Black Hat USA 2019 part 01

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat USA 2019 part 01


Now in its 22nd year, Black Hat USA is the world’s leading information security event, providing attendees with the very latest in research, development, and trends. BlackHat USA 2019 opens with four days of technical Training (August 3-6) followed by the two-day main conference (August 7-8) featuring Briefings, Arsenal, Business Hall, and more.

 

Join now

Course Content

Black Hat USA 2019 part 01

  • Ghidra – Journey from Classified NSA Tool to Open Source
    00:00
  • Black Hat USA 2019 Keynote: Every Security Team is a Software Team Now by Dino Dai Zovi
    00:00
  • DevSecOps : What, Why and How
    00:00
  • Behind the scenes of iOS and Mac Security
    00:00
  • Selling 0-Days to Governments and Offensive Security Companies
    00:00
  • GDPArrrrr: Using Privacy Laws to Steal Identities
    00:00
  • Reverse Engineering WhatsApp Encryption for Chat Manipulation and More
    00:00
  • Denial of Service with a Fistful of Packets: Exploiting Algorithmic Complexity Vulnerabilities
    00:00
  • The Path Less Traveled: Abusing Kubernetes Defaults
    00:00
  • Inside the Apple T2
    00:00
  • Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD)
    00:00
  • MITRE ATT&CK: The Play at Home Edition
    00:00
  • Infiltrating Corporate Intranet Like NSA – Pre-auth RCE on Leading SSL VPNs
    00:00
  • Detecting Malicious Files with YARA Rules as They Traverse the Network
    00:00
  • Process Injection Techniques – Gotta Catch Them All
    00:00
  • Breaking Samsung’s ARM TrustZone
    00:00
  • WebAuthn 101 – Demystifying WebAuthn
    00:00
  • Backdooring Hardware Devices by Injecting Malicious Payloads on Microcontrollers
    00:00
  • Death to the IOC: What’s Next in Threat Intelligence
    00:00
  • Practical Approach to Automate the Discovery & Eradication of Open-Source Software Vulnerabilities
    00:00
  • Woke Hiring Won’t Save Us: An Actionable Approach to Diversity Hiring and Retention
    00:00
  • Flying a False Flag: Advanced C2, Trust Conflicts, and Domain Takeover
    00:00
  • Securing the System: A Deep Dive into Reversing Android Pre-Installed Apps
    00:00
  • Command Injection in F5 iRules
    00:00
  • Attacking iPhone XS Max
    00:00
  • Breaking Encrypted Databases: Generic Attacks on Range Queries
    00:00
  • New Vulnerabilities in 5G Networks
    00:00
  • Rogue7: Rogue Engineering-Station Attacks on S7 Simatic PLCs
    00:00
  • Infighting Among Russian Security Services in the Cyber Sphere
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet