YoVDO

Defensive Security Courses

Bridging the Gap Between Red and Blue
YouTube
Using Cryptanalysis to Speed Up Password Cracking
YouTube
Moving the Industry Forward - The Purple Team Approach
YouTube
Popping the Penguin - An Introduction to the Principles of Linux Persistence
YouTube
PHP Filter Chains - How to Use Them
Cooper via YouTube
Design for Security
Udacity
Abusing RWX-S Binaries for Post-Exploitation
Security BSides London via YouTube
Brewing the Kubernetes Storm Center - Open Source Threat Intelligence for Cloud Native Ecosystems
CNCF [Cloud Native Computing Foundation] via YouTube
Specialized Exploits: Windows and Linux Shellcode
Pluralsight
How Large Language Models Are Reshaping the Cybersecurity Landscape
RSA Conference via YouTube
< Prev Page 5 Next >