Vulnerability Assessment Courses
Black Hat via YouTube Breaking the Laws of Robotics - Attacking Industrial Robots
Black Hat via YouTube Measuring Adversary Costs to Exploit Commercial Software
Black Hat via YouTube Secure Penetration Testing Operations - Demonstrated Weaknesses in Learning Material and Tools
Black Hat via YouTube Attacking BYOD Enterprise Mobile Security Solutions
Black Hat via YouTube Attacking SDN Infrastructure - Are We Ready for the Next-Gen Networking?
Black Hat via YouTube Relaying EMV Contactless Transactions Using Off-The-Shelf Android Devices
Black Hat via YouTube I'm Not a Human - Breaking the Google reCAPTCHA
Black Hat via YouTube The Kitchen's Finally Burned Down - DLP Security Bakeoff
Black Hat via YouTube VOIP Wars - Destroying Jar Jar Lync
Black Hat via YouTube