Vulnerability Assessment Courses
WEareTROOPERS via YouTube Risks in Hosted SAP Environments
WEareTROOPERS via YouTube SAP's Network Protocols Revisited
WEareTROOPERS via YouTube Vulnerabilities in Custom SAP ABAP Code
WEareTROOPERS via YouTube Smart TV Security
WEareTROOPERS via YouTube Connected Vehicle Security
DefCamp via YouTube Security Pitfalls in Scriptable Infrastructure Pipelines
DefCamp via YouTube Efficient Defenses Against Adversarial Examples for Deep Neural Networks
DefCamp via YouTube Twisting Layer 2 Protocols
DefCamp via YouTube Infecting Internet of Things
DefCamp via YouTube