Parent directory/ | - | - |
Moving forward in cybersecurity , with Vivian Band, Juan Spinel, Elizabeth Momola and James Bore.mp4 | 91.7 MiB | 2021 May 18 02:41 |
A rookie journey into OSINT How to get started (on a budget) - Juan Giarrizzo.mp4 | 72.6 MiB | 2021 May 18 02:41 |
Parting ways with Purdue The Effect of Industry 4.0 on ICS Security Architectures- Michael McGinley.mp4 | 72.1 MiB | 2021 May 18 02:41 |
Smart phone to medical device in five (not so) easy steps - Josephine Windsor-Lewis.mp4 | 68.4 MiB | 2021 May 18 02:41 |
A.I. - The Inevitable Threat - Luna Belfort & Alvaro Leno.mp4 | 66.6 MiB | 2021 May 18 02:41 |
All Your Modules Are Belong To Us - An Introduction to Python Module Hijacking - Sam Ferguson.mp4 | 63.5 MiB | 2021 May 18 02:41 |
Systematic OSINT and the OSINTFUNdamentals - BOsintBlanc.mp4 | 62.6 MiB | 2021 May 18 02:41 |
Cyber-Investigation OSINT of Phishing Emails - Patrick Rus.mp4 | 61.6 MiB | 2021 May 18 02:41 |
0-Days & Nat 20's - CVSSv3 Through the Lens of Dungeons & Dragons - Alex Hoffman - RedWedgeX.mp4 | 60.2 MiB | 2021 May 18 02:41 |
Capabilities That one vulnerability vector you don't realize exists - 3t3rn4l P4r4d0x.mp4 | 57.4 MiB | 2021 May 18 02:41 |
Preparing for the OSCP Without Any PenTesting Experience - Drew Jones.mp4 | 55.7 MiB | 2021 May 18 02:41 |
What to do About Motivated Intruders - Luke Pajor.mp4 | 55.7 MiB | 2021 May 18 02:41 |
Skype A hidden OSINT goldmine - WhiteHatInspector.mp4 | 55.0 MiB | 2021 May 18 02:41 |
IPv6. Does size matter - Anastasiia Mytrofanovska.mp4 | 53.3 MiB | 2021 May 18 02:41 |
Honey, I shrunk the disks - A beginner's guide to data recovery - Abby Simmons.mp4 | 53.0 MiB | 2021 May 18 02:41 |
Common Tools & Techniques Used By Threat Actors and Malware - Nasreddine Bencherchali.mp4 | 52.8 MiB | 2021 May 18 02:41 |
What it takes to be an Ethical Hacker - A journey into a technical role - Chloe Seaton.mp4 | 52.3 MiB | 2021 May 18 02:41 |
Making sense of data with Linux - ArgandoV.mp4 | 52.2 MiB | 2021 May 18 02:41 |
The Zero Trust Model - Sarthak Taneja - S4t4n1212.mp4 | 47.2 MiB | 2021 May 18 02:41 |
Introduction to Social Engineering - Deeksha Shekar.mp4 | 45.7 MiB | 2021 May 18 02:41 |
BizOps in motion - Becca I..mp4 | 45.2 MiB | 2021 May 18 02:41 |
Building an effective Red Team - Tehreem Fahim.mp4 | 41.9 MiB | 2021 May 18 02:41 |
Application Logic Vulnerabilities and My Journey - Suryansh M. - 0xd4rk.mp4 | 32.0 MiB | 2021 May 18 02:41 |
Closing Remarks - D_OVERCON 2021.mp4 | 14.4 MiB | 2021 May 18 02:41 |
Smart phone to medical device in five (not so) easy steps - Josephine Windsor-Lewis.eng.srt | 68.2 KiB | 2021 Apr 29 00:13 |
Parting ways with Purdue The Effect of Industry 4.0 on ICS Security Architectures- Michael McGinley.eng.srt | 63.9 KiB | 2021 Apr 29 00:17 |
Moving forward in cybersecurity , with Vivian Band, Juan Spinel, Elizabeth Momola and James Bore.eng.srt | 62.2 KiB | 2021 Apr 29 00:22 |
Preparing for the OSCP Without Any PenTesting Experience - Drew Jones.eng.srt | 62.2 KiB | 2021 Apr 29 00:13 |
A rookie journey into OSINT How to get started (on a budget) - Juan Giarrizzo.eng.srt | 61.6 KiB | 2021 Apr 29 00:13 |
All Your Modules Are Belong To Us - An Introduction to Python Module Hijacking - Sam Ferguson.eng.srt | 59.0 KiB | 2021 Apr 29 00:13 |
Systematic OSINT and the OSINTFUNdamentals - BOsintBlanc.eng.srt | 56.9 KiB | 2021 Apr 29 00:16 |
0-Days & Nat 20's - CVSSv3 Through the Lens of Dungeons & Dragons - Alex Hoffman - RedWedgeX.eng.srt | 56.8 KiB | 2021 Apr 29 00:22 |
A.I. - The Inevitable Threat - Luna Belfort & Alvaro Leno.eng.srt | 54.2 KiB | 2021 Apr 29 00:13 |
Capabilities That one vulnerability vector you don't realize exists - 3t3rn4l P4r4d0x.eng.srt | 53.9 KiB | 2021 Apr 29 00:13 |
What it takes to be an Ethical Hacker - A journey into a technical role - Chloe Seaton.eng.srt | 49.2 KiB | 2021 Apr 29 00:15 |
The Zero Trust Model - Sarthak Taneja - S4t4n1212.eng.srt | 44.5 KiB | 2021 Apr 29 00:24 |
What to do About Motivated Intruders - Luke Pajor.eng.srt | 44.2 KiB | 2021 Apr 29 00:23 |
Honey, I shrunk the disks - A beginner's guide to data recovery - Abby Simmons.eng.srt | 43.5 KiB | 2021 Apr 29 00:13 |
Common Tools & Techniques Used By Threat Actors and Malware - Nasreddine Bencherchali.eng.srt | 41.8 KiB | 2021 Apr 29 00:16 |
Making sense of data with Linux - ArgandoV.eng.srt | 40.9 KiB | 2021 Apr 29 00:25 |
IPv6. Does size matter - Anastasiia Mytrofanovska.eng.srt | 39.4 KiB | 2021 Apr 29 00:19 |
Introduction to Social Engineering - Deeksha Shekar.eng.srt | 39.4 KiB | 2021 Apr 29 00:13 |
BizOps in motion - Becca I..eng.srt | 36.0 KiB | 2021 Apr 29 00:17 |
Application Logic Vulnerabilities and My Journey - Suryansh M. - 0xd4rk.eng.srt | 31.2 KiB | 2021 Apr 29 00:13 |
Closing Remarks - D_OVERCON 2021.eng.srt | 9.4 KiB | 2021 Apr 29 00:26 |