Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Threat Mitigation
Showing:
112
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Conf42
A Data-Driven Approach to Mitigating Cyber Threats - Zero Trust Architecture
0
rewiews
Explore Zero Trust Architecture's principles, implementation strategies, and future in cybersecurity. Gain insights into AI's role, challenges, and industry trends for mitigating cyber threats effectively.
Add to list
11
Lesons
13 minutes
On-Demand
Free-Video
Docker
Twisting Containers - Breaking the Container Boundary
0
rewiews
Explore container security vulnerabilities and learn techniques to break container boundaries, enhancing your understanding of Docker security risks and mitigation strategies.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Attractive Directory and Deceptive Attacks in Organizational Environments
0
rewiews
Exploración de ataques maliciosos en organizaciones: Pass-The-Hash, Mimikatz y DCSync. Análisis de configuraciones erróneas, propuestas de mitigación y reflexión sobre ciberseguridad en Argentina.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Cyber Mentor
Print Nightmare - Domain Controller Domination
0
rewiews
Explore the Print Nightmare vulnerability and its impact on domain controllers. Learn about this critical security flaw and its potential for system compromise in Windows environments.
Add to list
1
Lesons
12 minutes
On-Demand
Free-Video
SyScan360
Deep Submicron Backdoor - SyScan'14 Singapore
0
rewiews
Explore deep submicron backdoors in hardware security, examining vulnerabilities and potential exploits at the microscopic level of integrated circuits.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
RSA Conference
The Five Most Dangerous New Attack Techniques and How to Counter Them
0
rewiews
Experts discuss the latest dangerous cyber attack techniques, their mechanisms, countermeasures, and future threats, providing insights for cybersecurity professionals to stay ahead of evolving risks.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
Microsoft
The Importance of Convergence in Today's Risky Landscape
0
rewiews
Explore how combining Saviynt with Microsoft enhances security and simplifies identity challenges in an expanding threat landscape, offering tool consolidation and improved visibility.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
The SMB Security Gap - Addressing Vulnerabilities in Small and Medium Businesses
0
rewiews
Explore the security challenges faced by small and medium-sized businesses, uncovering vulnerabilities and discussing effective strategies for protection in today's digital landscape.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
The Cyber Academy
Incident Response - Raising the Stakes in Cyber
0
rewiews
Explore incident response strategies and heightened cybersecurity measures with expert Cary Hendricks, enhancing your ability to protect against and mitigate cyber threats.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Windows Command Line Incident Response - Outerz0ne 2011
0
rewiews
Explore Windows command line tools for effective incident response, enhancing your ability to investigate and mitigate security breaches efficiently.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
Embedded Malicious JavaScript - Outerz0ne 2009
0
rewiews
Explore techniques for embedding malicious JavaScript in web applications, understanding potential vulnerabilities and security risks in modern web development.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
Forensic 365
Cyber Threat Intelligence - Analysis and Mitigation Strategies
0
rewiews
Explore Cyber Threat Intelligence: analyze data, identify threats, and develop proactive strategies to mitigate cyber-attacks. Learn to enhance organizational security through actionable insights.
Add to list
1
Lesons
1 hour 20 minutes
On-Demand
Free-Video
Dragos: ICS Cybersecurity
Analyzing and Defending Against TRISIS - Safety Instrumentation Systems Cybersecurity
0
rewiews
Analyze TRISIS malware targeting Safety Instrumentation Systems, explore its potential impacts, and learn defensive strategies for industrial control systems cybersecurity.
Add to list
24
Lesons
54 minutes
On-Demand
Free-Video
Dragos: ICS Cybersecurity
PIPEDREAM Malware and the CHERNOVITE Activity Group - Industrial Control Systems Cybersecurity
0
rewiews
Detailed analysis of PIPEDREAM, an ICS-specific malware capable of disrupting industrial environments. Experts discuss components, capabilities, impacted devices, and mitigation strategies.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
Web Summit
Predictive Security - Solving Enterprise Risk Management as a Data Problem
0
rewiews
Explore predictive security and enterprise risk management through data-driven solutions with insights from Lookout's co-founder Kevin Mahaffey.
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
OWASP Foundation
Fighting Advanced Threats at Their Software Roots - Scaling Software Security
0
rewiews
Exploring strategies to scale software security beyond developers, addressing vulnerabilities at their roots, and transforming the software ecosystem to combat advanced threats effectively.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
OWASP Foundation
Mobile-First Websites Security Evaluation - Attacker-Friendly or User-Friendly?
0
rewiews
Evaluate security vulnerabilities in mobile-first websites, exploring potential risks and attacker-friendly features. Learn to identify and mitigate threats in mobile web development.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
OWASP Foundation
Web Service Workers - Breaking the Web: Exploiting a Cool Feature
0
rewiews
Explore Web Service Workers' potential to disrupt web security, examining innovative uses and potential vulnerabilities in this cutting-edge browser feature.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
OWASP Foundation
Hardening the Web Platform
0
rewiews
Explore web platform security with Mike West's keynote on hardening techniques, challenges, and future directions for a more robust online environment.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
Linux Foundation
Developing Secure Open Source Software - Mentorship Session
0
rewiews
Explore best practices for developing secure open source software with expert guidance on risk mitigation, vulnerability management, and collaborative security measures.
Add to list
1
Lesons
1 hour 28 minutes
On-Demand
Free-Video
Linux Foundation
Cloud Native Storage Solutions for Ransomware Protection
0
rewiews
Explore cloud-native storage solutions to protect against ransomware attacks, featuring insights from Red Hat experts on enhancing data security in modern IT environments.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
Linux Foundation
Securing Your Software Supply Chain
0
rewiews
Explore the current state and future of JavaScript ecosystem security, learn about emerging tools to combat threats, and discover practical strategies to protect your software supply chain.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Cooper
Education and Communication in Information Security - Hack.lu 2018
0
rewiews
Explore effective techniques for educating and communicating complex technical concepts, focusing on innovative approaches to enhance understanding and engagement.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
OWASP Foundation
Magecart - The Rising Threat to E-commerce Websites
0
rewiews
Explore Magecart, a cybercrime group targeting e-commerce sites through digital skimming. Learn about their tactics, technical aspects, and mitigation strategies for protecting user data.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
Security BSides San Francisco
Effective Security on a Tight Budget
0
rewiews
Discover strategies for maintaining robust security with limited resources, focusing on principles and practices to overcome budget constraints in challenging economic times.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
RSA Conference
Backdoors and Breaches - Live Tabletop Exercise Demo
0
rewiews
Interactive tabletop exercise demonstrating incident response strategies and cybersecurity best practices through simulated breach scenarios and team-based problem-solving.
Add to list
1
Lesons
1 hour 8 minutes
On-Demand
Free-Video
RSA Conference
Bridging Gaps in Cybersecurity for Target-Rich, Cyber-Poor Organizations
0
rewiews
Exploring creative solutions to address cyber disparities and enhance defense capabilities for resource-limited organizations, emphasizing a collaborative approach to cybersecurity challenges.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
Linux Foundation
Building and Using the OpenSSF Security Toolbelt - 6 Months In
0
rewiews
Explore the OpenSSF Security Toolbelt initiative: its mission, progress, and impact on open-source security. Learn about tools, patterns, and opportunities to enhance software supply chain protection.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
API Security: Code-to-Cloud Context for Complete Protection
0
rewiews
Comprehensive approach to API security, covering code-level inventorying and runtime protection. Learn to mitigate issues faster and improve organizational API security posture efficiently.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
OWASP Foundation
Navigating the Landscape of Client-Side Request Hijacking on the Web
0
rewiews
Explore client-side request hijacking vulnerabilities, their impact on web security, and effective mitigation strategies to protect against these emerging threats.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
OpenSSF
Trials, Tribulations and Triumphs - An End User's Perspective on Software Supply Chain Security
0
rewiews
Explore enterprise challenges, initiatives, and future vision for open source software supply chain security from an end user perspective. Learn about threat mitigation strategies and collaborative efforts.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
OWASP Foundation
SimpleRisk: Open Source Enterprise Risk Management Tool
0
rewiews
Learn to manage enterprise risk effectively with SimpleRisk, an open-source tool. Explore risk formulas, documentation, evaluation, and cyclical management processes through practical demonstrations and expert insights.
Add to list
33
Lesons
46 minutes
On-Demand
Free-Video
Royal Tyrrell Museum of Palaeontology
Snakes of Alberta
0
rewiews
Learn to identify Alberta's native snakes, prevent encounters, protect habitats, and handle snake bites. Gain valuable insights on snake behavior, threats, and conservation efforts.
Add to list
18
Lesons
43 minutes
On-Demand
Free-Video
AGU
Defending the Home Planet: Assessing and Mitigating Asteroid and Comet Impacts
0
rewiews
Researchers discuss latest advances in assessing asteroid and comet impact dangers, including land vs. sea impacts, and potential defense strategies against these cosmic threats.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
OWASP Foundation
PDF - Mess With The Web
0
rewiews
Explore PDF vulnerabilities and their impact on web security in this talk by Alex Infuhr, highlighting potential risks and mitigation strategies for developers and security professionals.
Add to list
1
Lesons
33 minutes
On-Demand
Free-Video
OWASP Foundation
Bot or Not? Mitigating Automated Threats to Web Applications
0
rewiews
Explore automated threats to web applications and strategies for mitigating risks in this insightful presentation on cybersecurity challenges and solutions.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
OWASP Foundation
Securing Node.js and JavaScript
0
rewiews
Explore common security vulnerabilities in Node.js and JavaScript ecosystems, and learn effective strategies to protect your applications from potential attacks.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
OWASP Foundation
Azure Vulnerability Testbed (AzGOAT) - Understanding and Hardening Azure Security
0
rewiews
Explore Azure security vulnerabilities and defenses with AzGOAT, a lab environment for understanding attack surfaces, designing secure solutions, and minimizing threats in Azure environments.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Hacking Cloud Native Applications Through Open Source
0
rewiews
Explore techniques for hacking Cloud Native applications using open-source tools, focusing on security vulnerabilities and mitigation strategies in containerized environments.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Rocking Kubernetes Security - Safeguarding Hundreds of Clusters in a Multi-Cloud Environment
0
rewiews
Safeguarding multi-cloud Kubernetes clusters: Learn to manage security in dynamic environments with on-demand provisioning using a single automation tool. Discover strategies for protecting against emerging threats.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Multi-Layer Hardening in Kubernetes - DevSecOps Practices and Tools
0
rewiews
Explore DevSecOps practices and tools for enhancing Kubernetes security, including multi-layer hardening techniques, industry standards, and a unified DevSecOps pipeline approach.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Get Your Security Priorities Straight - Identifying Workloads Under Real Threat with Context
0
rewiews
Discover a security prioritization system for Kubernetes workloads based on the MITRE framework, helping differentiate real threats from potential ones in various contexts.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
Linux Foundation
GitHub Actions Security Landscape
0
rewiews
Explore the security landscape of GitHub Actions, uncovering potential vulnerabilities and best practices for safeguarding your CI/CD pipelines.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Security Hardening for Databases Using Kubernetes Operators
0
rewiews
Explore database security in Kubernetes, learn mitigation strategies using operators, and discover essential security features for safe implementation.
Add to list
1
Lesons
33 minutes
On-Demand
Free-Video
Docker
Hardening Against Kubernetes Hacks - Live Demo
0
rewiews
Explore a real-world Kubernetes cluster takeover through remote code execution, and learn effective mitigation strategies to enhance your system's security against such threats.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
Linux Foundation
Kernel Self-Protection Project
0
rewiews
Explore Linux kernel security enhancements and self-protection mechanisms with Google engineer Kees Cook, focusing on proactive defenses against vulnerabilities and exploits.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Securing Kubernetes Runtime with KubeArmor
0
rewiews
Explore KubeArmor's capabilities for enhancing Kubernetes runtime security, providing robust protection against potential threats and vulnerabilities in cloud-native environments.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
The Aspen Institute
Managing Your Worst Digital Day - Building Resilience into Cyber-Physical Systems
0
rewiews
Explore strategies for building resilience in cyber-physical systems to manage and mitigate potential digital crises, enhancing overall security and preparedness in our interconnected world.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
DefCamp
Security on the Edge - Safeguarding Smart Homes
0
rewiews
Explore cutting-edge strategies for securing smart homes in this DefCamp 2023 presentation. Learn about emerging threats and innovative solutions to protect IoT devices and networks at the edge.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
NDC Conferences
Secure AI: Integrating OWASP Principles in Machine Learning Model Development
0
rewiews
Explore integrating OWASP principles into machine learning model development to address vulnerabilities, ensure data privacy, and safeguard AI systems from potential threats, ensuring robustness and confidentiality.
