Post-Quantum Cryptography: Securing Our Digital Future Against Quantum Threats (2024 Update)
CSNP
Post-Quantum Cryptography: Securing Our Digital Future Against Quantum Threats (2024 Update)
38:31
CSNP AMA and Meet the VPs: Shaping the Future of Cybersecurity
CSNP
CSNP AMA and Meet the VPs: Shaping the Future of Cybersecurity
59:35
CSNP AMA and Meet the VPs: Amplifying Our Mission
CSNP
CSNP AMA and Meet the VPs: Amplifying Our Mission
1:09:16
CSNP Relaunch: Empowering Communities Through Accessible Cybersecurity
CSNP
CSNP Relaunch: Empowering Communities Through Accessible Cybersecurity
56:37
How to Start Your Own Cybersecurity Startup: CSNP Webinar with SCYTHE founder and CEO Bryson Bort
CSNP
How to Start Your Own Cybersecurity Startup: CSNP Webinar with SCYTHE founder and CEO Bryson Bort
56:43
Hacking Your Pentesting Career with Phillip Wylie and CSNP
CSNP
Hacking Your Pentesting Career with Phillip Wylie and CSNP
1:20:19
Veterans: Transition from Service to Cybersecurity
CSNP
Veterans: Transition from Service to Cybersecurity
53:07
CSNP - CyberSecurity Commercial 2023
CSNP
CSNP - CyberSecurity Commercial 2023
0:30
African Union Presentation: Securing the Digital Future of Africa
CSNP
African Union Presentation: Securing the Digital Future of Africa
14:29
Ask Cyber Career Questions to Naomi Buckwalter!
CSNP
Ask Cyber Career Questions to Naomi Buckwalter!
31:12
Top 5 Security Awareness Mistakes According to Behavior Science
CSNP
Top 5 Security Awareness Mistakes According to Behavior Science
1:12:31
How We Control & Protect the Grid
CSNP
How We Control & Protect the Grid
1:17:46
Attracting Recruiters: An Efficient Method to Land Jobs Faster
CSNP
Attracting Recruiters: An Efficient Method to Land Jobs Faster
1:17:45
Fun with MITRE Attack and NIST 800 53
CSNP
Fun with MITRE Attack and NIST 800 53
16:41
Cyber Threat Intelligence & How Sharing is Caring
CSNP
Cyber Threat Intelligence & How Sharing is Caring
1:07:37
Introduction to SIEM/SOAR
CSNP
Introduction to SIEM/SOAR
55:49
Cybersecurity: The Compliance Story
CSNP
Cybersecurity: The Compliance Story
54:08
How to Stay Safe on Public Wi-Fi
CSNP
How to Stay Safe on Public Wi-Fi
1:57
Ansh Gautam  - Public Wifi Attack Demo
CSNP
Ansh Gautam - Public Wifi Attack Demo
6:13
5 Tips for Everyday Internet Safety
CSNP
5 Tips for Everyday Internet Safety
4:59
Post-Quantum Cryptography
CSNP
Post-Quantum Cryptography
1:04:16
Professional Certificate Exams: A Practical, No-Excuses Guide!
CSNP
Professional Certificate Exams: A Practical, No-Excuses Guide!
1:05:10
Why VPN Isn’t Enough: Continuing to Support the Remote Workforce
CSNP
Why VPN Isn’t Enough: Continuing to Support the Remote Workforce
59:16
A Day in the Life of A CISO: Nancy Hunter
CSNP
A Day in the Life of A CISO: Nancy Hunter
55:12
Identity and Access Management 101
CSNP
Identity and Access Management 101
1:17:18
A Day in the Life of A CISO: Anahi Santiago
CSNP
A Day in the Life of A CISO: Anahi Santiago
1:00:17
How to Launch a Cybersecurity Career in 2021 - Part 2
CSNP
How to Launch a Cybersecurity Career in 2021 - Part 2
59:25
How to Make 100K+ With Only a GED in a Cybersecurity Career!
CSNP
How to Make 100K+ With Only a GED in a Cybersecurity Career!
38:01
A Day in the Life of A CISO   Phil Zongo
CSNP
A Day in the Life of A CISO Phil Zongo
1:01:25
Intrustion Detection with Snort!
CSNP
Intrustion Detection with Snort!
