YoVDO

Credential Theft Courses

The Evolution of the Software Supply Chain Attack
Pluralsight
Early Detection through Deception
YouTube
How to Hunt for Lateral Movement on Your Network
YouTube
TeamTNT - Explosive Cryptomining
Black Hat via YouTube
Certified Pre-Owned - Abusing Active Directory Certificate Services
Black Hat via YouTube
Post-Exploitation of Cloud Service Providers
RSA Conference via YouTube
Critical Infrastructure Network Attacks - Code Red, Alert Network Operators
RSA Conference via YouTube
Cloak and Dagger - From Two Permissions to Complete Control of the UI Feedback Loop
IEEE via YouTube
Beyond Takeover - Attacker's In. Now What?
OWASP Foundation via YouTube
Introducing Pi-Key - Hacking Just Like the Movies
Security BSides London via YouTube
Page 1 Next >