0(0)

Black Hat Asia 2014 part 2

  • Course level: Beginner

Description

Black Hat Asia 2014 part 2

Black Hat is returning to Asia for the first time since 2008, and we have quite an event in store. Here the brightest professionals and researchers in the industry will come together for a total of four days–two days of deeply technical hands-on Training, followed by two days of the latest research and vulnerability disclosures at our Briefings.

Topics for this course

17 Lessons

Black Hat Asia 2014 part 2

Say It Ain’t So – An Implementation of Deniable Encryption by Ari Trachtenberg00:00:00
Black Hat Asia 2014 – Z:\MAKE TROY\NOT WAR: Case Study of the Wiper APT in Korea, and Beyond00:00:00
Diving Into IE 10’s Enhanced Protected Mode Sandbox by Mark Vincent Yason00:00:00
Beyond ‘Check The Box’: Powering Intrusion Investigations by Jim Aldridge00:00:00
Black Hat Asia 2014 – Persist It: Using and Abusing Microsoft’s Fix It Patches00:00:00
Black Hat Asia 2014 – Keynote by Dr. Steve Crocker00:00:00
Black Hat Asia 2014 – Dude, WTF in My CAN!00:00:00
Black Hat Asia 2014 – The Machines That Betrayed Their Masters00:00:00
OFFENSIVE: Exploiting DNS Servers Changes by Leonardo Nve00:00:00
Building Trojan Hardware at Home by JP Dunning00:00:00
SAP, Credit Cards, and the Bird That Knows Too Much by Ertunga Arsal00:00:00
Disasters in the Making: How I Torture Open Government Data Systems for Fun, Profit, and Time Travel00:00:00
JS Suicide: Using JavaScript Security Features to Kill JS Security by Ahamed Nafeez00:00:00
Solutum Cumulus Mediocris by Eldar Marcussen00:00:00
Privacy-by-Design for the Security Practitioner by Richard Chow00:00:00
The Inner Workings of Mobile Cross-Platform Technologies by Simon Roses Femerling00:00:00
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts by Nitesh Dhanjanin00:00:00
Black Hat Asia 2014
Free

Enrolment validity: Lifetime