Encryption Courses
Udacity DBREACH - Database Reconnaissance and Exfiltration via Adaptive Compression Heuristics
Black Hat via YouTube Applied Self-Driving Car Security
Black Hat via YouTube Black Box is Dead - Long Live Black Box!
Black Hat via YouTube AES Wireless Keyboard - Template Attack for Eavesdropping
Black Hat via YouTube Automated Testing of Crypto Software Using Differential Fuzzing
Black Hat via YouTube Unpacking the Packed Unpacker - Reverse Engineering an Android Anti-Analysis Native Library
Black Hat via YouTube Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies
Black Hat via YouTube Attacking Encrypted USB Keys the Hard - ware Way
Black Hat via YouTube Decentralized Malware on the Blockchain
Black Hat via YouTube