Attack Surface Analysis Courses
Black Hat via YouTube Attack Surface and Security Implications of eSIM Technology
BruCON Security Conference via YouTube Hacking Identity - A Pen Tester's Guide to IAM - Jerod Brennen
YouTube Comparing Risks: Why Asset Management Is Broken and How to Fix It
YouTube Cloud Native Application Threat Modeling and Adversary Emulation - Techniques and Tools
CNCF [Cloud Native Computing Foundation] via YouTube Attacks are Forwarded - Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding
USENIX via YouTube Securing Software Supply Chain - Problems, Solutions, and AI/ML Challenges
RSA Conference via YouTube Embedded Threats: A Deep Dive into the Attack Surface and Security Implications of eSIM Technology
OffensiveCon via YouTube