deral Heiland
0
rewiews
Explore SSID exploitation techniques, including device limitations, cross-site scripting, and command injection. Learn practical methods for testing and exploiting vulnerabilities in wireless networks.
Add to list
25
Lesons
50 minutes
On-Demand
Free-Video
Jtagulator - Assisted Discovery of On-Chip Debug Interfaces
0
rewiews
Explore on-chip debug interfaces and JTAG architecture with JTAGulator, a hardware tool for identifying and accessing embedded systems' debug ports.
Add to list
30
Lesons
49 minutes
On-Demand
Free-Video
Seeing Red In Your Future
0
rewiews
Explore advanced techniques for Red Team operations, including strategies for evading detection and improving effectiveness in penetration testing scenarios.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
How to Attack SharePoint Servers and Tools to Make It Easier
0
rewiews
Explore SharePoint vulnerabilities, common issues, and hacking tools with experts Kevin Johnson and James Jardine. Learn attack techniques and discover new tools for SharePoint security testing.
Add to list
19
Lesons
42 minutes
On-Demand
Free-Video
The High Risk of Low Risk Applications
0
rewiews
Explore the hidden dangers of seemingly low-risk applications and learn strategies to mitigate potential security threats in this insightful cybersecurity presentation.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
It's Okay to Touch Yourself
0
rewiews
Explore self-assessment techniques for personal and professional growth in cybersecurity, emphasizing the importance of continuous learning and skill development.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
Collaborative Penetration Testing With Lair
0
rewiews
Explore collaborative penetration testing using Lair, a tool for efficient team-based security assessments and vulnerability management in complex environments.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
What's Common in Oracle and Samsung - They Tried to Think Differently About Crypto
0
rewiews
Explore Oracle and Samsung's unconventional approaches to cryptography, examining their unique strategies and potential implications for security in the tech industry.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Burning the Enterprise with BYOD
0
rewiews
Explore enterprise security vulnerabilities introduced by BYOD policies and learn effective strategies to mitigate risks in mobile device management.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Malware Automation
0
rewiews
Explore malware automation techniques, from lone wolf attacks to armored malware armies. Learn about DIY kits, armoring tools, and strategies to evade antivirus detection.
Add to list
14
Lesons
48 minutes
On-Demand
Free-Video
Getting the Goods with Smbexec
0
rewiews
Explore SMBexec for efficient network penetration and data extraction with experts Eric Milam and Martin Bos. Learn advanced techniques for secure and effective penetration testing.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
Shattering the Glass - Crafting Post Exploitation Tools with PowerShell
0
rewiews
Learn to craft powerful post-exploitation tools using PowerShell for enhanced penetration testing and security assessments. Explore advanced techniques with Matt Johnson.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Cheat Codez - Level Up Your SE Game
0
rewiews
Enhance your social engineering skills with advanced techniques, from client-side attacks to sophisticated phishing methods, preparing for real-world scenarios and incident response.
Add to list
33
Lesons
49 minutes
On-Demand
Free-Video
Living Off the Land - A Minimalist's Guide to Windows Post-Exploitation
0
rewiews
Discover minimalist techniques for Windows post-exploitation, leveraging built-in tools and resources to maintain stealth and effectiveness in penetration testing and security assessments.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
Ownage From Userland Process Puppeteering
0
rewiews
Explore advanced techniques for manipulating processes and gaining system control through userland exploitation, presented by security expert Nick Cano.
Add to list
1
Lesons
33 minutes
On-Demand
Free-Video
Cracking Corporate Passwords - Exploiting Password Policy Weaknesses
0
rewiews
Explore techniques for exploiting password policy weaknesses and cracking corporate passwords in this informative cybersecurity talk from DerbyCon 3.0.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
The Art and Science of Hacking Any Organization
0
rewiews
Discover methodologies and techniques for penetrating organizational security, exploring both the artistic and scientific aspects of ethical hacking and cybersecurity assessment.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
Exploiting the Zeroth Hour - Developing Your Advanced Persistent Threat to Pwn the N
0
rewiews
Explore advanced persistent threat development techniques to enhance your cybersecurity skills and understand sophisticated attack methodologies for improved network defense.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
Raspberry Pi Media Centers and Apple TV
0
rewiews
Explore Raspberry Pi media centers and Apple TV integration for enhanced home entertainment and streaming capabilities.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
Union Select This Talk As New Exploitation And Obfuscation Techniques
0
rewiews
Explore innovative exploitation and obfuscation techniques for SQL injection attacks, enhancing your understanding of database security vulnerabilities and advanced hacking methods.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
Phishing Like the Pros
0
rewiews
Learn advanced phishing techniques, strategies, and tools used by professional penetration testers to simulate real-world attacks and improve organizational security.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
Cognitive Injection - Reprogramming the Situation-Oriented Human OS - Andy Ellis
0
rewiews
Explore cognitive biases, decision-making, and risk management to improve security awareness and human behavior in various situations.
