OWASP Cape Town
Adapting to the Current Threat Landscape - part 2 of 4
30:00
OWASP Cape Town
Adapting to the Current Threat Landscape - part 1 of 4.
30:00
OWASP Cape Town
Learnings from Securing an AWS environment
42:56
OWASP Cape Town
Using JWTs for Authentication, Particularly as it Pertains to Web Based APIs
58:35
OWASP Cape Town
Understanding and Dealing with Zero Days
1:47:54
OWASP Cape Town
Fighting the Previous War - Attacking and Defending in the Cloud Era Part 1
59:59
OWASP Cape Town
Fighting the Previous War - Attacking and Defending in the Cloud Era - Part 2
1:00:00
OWASP Cape Town
To S or not to S, that is the HTTP, Pt1
59:50
OWASP Cape Town
To S or not to S that is the HTTP Pt2
19:00
OWASP Cape Town
SSL/TLS Flaws, Attacks and the Future pt 1
59:56
OWASP Cape Town
SSL/TLS Flaws, Attacks and the Future pt 2
41:21
OWASP Cape Town
Catch me if you can - Introduction to VPNs
55:45
OWASP Cape Town
Hunting rogue WiFi devices using the HackRF SDR - Part 1 of 2
1:00:00
OWASP Cape Town
Hunting rogue WiFi devices using the HackRF SDR - Part 2 of 2
19:17
OWASP Cape Town
Security Mistakes in Commodity Hardware
42:17
OWASP Cape Town
Digital Forensic Imaging and Analysis
1:25:22
OWASP Cape Town
Introduction to Cybercrime
2:22:56
OWASP Cape Town
Differential Cryptanalysis: an Introduction for Humans
1:29:58
OWASP Cape Town
Introduction to Digital Forensics
1:07:11
OWASP Cape Town
Forensic Skills for Pen-Testing: Fun With PCAP Files
39:37
OWASP Cape Town
Extraction at Light speed : Faster Blind SQL Injection
58:10