- Presentations
- Documents
- Infographics
Troopers 19 - I am AD FS and So Can You
Douglas Bienstock
•
5 years ago
The Future of ICS Security Products
Digital Bond
•
3 years ago
How to Increase ICS Cybersecurity Return on Investment (ROI)
Dragos, Inc.
•
3 years ago
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
•
5 years ago
One Technique, Two Techniques, Red Technique, Blue Technique
Daniel Weiss
•
5 years ago
Cyber Threat hunting workshop
Arpan Raval
•
4 years ago
Modern Evasion Techniques
Jason Lang
•
6 years ago
Red Team Methodology - A Naked Look
Jason Lang
•
4 years ago
Enterprise Forensics 101
Mona Arkhipova
•
7 years ago
Building a Cyber Security Operations Center for SCADA/ICS Environments
Shah Sheikh
•
7 years ago
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector 2016
Chris Gates
•
7 years ago
Power sploit persistence walkthrough
Haydn Johnson
•
8 years ago
Adversarial Post-Ex: Lessons From The Pros
Justin Warner
•
7 years ago
Security Operation Center - Design & Build
Sameer Paradia
•
9 years ago
Security Onion Conference - 2015
DefensiveDepth
•
8 years ago
Outlook and Exchange for the bad guys
Nick Landers
•
7 years ago
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
Nikhil Mittal
•
7 years ago
RSAC 2016: How to Get into ICS Security
Chris Sistrunk
•
8 years ago
Blackhat USA 2016 - What's the DFIRence for ICS?
Chris Sistrunk
•
7 years ago
How to Setup A Pen test Lab and How to Play CTF
n|u - The Open Security Community
•
12 years ago