Vulnerability Assessment Courses
BruCON Security Conference via YouTube A Sound Mind in a Vulnerable Body - Practical Hardware Attacks on Deep Learning
USENIX Enigma Conference via YouTube How to Predict Which Vulnerabilities Will Be Exploited - Tudor Dumitras - USENIX Enigma Conference - 2019
USENIX Enigma Conference via YouTube Security for Vulnerable Populations - On the Interplay of - Daniela Oliveira - USENIX Enigma - 2017
USENIX Enigma Conference via YouTube Vulnerabilities, Risks and Threats - Actionable Intelligence for Robust Cyber Defence
Infosecurity Europe via YouTube Implementing Continuous Offense to Measure and Monitor Cybersecurity Defenses - DefCamp - 2019
DefCamp via YouTube You Fail in SE If You Make Those Mistakes - DefCamp - 2017
DefCamp via YouTube Web Application Firewall Bypassing - DefCamp - 2016
DefCamp via YouTube Open Source CVE Monitoring and Management - Cutting Through the Vulnerability Storm
Linux Foundation via YouTube Secure Your Multicloud Workloads with Comprehensive Contextual Cloud Security Posture
Microsoft via YouTube