57:07
Ep 11 Video - Grace Chi, Dan Sherry - Threat Intelligence
CSNP
Ep 11 Video - Grace Chi, Dan Sherry - Threat Intelligence
36:49
Piloting the Linux Terminal
CSNP
Piloting the Linux Terminal
1:00:58
Professional Certificate Exams - A Practical Guide
CSNP
Professional Certificate Exams - A Practical Guide
1:09:04
Data Protection 101 - Introduction to Data Protection
CSNP
Data Protection 101 - Introduction to Data Protection
1:07:43
Ethical Hacking Test Taking 101
CSNP
Ethical Hacking Test Taking 101
1:01:50
Network Traffic Analysis with Wireshark
CSNP
Network Traffic Analysis with Wireshark
1:02:55
Ep 10 - Bryson Bort - Innovations in Threat Emulation
CSNP
Ep 10 - Bryson Bort - Innovations in Threat Emulation
47:25
A Day in the Life of A CISO - Olivia Rose
CSNP
A Day in the Life of A CISO - Olivia Rose
1:09:32
Hacker Rights ft  Chloe Messdaghi
CSNP
Hacker Rights ft Chloe Messdaghi
54:56
"Ask Me Anything": Submitting a CFP with The Diana Initiative
CSNP
"Ask Me Anything": Submitting a CFP with The Diana Initiative
55:09
Build Your Own Cyber Range with VirtualBox
CSNP
Build Your Own Cyber Range with VirtualBox
1:09:29
Hunting for Malware Network Traffic using Jupyter Notebooks
CSNP
Hunting for Malware Network Traffic using Jupyter Notebooks
1:10:45
A Day in the Life of a CISO - Tomás Maldonado
CSNP
A Day in the Life of a CISO - Tomás Maldonado
54:06
Ep 09 - Joe Hudson - The Cyber Job Hunt
CSNP
Ep 09 - Joe Hudson - The Cyber Job Hunt
57:52
How to Launch a Cyber Career in 2021!
CSNP
How to Launch a Cyber Career in 2021!
1:52:32
Ep 08 - Tillery - Reverse Engineering Malware
CSNP
Ep 08 - Tillery - Reverse Engineering Malware
47:44
Ep 07 - Chloé Messdaghi - Hacker Rights
CSNP
Ep 07 - Chloé Messdaghi - Hacker Rights
51:05
Covid WFH Impact on Individuals and Companies Cybersecurity
CSNP
Covid WFH Impact on Individuals and Companies Cybersecurity
1:08:21
Hacking Health   Securing Medical IoT
CSNP
Hacking Health Securing Medical IoT
50:59
Ep 05 - Eric Evans - The Rapid Move to Cloud
CSNP
Ep 05 - Eric Evans - The Rapid Move to Cloud
39:51
Incident Response Process
CSNP
Incident Response Process
1:10:25
Cloud Security Careers Panel Q&A
CSNP
Cloud Security Careers Panel Q&A
1:01:06
Ep 04 - Phillip Wylie, Kim C - The Pentester Blueprint
CSNP
Ep 04 - Phillip Wylie, Kim C - The Pentester Blueprint
30:02
Episode 003 - Ash Pedicini- TikTok and the State of Privacy
CSNP
Episode 003 - Ash Pedicini- TikTok and the State of Privacy
32:46
Is Linux Secure by Default?
CSNP
Is Linux Secure by Default?
44:38
Emerging Cybersphere of Smart Mobility
CSNP
Emerging Cybersphere of Smart Mobility
45:24
How Facial Recognition Software Impacts Lives
CSNP
How Facial Recognition Software Impacts Lives
6:51
How secure are your passwords?
CSNP
How secure are your passwords?
6:45
Ep02 - David Yi - Military & Private Sector Pentesting
CSNP
Ep02 - David Yi - Military & Private Sector Pentesting
32:08
Ep01 - Sarah Curk - From Soldier to Cyber
CSNP
Ep01 - Sarah Curk - From Soldier to Cyber
32:24
How Working From Home is Changing the Business Environment
CSNP
How Working From Home is Changing the Business Environment
59:12
Viruses are not the Only Problem   Security Analyst's Problem as a Service
CSNP
Viruses are not the Only Problem Security Analyst's Problem as a Service
53:32
How To Become A Pentester AMA (Part 2)
CSNP
How To Become A Pentester AMA (Part 2)
1:01:11
Securing Strategic Relationships
CSNP
Securing Strategic Relationships
44:09
Security Awareness is Not Enough   A Security Culture is Needed!
