Vulnerability Assessment Courses
Udemy Armitage and Metasploit for Penetration Testing - From Information Collecting to Post Exploitation
CAE in Cybersecurity Community via YouTube Exploiting XPC in AntiVirus Software
nullcon via YouTube Insecurity of Smart Energy Meters - A Hardware Security Perspective
nullcon via YouTube Security Compliance in the ICS Environment
nullcon via YouTube Silicon - Security's New Layer
nullcon via YouTube Attacking and Defending Full Disk Encryption
YouTube Rawr - Rapid Assessment of Web Resources
YouTube A Look at TR-06FAIL and Other CPE Configuration Disasters
Security BSides London via YouTube Introduction to Metasploit - Network Exploitation Lab
Bill Buchanan OBE via YouTube