Operating System Security Courses
USENIX via YouTube Mobile Application Security Threats Through the Eyes of the Attacker
Bugcrowd via YouTube Ghost in the Wireless - iwlwifi Edition
Black Hat via YouTube Quantifying Risk in Consumer Software at Scale - Consumer Reports' Digital Standard
Black Hat via YouTube Dangerous Hare - Hanging Attribute References Hazards Due to Vendor Customization
Black Hat via YouTube Ret2dir - Deconstructing Kernel Isolation
Black Hat via YouTube Exposing Bootkits with BIOS Emulation
Black Hat via YouTube Safer Apps from Docker Security Building Blocks
Devoxx via YouTube OS Security
Illinois Institute of Technology via Coursera Enforcing Runtime Integrity with Maat
Linux Foundation via YouTube