Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Heartbleed
Showing:
13
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
HackerSploit
Bug Bounty Hunting
25
rewiews
Bug-Bounty is a process where hacking companies, or hackers, act as 'middle-men' to detect bugs in software and address cyber vulnerabilities that organisations are facing.Get an hand-on approach on hunting bugs.
Add to list
17
Lesons
4 hours 30 minutes
On-Demand
Free-Video
IEEE
Heap Models for Exploit Systems
0
rewiews
Formal modeling of heap exploits as abstract machines, exploring physical and logical heap properties to express attacks as reachability problems in specific heap configurations.
Add to list
13
Lesons
48 minutes
On-Demand
Free-Video
Hussein Nasser
Perfect Forward Secrecy in TLS Explained
0
rewiews
Explore Perfect Forward Secrecy in TLS, a crucial encryption property that safeguards past communications even if server keys are compromised, enhancing overall data security.
Add to list
6
Lesons
21 minutes
On-Demand
Free-Video
100 Bug Bounties and Security Research - Lessons from BSides Tampa 2015
0
rewiews
Explore security research, bug bounties, and ethical considerations in cybersecurity with insights from Kevin Johnson's experiences and industry examples.
Add to list
17
Lesons
49 minutes
On-Demand
Free-Video
OWASP Foundation
11,000 Voices - Experts Shed Light on 4-Year Open Source and AppSec Survey
0
rewiews
Experts discuss findings from a 4-year study on open source security practices, revealing surprising trends in policy enforcement, vulnerability tracking, and organizational preparedness for security threats like Heartbleed.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
Linux Foundation
OpenSSL After Heartbleed - Lessons Learned and Project Improvements
0
rewiews
Explore OpenSSL's transformation post-Heartbleed: enhanced team, transparency, development processes, and project vitality. Learn about security improvements and future plans.
Add to list
28
Lesons
55 minutes
On-Demand
Free-Video
ACCU Conference
Code Red: Navigating the Minefield of Security Programming Blunders
0
rewiews
Explore infamous security breaches, learn from programming mishaps, and gain practical strategies to enhance cybersecurity in this dynamic session on secure coding practices.
Add to list
1
Lesons
1 hour 24 minutes
On-Demand
Free-Video
Fuzzing_in - Hardik Shah
Using Vulhub for Dockerized Vulnerability Replication
0
rewiews
Explore Vulhub for hands-on vulnerability replication. Learn to set up Docker environments, simulate Heartbleed and Log4j vulnerabilities, and gain practical cybersecurity experience.
Add to list
7
Lesons
18 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Advanced Cryptography - Tunnelling SSL/TLS/VPN
0
rewiews
Explore tunnelling modes, secure sockets, OpenSSL, Heartbleed vulnerability, VPNs, and key exchange methods in network security protocols like SSL/TLS.
Add to list
25
Lesons
55 minutes
On-Demand
Free-Video
OWASP Foundation
Breaking and Fixing Dockerized Environments
0
rewiews
Comprehensive analysis of Docker security vulnerabilities and best practices for securing containerized environments, covering image security, runtime protection, and ecosystem tools.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
Kaspersky
More Libraries! More Vulnerabilities! More Things! Now with Real World Case Studies
0
rewiews
Explore real-world case studies on library vulnerabilities, their impact, and mitigation strategies. Gain insights into security challenges and learn about industry responses and financial implications.
Add to list
8
Lesons
19 minutes
On-Demand
Free-Video
Wolf in Shell's Clothing - Why You Should Be Skeptical of Your Trusted Tools
0
rewiews
Explore the skepticism towards trusted security tools, data breaches, and vulnerabilities. Learn about manual hijacking, drive-by downloads, and strategies to enhance network protection.
Add to list
35
Lesons
38 minutes
On-Demand
Free-Video
Securing Trust - Defending Against Next Generation Attacks
0
rewiews
Explore next-gen cybersecurity threats and defense strategies, focusing on digital certificates, SSH, and foundational security measures to protect against evolving attacks.
Add to list
27
Lesons
37 minutes
On-Demand
Free-Video
load more...