Vulnerability Assessment Courses
IEEE via YouTube MitM Attack by Name Collision - Cause Analysis and Vulnerability Assessment in the New gTLD Era
IEEE via YouTube Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms
USENIX via YouTube Metastable Failures in the Wild
USENIX via YouTube Cisco SMB Products - Critical Vulnerabilities - 0-Day Release
0xdade via YouTube Zoom 0-Day - How Not to Handle a Vulnerability Report
0xdade via YouTube How I Hacked a Bank Using Pen & Paper
BSidesLV via YouTube No IOUs with IOT
BSidesLV via YouTube Backslash Powered Scanning - Implementing Human Intuition
NorthSec via YouTube It Was Broken When It Got Here - Security in Your Software Procurement Process
LASCON via YouTube