1. |
MITRE ATT&CK and the Unified Kill Chain |
att&ck ‧ Unknown |
|
2. |
Modeling cyber attacks, Cyber Kill Chain |
attack modeling ‧ Unknown |
|
3. |
OpenVAS vulnerability scanner, part 2 |
english ‧ Unknown |
|
4. |
OpenVAS vulnerability scanner, part 1 |
english ‧ Unknown |
|
5. |
Vulnerabilities detected by fuzzing, part 2 |
english ‧ Unknown |
|
6. |
Vulnerability management |
english ‧ Unknown |
|
7. |
Critical web application vulnerabilities, part 3 (final) |
english ‧ Unknown |
|
8. |
Critical web application vulnerabilities, part 2 |
english ‧ Unknown |
|
9. |
Types of cyber-attackers |
attackers ‧ Unknown |
|
10. |
Security controls |
english ‧ Unknown |
|
11. |
Types of fuzzers |
english ‧ Unknown |
|
12. |
Introduction to Android penetration testing |
Android ‧ Unknown |
|
13. |
Critical web application vulnerabilities, part 1 |
english ‧ Unknown |
|
14. |
Introduction to web penetration testing |
english ‧ Unknown |
|
15. |
Introduction to fuzzing |
english ‧ Unknown |
|
16. |
Detecting cryptographic misuse with Argus static analysis framework |
Android ‧ Unknown |
|
17. |
Amandroid - Argus static analysis framework |
Android ‧ Unknown |
|
18. |
Obfuscation techniques |
Android ‧ Unknown |
|
19. |
Finding suitable problems with MySQL / MariaDB to focus on |
autonomic computing ‧ Unknown |
|
20. |
Java bytecode decompilers |
decompiler ‧ Unknown |
|
21. |
Cryptographic lint tools |
Android ‧ Unknown |
|
22. |
Comparing C/C++ decompilers |
C/C++ ‧ Unknown |
|
23. |
Android obfuscation tools - ProGuard |
Android ‧ Unknown |
|
24. |
Android application obfuscation and deobfuscation |
Android ‧ Unknown |
|
25. |
Autonomic computing similar work, tools and target service selection |
autonomic computing ‧ Unknown |
|