YoVDO

From Vulnerability to CTF

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Ethical Hacking Courses

Course Description

Overview

Explore the journey from identifying vulnerabilities to creating Capture The Flag (CTF) challenges in this 52-minute conference talk presented by Ron Bowes at BSidesLV 2022. Gain insights into the process of transforming security weaknesses into engaging and educational CTF scenarios. Learn techniques for designing effective challenges that test and enhance cybersecurity skills. Discover how to bridge the gap between vulnerability research and practical application in a competitive environment. Ideal for security professionals, CTF enthusiasts, and those interested in improving their ability to create and solve security puzzles.

Syllabus

GF - From Vulnerability to CTF


Taught by

BSidesLV

Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX