Black Hat USA 2019 part 04

  • Course level: Beginner


Black Hat USA 2019 part 04

Now in its 22nd year, Black Hat USA is the world’s leading information security event, providing attendees with the very latest in research, development, and trends. BlackHat USA 2019 opens with four days of technical Training (August 3-6) followed by the two-day main conference (August 7-8) featuring Briefings, Arsenal, Business Hall, and more.


Join now 

Topics for this course

29 Lessons

Black Hat USA 2019 part 04

Playing Offense and Defense with Deepfakes00:00:00
Legal GNSS Spoofing and its Effects on Autonomous Vehicles00:00:00
Bounty Operations: Best Practices and Common Pitfalls to Avoid in the First 6-12 Months00:00:00
Attacking Electric Motors for Fun and Profit00:00:00
On Trust: Stories from the Front Lines00:00:00
Cybersecurity Risk Assessment for Safety-Critical Systems00:00:00
Hunting for Bugs, Catching Dragons00:00:00
The Future of ATO00:00:00
Transparency in the Software Supply Chain: Making SBOM a Reality00:00:00
Battle of Windows Service: A Silver Bullet to Discover File Privilege Escalation Bugs Automatically00:00:00
Operational Templates for State-Level Attack and Collective Defense of Countries00:00:00
Hacking Your Non-Compete00:00:00
Detecting Deep Fakes with Mice00:00:00
Zombie Ant Farming: Practical Tips for Playing Hide and Seek with Linux EDRs00:00:00
The Future of Securing Intelligent Electronic Devices Using the IEC 62351-7 Standard for Monitoring00:00:00
Integration of Cyber Insurance Into A Risk Management Program00:00:00
ClickOnce and You’re in – When Appref-ms Abuse is Operating as Intended00:00:00
Bypassing the Maginot Line: Remotely Exploit the Hardware Decoder on Smartphone00:00:00
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary00:00:00
A Decade After Bleichenbacher ’06, RSA Signature Forgery Still Works00:00:00
SSO Wars: The Token Menace00:00:00
Worm Charming: Harvesting Malware Lures for Fun and Profit00:00:00
Mobile Interconnect Threats: How Next-Gen Products May be Already Outdated00:00:00
Securing Apps in the Open-By-Default Cloud00:00:00
Rough and Ready: Frameworks to Measure Persistent Engagement and Deterrence00:00:00
Finding a Needle in an Encrypted Haystack00:00:00
Come Join the CAFSA – Continuous Automated Firmware Security Analysis00:00:00
Sensor and Process Fingerprinting in Industrial Control Systems00:00:00
I’m Unique, Just Like You: Human Side-Channels and Their Implications for Security and Privacy00:00:00
Black Hat USA 2019

Enrolment validity: Lifetime