Add to list
1
Lesons
1 hour 1 minute
On-Demand
Free-Video
Linux Foundation
Insights from Zephyr Security Audit and Vulnerability Experiences
0
rewiews
Explore Zephyr's security evolution through vulnerability analysis and external audit findings. Gain practical insights to enhance embedded system security in your projects.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
BSidesLV
Catch Me, Yes We Can! - Pwning Social Engineers Using Natural Language Processing Techniques in Real-Time
0
rewiews
Explore cutting-edge NLP techniques to combat social engineering attacks in real-time, enhancing cybersecurity defenses and protecting against sophisticated manipulation tactics.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
BSidesLV
Weeding Out Living-off-the-land Attacks at Scale
0
rewiews
Explore strategies for detecting and mitigating living-off-the-land attacks at scale, enhancing cybersecurity defenses against sophisticated threats using legitimate system tools.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
DefCamp
A Cure for Botnets? Fighting Credential Stuffing at Adobe
0
rewiews
Explore Adobe's innovative approach to combating credential stuffing attacks and botnets, presented by Senior Computer Scientist Sorin Portase at DefCamp 2022.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
DefCamp
Device Tracking Threats in 5G Network
0
rewiews
Explore device tracking vulnerabilities in 5G networks, focusing on potential threats and security implications. Learn about cutting-edge research and insights from a cybersecurity expert.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
DefCamp
Threats and Lessons Learned During the Pandemic
0
rewiews
Explore key cybersecurity threats and insights from the pandemic era, focusing on emerging risks, adaptive strategies, and critical lessons for information security professionals.
Add to list
1
Lesons
1 hour 9 minutes
On-Demand
Free-Video
WEareTROOPERS
Smart TV Security
0
rewiews
Explore vulnerabilities in Smart TV security and learn about potential exploits and protection strategies for connected television systems.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
Security BSides San Francisco
In the Crosshairs - The Trend Towards Targeted Attacks
0
rewiews
Explore the rise of targeted cyber attacks, their effectiveness, and economic advantages. Learn about real-world examples and strategies to counter this growing threat.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
Security BSides San Francisco
Blue Team Fundamentals
0
rewiews
Explore effective strategies to counter common cyber attacks, including credential stuffing, phishing, and RCE attempts, with practical takeaways to enhance your organization's security posture.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
RSA Conference
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
0
rewiews
Explore cutting-edge cybersecurity threats and defense strategies with experts from the Internet Storm Center, focusing on emerging attack techniques and future preparedness.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
RSA Conference
20 Years In - Security’s Grand Challenges, Then and Now
0
rewiews
Explore the evolution of cybersecurity challenges over two decades, from intelligence and scale to implicit trust, password reliance, and cloud migration risks. Gain insights into mitigating advanced threats and future security landscapes.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Security BSides San Francisco
Biohacker - The Invisible Threat
0
rewiews
Exploring the emerging threat of biohacking: how human implants can compromise contactless technology and pose risks to physical and digital security systems.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
BSidesLV
Revenge on the Worms! Towards Deception Against Automated Adversaries
0
rewiews
Explore deception strategies against automated adversaries, focusing on finite state machines, multiple plans, and automated planners. Learn test setups, results, and future implications.
Add to list
12
Lesons
47 minutes
On-Demand
Free-Video
BruCON Security Conference
Cloud SIEM - What Happened and What's Next?
0
rewiews
Explore cloud SIEM's impact on cybersecurity, from real-time threat detection to AI-driven responses. Learn how this technology reshapes security teams, risk management, and the future of threat hunting.
Add to list
26
Lesons
56 minutes
On-Demand
Free-Video
RSA Conference
Mirai Nikki - The Future of DDoS
0
rewiews
Explore the Mirai Botnet's record-breaking DDoS attacks, the international investigation to stop them, and future DDoS threats. Learn IoT product risks and mitigation strategies.
