Vulnerability Analysis Courses
IEEE via YouTube Attacking an Open Source U2F Device in 30 Minutes or Less
media.ccc.de via YouTube Hunt for Red October
Recon Conference via YouTube Breaking Managed Data Services in the Cloud
Black Hat via YouTube Grand Theft House - RF Lock Pick Tool to Unlock Smart Door Lock
Black Hat via YouTube The Internet of Pwned Things
NDC Conferences via YouTube The Internet of Pwned Things
NDC Conferences via YouTube Security Holes in Git
NDC Conferences via YouTube Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming
Cooper via YouTube Security Analysis of Industrial Serial Device Servers
Cooper via YouTube