Cybersecurity Courses
YouTube Hunting for Memory Resident Malware
YouTube Windows Rootkit Development - Python Prototyping to Kernel Level C2
YouTube Rapid Incident Response with PowerShell
YouTube Hidden Treasure - Detecting Intrusions with ETW
YouTube Retail Store POS Penetration Testing
YouTube An ACE in the Hole - Stealthy Host Persistence via Security Descriptors
YouTube CredDefense Toolkit
YouTube Introducing DeepBlueCLI v2 Now Available in PowerShell and Python
YouTube Purpose Driven Hunt - What Do I Do With All This Data
YouTube