DerbyCon Courses
YouTube Hack the Hustle - Eve Adams
YouTube The Malware Management Framework - A Process You Can Use To Find Advanced Malware
YouTube The Internet of Things - Vulns, Botnets, and Detection
YouTube SQL Injection with SQLMap
YouTube Finding the Signal in the Noise - Quantifying Advanced Malware
YouTube Antivirus Evasion Through Antigenic Variation - Why The Blacklisting Approach to AV
YouTube Attacking the Next Generation Air Traffic Control System - Hackers, Liquor, and Commerce
YouTube Applying the 32 Zombieland Rules to IT Security - Larry Pesce
YouTube Android 40 Ice Cream - Sudo Make Me A Sandwich
YouTube