Add to list
28
Lesons
48 minutes
On-Demand
Free-Video
IEEE
Bitcoin Over Tor Isn't a Good Idea
0
rewiews
Explores security vulnerabilities when using Bitcoin with Tor, demonstrating how attackers can compromise user privacy, control information flow, and potentially identify users despite anonymization attempts.
Add to list
7
Lesons
22 minutes
On-Demand
Free-Video
Black Hat
Catch Me, Yes We Can - Pwning Social Engineers Using Natural Language Processing Techniques in Real-Time
0
rewiews
Explore techniques to detect and prevent social engineering attacks across various communication channels using content-based analysis and natural language processing.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
Black Hat
Applied Self-Driving Car Security
0
rewiews
Explore self-driving car security with industry experts, covering technology, potential attacks, and defense strategies for this emerging field.
Add to list
37
Lesons
49 minutes
On-Demand
Free-Video
Black Hat
Devaluing Attack - Disincentivizing Threats Against The Next Billion Devices
0
rewiews
Explore economic strategies to reduce cyberattack incentives by lowering attacker value rather than raising costs. Examine defense approaches for both financial and state-sponsored threats to secure future devices.
Add to list
1
Lesons
1 hour 6 minutes
On-Demand
Free-Video
Black Hat
Resurrecting the Read Logs Permission on Samsung Devices
0
rewiews
Exploit allowing non-privileged apps to access sensitive log data on Samsung devices, bypassing Android's READ_LOGS permission restrictions. Reveals private information from notifications and system logs.
Add to list
20
Lesons
28 minutes
On-Demand
Free-Video
Shooting Phish in a Barrel and Other Fish Related Puns
0
rewiews
Learn effective phishing prevention techniques and explore humorous fish-related cybersecurity puns in this engaging presentation by Amanda Berlin.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
Security BSides London
Cloud Chatter - Defending Against Cloud C2
0
rewiews
Explore strategies for defending against cloud-based command and control (C2) attacks, enhancing your cybersecurity skills to protect cloud infrastructure from sophisticated threats.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
Security BSides San Francisco
Cameras, CACs & Clocks - A Story of Millions of Interrogated and Hacked xIoT Devices
0
rewiews
Demonstración en vivo de ciberataques a dispositivos IoT, con hallazgos de investigación de seguridad y técnicas de mitigación de amenazas para proteger contra actores maliciosos.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
IEEE
EmPoWeb - Empowering Web Applications with Browser Extensions
0
rewiews
Explores security risks of browser extension APIs, revealing how web apps can exploit them to bypass SOP, access sensitive user data, and perform privileged actions on users' devices.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
Black Hat
Dark Side of the DNS Force
0
rewiews
Explore the evolution of DNS-based attacks, including random subdomain techniques, and learn about detection and mitigation strategies for protecting against these sophisticated cyber threats.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
USENIX
How Safe Is Your Domain?
0
rewiews
Deep-dive into domain and DNS safety, exploring threat vectors, detection methods, and mitigation strategies for improved security and availability of infrastructure domains and subdomains.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
BSidesLV
Technical Tactics - Fear & Loathing in Building Management Systems
0
rewiews
Explore vulnerabilities in Building Management Systems and their potential impact on safety and security. Learn about risks, attack vectors, and mitigation strategies in this eye-opening presentation.
Add to list
1
Lesons
14 minutes
On-Demand
Free-Video
Black Hat
MITRE ATT&CK - The Play at Home Edition
0
rewiews
Learn how various cybersecurity teams can leverage MITRE ATT&CK framework to enhance threat tracking and protection strategies, with practical insights for immediate implementation.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
44CON Information Security Conference
Human Side-Channels and Their Implications for Security and Privacy
0
rewiews
Explore human side-channels in security and privacy, examining vulnerabilities and implications for information protection in the digital age.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
44CON Information Security Conference
Spyware, Ransomware and Worms - How to Prevent the Next SAP Tragedy
0
rewiews
Explore advanced cybersecurity threats and learn effective prevention strategies to safeguard SAP systems from spyware, ransomware, and worms.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
IEEE
Zeroconf Protocols and Their Numerous Man in the Middle Attacks
0
rewiews
Explore vulnerabilities in Zeroconf protocols, focusing on man-in-the-middle attacks. Learn about potential security risks and implications for network configurations.