CSNP
Security Awareness is Not Enough A Security Culture is Needed!
1:00:08
Introduction to Cybersecurity - Girls Dream Code/CSNP:
CSNP
Introduction to Cybersecurity - Girls Dream Code/CSNP:
38:17
What Is Pentesting? Part 1
CSNP
What Is Pentesting? Part 1
58:05
Automative Security + Car Hacking
CSNP
Automative Security + Car Hacking
50:48
Secure Messaging: What is it and why is it important?
CSNP
Secure Messaging: What is it and why is it important?
5:45
Personal Cybersecurity Refresher + Financial Data Protection (Is this trust based?)
CSNP
Personal Cybersecurity Refresher + Financial Data Protection (Is this trust based?)
51:40
Defining Your Path To A Cloud Security Career
CSNP
Defining Your Path To A Cloud Security Career
1:05:46
Cyber Context of Blockchain
CSNP
Cyber Context of Blockchain
1:22:28
How To Launch A Cyber Career in 2020 - Part 2 AMA
CSNP
How To Launch A Cyber Career in 2020 - Part 2 AMA
57:15
The Truth Behind Kubernetes Secrets
CSNP
The Truth Behind Kubernetes Secrets
52:01
An Introduction to CSNP
CSNP
An Introduction to CSNP
1:49
Digital Tracking and Anti Surveillance
CSNP
Digital Tracking and Anti Surveillance
7:07
How and Why You Should Get A Career in Cloud Security
CSNP
How and Why You Should Get A Career in Cloud Security
1:03:41
The Future Of Cyber Insurance
CSNP
The Future Of Cyber Insurance
54:12
Upgrade Your Attack Model: Stopping Fileless Attacks Using the MITRE Framework
CSNP
Upgrade Your Attack Model: Stopping Fileless Attacks Using the MITRE Framework
37:20
Fighting The Right Fires: Logical Vulnerability and Risk Assessment
CSNP
Fighting The Right Fires: Logical Vulnerability and Risk Assessment
1:02:46
Putting The Sec Into DevOps - Turning Theory Into Practice
CSNP
Putting The Sec Into DevOps - Turning Theory Into Practice
1:00:03
Career Paths in Cybersecurity
CSNP
Career Paths in Cybersecurity
1:17:27
Exploring the Border of OT and IT: Cybersecurity in Industrial Operations
CSNP
Exploring the Border of OT and IT: Cybersecurity in Industrial Operations
55:04
Launch A Cyber Career in 2020
CSNP
Launch A Cyber Career in 2020
1:01:12
Russian Information Warfare Threats
CSNP
Russian Information Warfare Threats
1:19:25
Managing Who Has Access to Your Cloud Environment (who is actually logging in???)
CSNP
Managing Who Has Access to Your Cloud Environment (who is actually logging in???)
1:02:47
CSNP: Working Incident Response with Law Enforcement
CSNP
CSNP: Working Incident Response with Law Enforcement
1:01:58
Automate Faster than Evil
CSNP
Automate Faster than Evil
1:05:59
Online Gaming Security and Privacy
CSNP
Online Gaming Security and Privacy
6:15
Operation Soft Cell
CSNP
Operation Soft Cell
1:20:29
Careers in Security Panel
CSNP
Careers in Security Panel
1:13:30
Networking Virtually From Your Couch!
CSNP
Networking Virtually From Your Couch!
1:01:40
Does EARN IT Deserve Your Support?
CSNP
Does EARN IT Deserve Your Support?
1:16:37
How an Attacker ‘Audits’ Your Software Applications
CSNP
How an Attacker ‘Audits’ Your Software Applications
1:12:49
Shrink your Attack Surface with Software-Defined Segmentation
CSNP
Shrink your Attack Surface with Software-Defined Segmentation
2:10:47
Lightning Talks, Sponsored by Contrast Security
CSNP
Lightning Talks, Sponsored by Contrast Security
1:09:07
Cyber Attacks and Cryptography
CSNP
Cyber Attacks and Cryptography
1:45:58
Demo of RSA Attack
CSNP
Demo of RSA Attack
1:01
Exploiting Struts OGNL
CSNP
Exploiting Struts OGNL
2:54