Personal Information
Organization / Workplace
Bengaluru Area, India India
Occupation
Security Engineer
Industry
Technology / Software / Internet
Tags
hacking
linux
coinmining
cryptocurrency
malware
botnet
cryptography
key exchange
rsa
server
client
https
authentication
integrity
confidentiality
ssl
See more
- Presentations
- Documents
- Infographics
A comprehensive guide to writing great research paper
Vasuki Soni
•
4 years ago
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Michael Gough
•
4 years ago
CNIT 141: 11. Diffie-Hellman
Sam Bowne
•
5 years ago
CNIT 141: 13. TLS
Sam Bowne
•
4 years ago
Threat Modelling
n|u - The Open Security Community
•
10 years ago
XConf Unplugged: Secure Design with Threat Modelling
Thoughtworks
•
5 years ago
Real World Application Threat Modelling By Example
NCC Group
•
10 years ago
Threat Hunting with Data Science
Austin Taylor
•
6 years ago
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
Sam Bowne
•
7 years ago
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
Sam Bowne
•
7 years ago
CNIT 121: 12 Investigating Windows Systems (Part 3)
Sam Bowne
•
7 years ago
CNIT 121: 13 Investigating Mac OS X Systems
Sam Bowne
•
7 years ago
CNIT 121: 14 Investigating Applications
Sam Bowne
•
7 years ago
CNIT 121: 9 Network Evidence
Sam Bowne
•
7 years ago
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
Sam Bowne
•
7 years ago
CNIT 121: 11 Analysis Methodology
Sam Bowne
•
7 years ago
CNIT 121: 16 Report Writing
Sam Bowne
•
7 years ago
CNIT 121: 10 Enterprise Services
Sam Bowne
•
7 years ago
CNIT 121: 17 Remediation Introduction (Part 1)
Sam Bowne
•
7 years ago
CNIT 127: 4: Format string bugs
Sam Bowne
•
5 years ago