Threat Hunting Courses
Black Hat via YouTube Fantastic Red-Team Attacks and How to Find Them
Black Hat via YouTube Running a Security Operations Center - Challenges, Solutions and Key Learnings
Black Hat via YouTube A Process is No One - Hunting for Token Manipulation
Black Hat via YouTube Hunt and Gather - Developing Effective Threat Hunting Techniques
RSA Conference via YouTube Threat Hunting - Demystified
RSA Conference via YouTube SOC Automation - Enterprise Blueprinting and Hunting Using Open-Source Tools
RSA Conference via YouTube Exploitation With Shell Reverse & Infection With PowerShell
Hack In The Box Security Conference via YouTube Detection and Efficiency Testing of Endpoint Security Sensors
Hack In The Box Security Conference via YouTube Common Flaws in ICS Network Protocols
Hack In The Box Security Conference via YouTube