I Can Be Apple and So Can You
Offered By: YouTube
Course Description
Overview
Explore a thought-provoking conference talk that delves into the intricacies of digital identity and security in the tech world. Learn how individuals can potentially impersonate major tech companies like Apple, uncovering the vulnerabilities and implications of such actions. Gain insights into the methods and techniques used to manipulate digital signatures and certificates, and understand the broader implications for cybersecurity and online trust. Discover the importance of robust security measures and the need for constant vigilance in the ever-evolving landscape of digital authentication.
Syllabus
Track 2 00 I Can Be Apple and So Can You Josh Pitts
Related Courses
Assembly Language Adventures (1): Counting with two digitsUdemy Assembly Language Adventures: Complete Course
Udemy OWASP Top 10 - A10:2021 - Server-Side Request Forgery (SSRF)
Cybrary Analyzing Wi-Fi Wardriving Data with Google Colab
SecurityFWD via YouTube Firing Rounds at the Analysis Shooting Gallery - CSAW'16 Security Workshop
New York University (NYU) via YouTube