Add to list
21
Lesons
49 minutes
On-Demand
Free-Video
IOCaware - Actively Collect Compromise Indicators and Test Your Entire Enterprise
0
rewiews
Learn to actively collect compromise indicators and test your entire enterprise using IOCaware, enhancing your organization's cybersecurity posture and threat detection capabilities.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Cash Is King - Who's Wearing Your Crown
0
rewiews
Explore financial cybercrime tactics, including ATM skimming and POS malware, to understand modern threats and protect against monetary fraud in the digital age.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
Security Sucks and You're Wearing a Nursing Bra
0
rewiews
Explore the challenges and humor in cybersecurity with Paul Asadoorian's candid talk on industry issues, personal experiences, and unconventional solutions.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Windows Attacks At Is The New Black - Rob Fuller And Chris Gates
0
rewiews
Explore Windows privilege escalation techniques, from local exploits to password manipulation, with insights on persistence methods and system vulnerabilities.
Add to list
29
Lesons
48 minutes
On-Demand
Free-Video
How Good Is Your Phish
0
rewiews
Explore advanced phishing techniques, defense strategies, and real-world examples to enhance your cybersecurity skills and protect against sophisticated social engineering attacks.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
Identifying Evil - An Introduction to Reverse Engineering Malware and Other Software
0
rewiews
Explore reverse engineering techniques for malware analysis and software investigation, gaining insights into identifying and understanding malicious code.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
The Message and the Messenger
0
rewiews
Enhance your presentation skills with techniques for effective communication, body language, and storytelling. Learn to create impactful visual aids and handle audience feedback.
Add to list
32
Lesons
47 minutes
On-Demand
Free-Video
Pass the Hash 2 - The Admin's Revenge
0
rewiews
Explore advanced techniques for defending against Pass-the-Hash attacks, including strategies for system administrators to protect networks and mitigate vulnerabilities.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
How I'm Going to Own Your Organization in Just a Few Days
0
rewiews
Discover advanced techniques for penetrating organizational security in just days, exploring vulnerabilities and attack strategies used by skilled hackers.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Love Letters to Frank Abagnale - How Do I Pwn Thee? Let Me Count the Ways
0
rewiews
Explore social engineering techniques and their impact on cybersecurity through real-world examples and practical insights from an experienced professional.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
The Cavalry Is Us - Protecting The Public Good and Our Profession
0
rewiews
Explore strategies for safeguarding public interests and advancing the cybersecurity profession through collective action and ethical practices in an evolving digital landscape.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
50 Shades of Red - Stories From The Playroom
0
rewiews
Explore real-world red team experiences and lessons learned from penetration testing engagements, offering valuable insights for security professionals and enthusiasts.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
Beyond Information Warfare - You Ain't Seen Nothing Yet
0
rewiews
Explore the future of information warfare and its potential impacts beyond current understanding with cybersecurity expert Winn Schwartau in this thought-provoking presentation.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
Help for the Helpdesk
0
rewiews
Practical strategies and tips for IT helpdesk professionals to enhance their problem-solving skills, improve customer service, and increase efficiency in technical support roles.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
How the Grid Will Be Hacked
0
rewiews
Explore vulnerabilities in power grid systems and potential cyber attack scenarios, with insights on protecting critical infrastructure from security experts.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
Stop Fighting Anti Virus Integgroll
0
rewiews
Learn effective strategies to bypass antivirus software, exploring techniques for malware development and evasion in this informative cybersecurity talk.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
Weaponizing Your Coffee Pot
0
rewiews
Explore the potential security vulnerabilities in everyday appliances and learn how to exploit them for unconventional hacking techniques.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
Uncloaking IP Addresses on IRC
0
rewiews
Explore techniques for revealing hidden IP addresses on IRC networks, enhancing cybersecurity knowledge and network analysis skills.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Its Only a Game - Learning Security Through Gaming
0
rewiews
Explore innovative approaches to learning cybersecurity through gaming, enhancing skills and knowledge in an engaging, interactive format.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
Ooops Now What - The Stolen Data Impact Model
0
rewiews
Explore the Stolen Data Impact Model (SDIM) to understand and mitigate the consequences of data breaches in cybersecurity.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
Stop Making Excuses - It's Time to Own Your HIV - High Impact Vulnerabilities
0
rewiews
Explore strategies for identifying and addressing high-impact vulnerabilities in cybersecurity, focusing on project management, communication, and results-driven approaches.
Add to list
21
Lesons
47 minutes
On-Demand
Free-Video
Anti Forensics Memory or Something I Forget
0
rewiews
Explore advanced anti-forensics techniques for memory analysis, focusing on evasion methods and countermeasures in digital investigations.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
The Mysterious Mister Hokum
0
rewiews
Explore the enigmatic world of Mr. Hokum with Jason Scott, delving into intriguing tales and uncovering hidden truths in this captivating presentation.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Appsec TLDR
0
rewiews
Explore web application security essentials, including browser proxies, HTTP requests, cookies, and common vulnerabilities like XSS and SQL injection. Learn attacker mentality and defense strategies.
Add to list
27
Lesons
43 minutes
On-Demand
Free-Video
Dancing With Dalvik
0
rewiews
Explore Android app security through reverse engineering techniques, focusing on Dalvik bytecode analysis and manipulation for enhanced mobile security understanding.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
IPv6 Is Here
0
rewiews
Explore IPv6 implementation, its current status, and practical applications in network security and administration.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
DIY Command Control for Fun and No Profit
0
rewiews
Learn to build your own command and control system for cybersecurity testing, exploring DIY techniques and practical applications in network defense and penetration testing.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
Big Hugs for Big Data
0
rewiews
Explore the intersection of big data and security with insights on privacy, ethics, and risk management in the digital age.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Antivirus Evasion Lessons Learned
0
rewiews
Learn practical techniques for evading antivirus detection, drawing from real-world experiences and lessons learned in penetration testing and red team engagements.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
Getting Schooled Security With No Budget In A Hostile Environment
0
rewiews
Learn strategies for implementing effective security measures in resource-constrained and challenging environments, focusing on practical solutions and innovative approaches.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
Is Auditing CC Different Nowadays
0
rewiews
Explore modern code auditing techniques, challenges, and tools with expert insights on improving software security and vulnerability detection.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
Browser Pivoting
0
rewiews
Explore advanced browser pivoting techniques for penetration testing and ethical hacking, presented by expert Raphael Mudge at DerbyCon 3.0.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
An Encyclpwnia of Persistence
0
rewiews
Explore advanced persistence techniques in cybersecurity, covering methods to maintain unauthorized access and evade detection in compromised systems.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
How Can I Do That - Intro To Hardware Hacking With An RFID Badge Reader
0
rewiews
Explore hardware hacking techniques using an RFID badge reader, covering circuit analysis, signal decoding, and practical Arduino-based projects for RFID spoofing and security research.
Add to list
29
Lesons
38 minutes
On-Demand
Free-Video
Why Dumpster Dive When I Can Pwn Right In
0
rewiews
Explore advanced hacking techniques and ethical penetration testing strategies to enhance cybersecurity defenses and protect against sophisticated cyber threats.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Hacking Back Active Defense and Internet Tough Guys
0
rewiews
Explore active defense strategies and the ethics of "hacking back" in cybersecurity, examining legal implications and practical considerations for protecting digital assets.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
The Infosec Revival
0
rewiews
Explore the latest trends and innovations in information security with insights from industry expert Matt Scriptjunkie Weeks, focusing on the revival of key infosec concepts and practices.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
The Netsniff-NG Toolkit
0
rewiews
Explore the powerful Netsniff-ng toolkit for network analysis, packet capturing, and traffic manipulation. Learn advanced techniques for network security and monitoring.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Your Turn Johnny Long Hfc
0
rewiews
Explore hacking techniques and strategies with renowned security expert Johnny Long in this engaging DerbyCon presentation on ethical hacking and cybersecurity.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
A Syscall to Arms
0
rewiews
Explore system calls in Windows and Linux, understanding their role in security and exploitation. Learn techniques for analyzing and manipulating syscalls to enhance your cybersecurity skills.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
Practical File Format Fuzzing
0
rewiews
Explore practical file format fuzzing techniques to uncover vulnerabilities and enhance software security. Learn effective strategies for identifying and exploiting weaknesses in file parsing systems.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
Windows Owned By Default
0
rewiews
Explore Windows vulnerabilities and default security flaws with expert Mark Baggett. Learn essential techniques for identifying and mitigating risks in Windows systems.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Android 40 Ice Cream - Sudo Make Me A Sandwich
0
rewiews
Explore Android 4.0 Ice Cream Sandwich's security features, vulnerabilities, and exploitation techniques in this comprehensive analysis of the mobile operating system.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
Applying the 32 Zombieland Rules to IT Security - Larry Pesce
0
rewiews
Applying Zombieland survival rules to IT security: practical, humorous tips for staying safe in the digital apocalypse.
