Threat Detection Courses
Kaspersky via YouTube Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts
IEEE via YouTube A Stealthier Partitioning Attack Against Bitcoin Peer-to-Peer Network
IEEE via YouTube Grapl - A Graph Platform for Detection and Response
BSidesLV via YouTube Red Team Revenge - Attacking Microsoft ATA
44CON Information Security Conference via YouTube Detection Engineering Methodologies
LASCON via YouTube Once Upon a Time in the West - A Story on DNS Attacks
OWASP Foundation via YouTube The Importance of the Cloud and the Developers Communities in Fighting Cyber Crime
OWASP Foundation via YouTube Defeating APT10 Compiler-level Obfuscations
Cooper via YouTube DeTT&CT - Mapping Your Blue Team to MITRE ATT&CK
Cooper via YouTube