Privilege Escalation Courses
Cooper via YouTube Exploiting and Attacking Seismological Networks Remotely
Cooper via YouTube Hack My Mis-Configured Kubernetes: Security Vulnerabilities and Best Practices
Linux Foundation via YouTube Integrity Protection and Access Control - Who Do You Trust?
Linux Foundation via YouTube Hardening Docker Daemon with Rootless Mode
Docker via YouTube An Attacker's View of Serverless and GraphQL Apps
OWASP Foundation via YouTube Automatic Detection of Inadequate Authorization Checks in Web Applications
OWASP Foundation via YouTube Cluster Grey Zone - Risks in Managed Cluster Middleware
CNCF [Cloud Native Computing Foundation] via YouTube Detecting Crypto-Jacking in Kubernetes Workloads
CNCF [Cloud Native Computing Foundation] via YouTube Attacking Argo CD with Argo CD and Defending Against Privilege Escalation
CNCF [Cloud Native Computing Foundation] via YouTube