Add to list
1
Lesons
15 minutes
On-Demand
Free-Video
Black Hat
Anatomy of Common
0
rewiews
Explore the intricacies of cybersecurity with Dominique Brezinski's insightful analysis of common vulnerabilities and threats in this thought-provoking keynote address.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
Black Hat
Proactive Defense Against Malicious Code
0
rewiews
Explore proactive strategies for defending against malicious code, enhancing cybersecurity measures and strengthening digital defenses.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
Black Hat
How to Fix a Broken Window
0
rewiews
Learn techniques to repair and secure compromised Windows systems, focusing on practical methods for system administrators to restore functionality and enhance security.
Add to list
1
Lesons
1 hour 20 minutes
On-Demand
Free-Video
Black Hat
Routing Protocol Attacks
0
rewiews
Explore vulnerabilities in routing protocols and potential attack vectors, enhancing network security knowledge and defense strategies.
Add to list
1
Lesons
1 hour 16 minutes
On-Demand
Free-Video
Black Hat
Lifting the Fog of War - Monitoring, Identifying and Mitigating MS-RPC Based Threats
0
rewiews
Explore techniques for monitoring and defending against RPC-based attacks, including traffic analysis, signature detection, and mitigation strategies for Windows environments.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Don't Punch My Junk
0
rewiews
Explore physical security vulnerabilities and learn effective techniques to protect against unauthorized access in this engaging presentation by security expert Deviant Ollam.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
Eliminating Data Security Threats and BYOS
0
rewiews
Explore strategies for mitigating data security risks and addressing BYOD challenges in modern organizations, with insights on effective threat elimination techniques.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
Advanced Threats and Lateral Movement
0
rewiews
Explore advanced threat techniques and lateral movement strategies in cybersecurity, enhancing your ability to detect and mitigate sophisticated attacks.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
PwnDrone - The Modern Airborne Cyber Threat
0
rewiews
Explore the emerging field of drone-based cyber threats and learn about potential vulnerabilities, attack vectors, and defensive strategies in modern airborne security.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Security Not Guaranteed - How to Hold Off the Bad Guys for Another Day
0
rewiews
Practical strategies and insights for enhancing cybersecurity defenses, delaying potential attacks, and staying ahead of evolving threats in the digital landscape.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
Today's Threat Landscape
0
rewiews
Explore the current cybersecurity threat landscape, analyzing emerging risks and effective defense strategies for organizations in this informative presentation by Dean Shroll.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
The Confidence of Things
0
rewiews
Explore the Internet of Things' security challenges and solutions, focusing on vulnerabilities, risks, and strategies for protecting connected devices and networks.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
Ever Present Persistence - Established Footholds Seen in the Wild
0
rewiews
Explore real-world examples of persistent footholds in cybersecurity, examining established techniques and their impact on system vulnerabilities and defense strategies.
Add to list
1
Lesons
56 minutes
On-Demand
Free-Video
Shooting Phish in a Barrel
0
rewiews
Learn effective techniques to identify and combat phishing attacks, enhancing your cybersecurity skills and protecting your organization from email-based threats.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
F-IN Trojans! An Interactive Impromptu Talk on Our Most Dangerous Threat
0
rewiews
Interactive discussion exploring Trojans as a critical cybersecurity threat, examining their mechanisms, impacts, and defensive strategies for protecting against these insidious malware attacks.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
The Enemy Within - Detecting and Mitigating Insider Threats
0
rewiews
Explore strategies for identifying and countering insider threats in organizations, focusing on detection methods and mitigation techniques to enhance cybersecurity.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Deploying Microsoft Advanced Threat Analytics in the Real World
0
rewiews
Learn to deploy Microsoft Advanced Threat Analytics effectively, exploring real-world implementation strategies and best practices for enhanced network security.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
What Infosec in Oil and Gas Can Teach Us About Infosec in Healthcare
0
rewiews
Explore cybersecurity lessons from oil & gas industry applicable to healthcare, enhancing protection of sensitive medical data and critical infrastructure.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
LOLBins - Nothing to LOL About
0
rewiews
Explore the world of LOLBins (Living Off the Land Binaries) and their potential security risks in this eye-opening presentation by Oddvar Moe at Derbycon 2018.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
load more...