YoVDO

Twisting Layer 2 Protocols

Offered By: DefCamp via YouTube

Tags

DefCamp Courses Network Security Courses Vulnerability Assessment Courses

Course Description

Overview

Explore the intricacies of Layer 2 protocol manipulation in this 28-minute conference talk from DefCamp 2017. Dive into advanced hacking techniques and information security practices focused on twisting Layer 2 protocols. Gain insights from leading security specialists and researchers in the field of network security. Learn about potential vulnerabilities and attack vectors at the data link layer, and understand how to better protect your networks from these threats. Access additional resources, including slides and presentations, through the DefCamp archive for a comprehensive learning experience on this critical aspect of cybersecurity.

Syllabus

DefCamp 2017 - Twisting Layer 2 Protocols


Taught by

DefCamp

Related Courses

The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022
DefCamp via YouTube
The Anatomy of Wiper Malware - DefCamp - 2022
DefCamp via YouTube
Internet Balkanization in an Era of Military Conflict - Dan Demeter - DefCamp - 2022
DefCamp via YouTube
How We Analyzed and Built an Exploit PoC for CVE-2022-24086, a Magento RCE - Catalin Filip - DefCamp - 2022
DefCamp via YouTube
To Log, or Not to Log! That Is the Question - DefCamp - 2022
DefCamp via YouTube