Parent directory/ | - | - |
An Academic Exercise in Threat Intelligence - Jesse Bowling.eng.srt | 111.2 KiB | 2019 Oct 01 01:11 |
An Academic Exercise in Threat Intelligence - Jesse Bowling.mp4 | 137.2 MiB | 2021 May 02 06:51 |
Combined Tracks - Day 1 Recap - Sounil Yu, Ryan Moon..eng.srt | 46.5 KiB | 2019 Oct 01 01:11 |
Combined Tracks - Day 1 Recap - Sounil Yu, Ryan Moon..mp4 | 53.2 MiB | 2021 May 02 06:51 |
Continuous and Automated Defense - Sharma and Leres.mp4 | 68.0 MiB | 2021 May 02 06:51 |
Correlating Observed Indicators with MISP - Alan Czarnecki.eng.srt | 51.9 KiB | 2019 Oct 01 01:11 |
Correlating Observed Indicators with MISP - Alan Czarnecki.mp4 | 58.3 MiB | 2021 May 02 06:51 |
Creating Authoritative Nameserver Reputation - John Bambenek.eng.srt | 60.3 KiB | 2019 Oct 01 01:11 |
Creating Authoritative Nameserver Reputation - John Bambenek.mp4 | 66.8 MiB | 2021 May 02 06:51 |
DNS IMAP Prepositioning Attacks - Bill Woodcock.eng.srt | 85.2 KiB | 2019 Oct 01 01:11 |
DNS IMAP Prepositioning Attacks - Bill Woodcock.mp4 | 104.3 MiB | 2021 May 02 06:51 |
Effective Threat Hunting w Open Source Tools - Eric Capuano.mp4 | 98.7 MiB | 2021 May 02 06:51 |
Forecasting, Browsers, and In The Wild Exploitation - Ryan McGeehan.mp4 | 83.3 MiB | 2021 May 02 06:51 |
Hash SSH Client Server Profiling - Ben Reardon.mp4 | 59.0 MiB | 2021 May 02 06:51 |
Just Enough Asset Inventory -.eng.srt | 30.4 KiB | 2019 Oct 01 01:11 |
Just Enough Asset Inventory -.mp4 | 35.2 MiB | 2021 May 02 06:51 |
Monitoring our Minimum Viable Security Configuration - Guillaume Ross.eng.srt | 68.4 KiB | 2019 Oct 01 01:11 |
Monitoring our Minimum Viable Security Configuration - Guillaume Ross.mp4 | 59.2 MiB | 2021 May 02 06:51 |
NIDS in a Portable Darta Center -.eng.srt | 20.7 KiB | 2019 Oct 01 01:11 |
NIDS in a Portable Darta Center -.mp4 | 26.1 MiB | 2021 May 02 06:51 |
Nearly Real -Time Log Aggregation Using Lamda and Kinesis - Adam Murphy.eng.srt | 55.4 KiB | 2019 Oct 01 01:11 |
Nearly Real -Time Log Aggregation Using Lamda and Kinesis - Adam Murphy.mp4 | 64.3 MiB | 2021 May 02 06:51 |
Operationalizing Cyber Threat Intelligence - Xena Olsen.mp4 | 49.5 MiB | 2021 May 02 06:51 |
Philosophy Track - Deploying the NIS Directive - Janusz Urbanowicz.mp4 | 73.1 MiB | 2021 May 02 06:51 |
Phoenix Continued - Greg Olmstead, Justin Borland.eng.srt | 89.8 KiB | 2019 Oct 01 01:11 |
Phoenix Continued - Greg Olmstead, Justin Borland.mp4 | 94.6 MiB | 2021 May 02 06:51 |
Pose a Threat - Rob Ragan and Oscar Salazar.eng.srt | 97.3 KiB | 2019 Oct 01 01:11 |
Pose a Threat - Rob Ragan and Oscar Salazar.mp4 | 98.1 MiB | 2021 May 02 06:51 |
Practical Guide to Securing Kubernetes - Dan Hubbard and James Condon.mp4 | 158.4 MiB | 2021 May 02 06:51 |
Profiling VIP Accounts Access Patterns - Rod Soto, Joseph Zadeh, Xioadan Li.mp4 | 67.6 MiB | 2021 May 02 06:51 |
Sprinting up the Pyramid of Pain - Eric Loui.mp4 | 61.7 MiB | 2021 May 02 06:51 |
State of the Art of DNS Security - Bill Woodcock.eng.srt | 63.5 KiB | 2019 Oct 01 01:11 |
State of the Art of DNS Security - Bill Woodcock.mp4 | 79.0 MiB | 2021 May 02 06:51 |
The NEW Cloud Ecosystem - Jody Forness.mp4 | 65.9 MiB | 2021 May 02 06:51 |
The art of the windows kernel fuzz - Guangming Liu.mp4 | 57.1 MiB | 2021 May 02 06:51 |
Use a malware to catch a malware - Arun Lakhotia.mp4 | 106.0 MiB | 2021 May 02 06:51 |
Using GreyNoise to Quantify Response Time - Andrew Morris.mp4 | 94.5 MiB | 2021 May 02 06:51 |
Welcome to ACoD 2019.mp4 | 64.2 MiB | 2021 May 02 06:51 |