Adapting to the Current Threat Landscape - part 2 of 4
OWASP Cape Town
Adapting to the Current Threat Landscape - part 2 of 4
30:00
Adapting to the Current Threat Landscape - part 1 of 4.
OWASP Cape Town
Adapting to the Current Threat Landscape - part 1 of 4.
30:00
Learnings from Securing an AWS environment
OWASP Cape Town
Learnings from Securing an AWS environment
42:56
Using JWTs for Authentication, Particularly as it Pertains to Web Based APIs
OWASP Cape Town
Using JWTs for Authentication, Particularly as it Pertains to Web Based APIs
58:35
Understanding and Dealing with Zero Days
OWASP Cape Town
Understanding and Dealing with Zero Days
1:47:54
Fighting the Previous War - Attacking and Defending in the Cloud Era Part 1
OWASP Cape Town
Fighting the Previous War - Attacking and Defending in the Cloud Era Part 1
59:59
Fighting the Previous War - Attacking and Defending in the Cloud Era - Part 2
OWASP Cape Town
Fighting the Previous War - Attacking and Defending in the Cloud Era - Part 2
1:00:00
To S or not to S, that is the HTTP, Pt1
OWASP Cape Town
To S or not to S, that is the HTTP, Pt1
59:50
To S or not to S that is the HTTP Pt2
OWASP Cape Town
To S or not to S that is the HTTP Pt2
19:00
SSL/TLS Flaws, Attacks and the Future pt 1
OWASP Cape Town
SSL/TLS Flaws, Attacks and the Future pt 1
59:56
SSL/TLS Flaws, Attacks and the Future pt 2
OWASP Cape Town
SSL/TLS Flaws, Attacks and the Future pt 2
41:21
Catch me if you can - Introduction to VPNs
OWASP Cape Town
Catch me if you can - Introduction to VPNs
55:45
Hunting rogue WiFi devices using the HackRF SDR - Part 1 of 2
OWASP Cape Town
Hunting rogue WiFi devices using the HackRF SDR - Part 1 of 2
1:00:00
Hunting rogue WiFi devices using the HackRF SDR - Part 2 of 2
OWASP Cape Town
Hunting rogue WiFi devices using the HackRF SDR - Part 2 of 2
19:17
Security Mistakes in Commodity Hardware
OWASP Cape Town
Security Mistakes in Commodity Hardware
42:17
Digital Forensic Imaging and Analysis
OWASP Cape Town
Digital Forensic Imaging and Analysis
1:25:22
Introduction to Cybercrime
OWASP Cape Town
Introduction to Cybercrime
2:22:56
Differential Cryptanalysis: an Introduction for Humans
OWASP Cape Town
Differential Cryptanalysis: an Introduction for Humans
1:29:58
Introduction to Digital Forensics
OWASP Cape Town
Introduction to Digital Forensics
1:07:11
Forensic Skills for Pen-Testing: Fun With PCAP Files
OWASP Cape Town
Forensic Skills for Pen-Testing: Fun With PCAP Files
39:37
Extraction at Light speed : Faster Blind SQL Injection
OWASP Cape Town
Extraction at Light speed : Faster Blind SQL Injection
58:10