From Vulnerability to CTF
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore the journey from identifying vulnerabilities to creating Capture The Flag (CTF) challenges in this 52-minute conference talk presented by Ron Bowes at BSidesLV 2022. Gain insights into the process of transforming security weaknesses into engaging and educational CTF scenarios. Learn techniques for designing effective challenges that test and enhance cybersecurity skills. Discover how to bridge the gap between vulnerability research and practical application in a competitive environment. Ideal for security professionals, CTF enthusiasts, and those interested in improving their ability to create and solve security puzzles.
Syllabus
GF - From Vulnerability to CTF
Taught by
BSidesLV
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX