Security Vulnerabilities Courses
44CON Information Security Conference via YouTube Toppling Domino - Testing Security in a Lotus Notes Environment
44CON Information Security Conference via YouTube Climbing the Production Mountain - Practical CI/CD Attacks Using CI/CD Goat
BSidesLV via YouTube Knock Knock. Who's There? Betta! Betta Who? Betta Check Your Access Control Edge Devices
BSidesLV via YouTube Solving for Somebody Else's Problem - Hacking Devs for Better Security
BSidesLV via YouTube You're Just Complaining Because You're Guilty - A Guide for Citizens and Hackers to Adversarial Testing of Software Used in the Criminal Justice System
BSidesLV via YouTube Ingress Egress - The Emerging Threats Posed by Augmented Reality Gaming
BSidesLV via YouTube Technical Tactics - Fear & Loathing in Building Management Systems
BSidesLV via YouTube Embracing Risk Responsibly - Moving Beyond Inflexible SLAs and Exception Hell by Treating Security Vulnerabilities and Risk Like Actual Debt
Security BSides San Francisco via YouTube Abusability Testing: Considering the Ways Your Technology Might Be Used
USENIX Enigma Conference via YouTube