Similar Tracks
AASLR: Why? Exactly are you not using Atomic Red Team? | John Strand
Black Hills Information Security
BHIS | Demystifying Web3 Attack Vectors, with Beau Bullock and Steve Borosh | 1 Hour
Black Hills Information Security
EDITED EDITION — Getting Started in Pentesting The Cloud–Azure | Beau Bullock | 1-Hour
Black Hills Information Security
Securing AWS Discover Cloud Vulnerabilities via Pentesting Techniques | Beau Bullock
Black Hills Information Security
The SOC Age Or, A Young SOC Analyst's Illustrated Primer | John Strand | 1 Hour
Black Hills Information Security