Add to list
40
Lesons
46 minutes
On-Demand
Free-Video
Attacking the Next Generation Air Traffic Control System - Hackers, Liquor, and Commerce
0
rewiews
Explore vulnerabilities in next-gen air traffic control systems, examining potential security risks and implications for aviation safety and cybersecurity.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
Antivirus Evasion Through Antigenic Variation - Why The Blacklisting Approach to AV
0
rewiews
Explore antivirus evasion techniques using antigenic variation, challenging traditional blacklisting approaches in cybersecurity and malware detection.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
Finding the Signal in the Noise - Quantifying Advanced Malware
0
rewiews
Quantifying advanced malware through data analysis, focusing on finding patterns in large datasets to identify threats and improve detection methods.
Add to list
17
Lesons
44 minutes
On-Demand
Free-Video
SQL Injection with SQLMap
0
rewiews
Explore SQL injection techniques using SQLMap, a powerful penetration testing tool, to identify and exploit database vulnerabilities in web applications.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
The Internet of Things - Vulns, Botnets, and Detection
0
rewiews
Explore vulnerabilities, botnets, and detection methods in the Internet of Things, uncovering potential risks and security challenges in connected devices.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
The Malware Management Framework - A Process You Can Use To Find Advanced Malware
0
rewiews
Discover a comprehensive process for identifying advanced malware using the Malware Management Framework. Learn about key components, tools, and practical steps for effective malware detection and management.
Add to list
24
Lesons
54 minutes
On-Demand
Free-Video
Hack the Hustle - Eve Adams
0
rewiews
Discover strategies for navigating the cybersecurity job market, crafting effective résumés, and decoding job descriptions to land your ideal position in this industry-focused talk.
Add to list
14
Lesons
54 minutes
On-Demand
Free-Video
Operationalizing Security Intelligence in the Enterprise
0
rewiews
Explore enterprise security intelligence operationalization, from demonstrating value to real-time implementation, utilizing internal and external sources for effective threat analysis and strategic decision-making.
Add to list
33
Lesons
48 minutes
On-Demand
Free-Video
Everything You Ever Wanted to Know on How to Start a Credit Union but Were Afraid
0
rewiews
Comprehensive guide on establishing a credit union, covering legal requirements, financial considerations, and operational challenges for aspiring founders in the financial sector.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
Tizen Security - Hacking the New Mobile OS
0
rewiews
Explore Tizen security vulnerabilities and hacking techniques for this emerging mobile OS. Learn about potential risks and defensive strategies for the platform.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
Building an Information Security Awareness Program from Scratch
0
rewiews
Learn to create an effective information security awareness program from the ground up, covering key strategies and best practices for educating and protecting your organization.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
Malware Testing - Malware Scenarios On Your Network
0
rewiews
Explore malware testing scenarios to enhance network security with insights from Tony Huffman and Juan Corte. Learn practical techniques for identifying and mitigating threats in real-world environments.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
A Developer's Guide to Pentesting
0
rewiews
Explore pentesting from a developer's perspective, learning essential techniques and strategies to enhance software security and vulnerability assessment.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
Password Intelligence Project - Advanced Password Recovery and Modern Mitigation Strategies
0
rewiews
Explore advanced password recovery techniques, modern mitigation strategies, and the importance of multi-factor authentication in enterprise security.
Add to list
33
Lesons
46 minutes
On-Demand
Free-Video
Decoding Bug Bounty Programs - Jon Rose
0
rewiews
Explore bug bounty programs' benefits, challenges, and impact on cybersecurity. Learn how to participate effectively and understand their role in modern security practices.
Add to list
16
Lesons
46 minutes
On-Demand
Free-Video
Defcon Documentary Q&A Part 1
0
rewiews
Engaging Q&A session with Jason Scott discussing the Defcon documentary, offering insights into hacker culture and the evolution of the iconic conference.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
Patching Windows Executables With The Backdoor Factory
0
rewiews
Explore techniques for patching Windows executables to inject malicious code, including code cave creation, shellcode prototyping, and mitigation strategies against these attacks.
Add to list
27
Lesons
46 minutes
On-Demand
Free-Video
Defensive Segment
0
rewiews
Explore defensive cybersecurity strategies and techniques in this insightful presentation from DerbyCon 3.0, offering valuable knowledge for enhancing your security posture.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
Taking the BDSM Out of PCI DSS Through Open Source Solutions
0
rewiews
Explore open-source solutions to simplify PCI DSS compliance, reducing complexity and costs for businesses while maintaining security standards.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
load more...