Network Security Courses
IEEE via YouTube Zeroconf Protocols and Their Numerous Man in the Middle Attacks
IEEE via YouTube On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols
IEEE via YouTube A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer
IEEE via YouTube Security of the J-PAKE Password-Authenticated Key Exchange Protocol
IEEE via YouTube Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem
IEEE via YouTube Bug Bounty Seminar with Verizon Media's Paranoids
NahamSec via YouTube Recon Sunday with Top HackerOne Paid Hackers - Dawgyg, Mayonaise, and cdl
NahamSec via YouTube Getting Started in InfoSec - Expert Panel Discussion
NahamSec via YouTube Monitoring Endpoints, Binary Exploitation, and Continuous Recon - Security Discussion
NahamSec via YouTube