YoVDO

Fact Based Post Exploitation - Office365 Edition

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Cybersecurity Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive IT security conference talk on fact-based post-exploitation techniques focusing on Office365. Delivered by Melvin Langvik at TROOPERS23 in Heidelberg, Germany, this 26-minute presentation delves into advanced cybersecurity strategies. Gain insights into the latest methods for securing Office365 environments and learn about potential vulnerabilities that attackers may exploit. Discover practical approaches to enhance your organization's defense mechanisms against sophisticated threats. Access additional resources and impressions from the conference through provided social media links and the official ERNW website.

Syllabus

TROOPERS23: Fact Based Post Exploitation - Office365 Edition


Taught by

WEareTROOPERS

Related Courses

Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor Networks
WEareTROOPERS via YouTube
Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube
Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube
A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube
Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube