Vulnerability Analysis Courses
BSidesLV via YouTube The Evolution of Threat Models for Secure Communication Products
GOTO Conferences via YouTube A Secure Journey on Kubernetes
Devoxx via YouTube Common Vulnerabilities You Wish Your Java App Didn't Have
Devoxx via YouTube An Experience Report on Extracting and Viewing Memory Events via Wireshark
USENIX via YouTube Breaking the Black-Box Security Coprocessor in the Nintendo Switch - A Story of Vulnerability After Vulnerability
media.ccc.de via YouTube Vulnerability Management for CySA+
Pluralsight Specialized Hunts: Threat Hunting within Mail Servers
Pluralsight Tooling Up for Kerberos
44CON Information Security Conference via YouTube Hide and Seek with Spectres - Efficient Discovery of Speculative Vulnerabilities with Random Testing
IEEE via YouTube