Courses
Discover thousands of courses from top institutions and platforms worldwide
Level
Course Type
Duration

YouTube
Explore the intricacies of bypassing Device Guard in this 45-minute conference talk from WEareTROOPERS. Delve into the concept of Device Guard, its practical applications, and the implications of arbitrary code execution. Examine lateral movement techniques, the role of Office in protected models, and trusted locations. Learn about PowerShell in Constrained Language Mode and its potential for arbitrary code execution. Discover the benefits of Excel macros and ActiveScript bypasses, including common hosts and engines. Investigate Device Guard in ActiveScript, XSLT transforms, and various implementation differences. Analyze patching limitations and combine multiple techniques for effective bypasses. Gain insights into detection tools and potential future developments in Device Guard. Conclude with recommendations for further learning and experts to follow in the field.

YouTube
Explore advanced techniques for bypassing Device Guard (WDAC) in Windows 10 systems in this Hack In The Box Security Conference talk. Dive into rarely discussed and novel methods that allow running unsigned code, even with application whitelisting enabled. Learn about approaches requiring admin access, those leveraging Microsoft Office without user interaction, and a low-privilege technique using only native OS executables. Examine the feature's implementation across different contexts, and delve into the internals of Windows scripting engines and their host processes. Understand how popular bypass techniques work, including those presented in the talk. Gain insights into the scope of the problem, potential security implications, and suggestions for future feature development. This comprehensive exploration of Device Guard vulnerabilities provides valuable knowledge for security professionals and researchers interested in Windows system security.

YouTube
Explore cross-platform development strategies for web, mobile, and desktop applications in this ng-conf talk. Learn how to leverage Angular as the unifying framework for building enterprise-level solutions that share a single codebase across multiple platforms. Discover techniques for effective code sharing, solving white labeling requirements, and creating responsive solutions for web, mobile, and desktop environments using Electron. Gain insights from a real-world enterprise healthcare application example and understand how to overcome common challenges in multi-platform development. Delve into topics such as component inheritance, configurable modules, and CLI usage to streamline your development process and create efficient, scalable applications that meet diverse platform needs.

Udemy
A guide to designing at-grade, culvert and bridge crossings for animals and agricultural vehicles in NY. What you'll learn: You will be able to design culvert and at-grade stream crossingsYou will have a thorough understanding of how stream crossings impact water qualityYou will understand how hydrology, hydraulics, and stream geomorphology affect stream crossing design We'll be looking at the 3 types of stream crossings: at grade (fords), culverts, and bridges. Each type has trade-offs in price, design complexity, pollution prevention, wildlife impact, and stream morphology impact. We'll cover the pros and cons you should consider during the design process so you can make good decisions when crossing streams on your farm projects.

YouTube
Explore a comprehensive analysis of Control Flow Guard (CFG) and learn a new technique to bypass this exploit mitigation measure in Windows systems. Delve into the weaknesses of CFG, implemented by Microsoft in Windows 8.1 Update 3 and Windows 10 technical preview. Discover how to circumvent CFG's protection mechanisms, which typically prevent vital steps in many exploit techniques by validating indirect call targets. Gain insights into a novel approach that not only bypasses CFG comprehensively but also enables previously prevented exploit techniques to become exploitable again. Understand the generic capability underlying this bypass technique and its potential for developing additional exploit methods.

Udemy
Don't Let Your Website Get Hacked - Become A WordPress Guard Dog! What you'll learn: If you ever wanted to keep your WordPress website secure from hackers this is the course for you! Based on our recent interview with the distinguished co-developer of WordPress® Mike Little,we at the Empoweria have developed the ultimate WordPress security course! (Transcript of this riveting celebrity interview - concerning online security is included with this course) Now You can discover how to secure and defend your Wordpress Blog with the power of a Pitbull!. You will learn everything from start to finish so you can protect your WordPress Blogs from... Brute Force Attacks Bandwidth Theft Content Theft Product Theft PDF document, Image and Video Piracy Protection Unwanted Public Indexing of Your Sensitive Information by the Search Engines And Much MORE! Starting with WordPress basics, you'll move onto extremely advanced practices in online security! Here, you’ll discover it all step-by-step, while simply watching over my shoulder as I take you through securing my WordPress website in 4 easy to understand sections covering all of the areas of concern. Basics Security Practices Advanced Security Tactics How to Secure General Content, Files, and Private Membership Areas Advanced Product and Content Piracy Security Tactics This course is taught in a step by step sequential manner from basics to the more advanced strategies - all of which you can implement TODAY to make your WordPress website secure from, prying eyes, theft, or those who would choose to do you harm! All the videos are screen capture – so it’s easy for even "newbies" to understand and implement (Even the most advanced tactics!) Note: This is DIY online video training course for informational purposes. Every effort has been made to make the information accurate and easy to understand. However, in the scope and scale of this online video training course, we are unable to extend or provide warranty or direct support to each individual WordPress blog, owned or operated by our students. We will however, happily answer ANY questions you have related to this course! Your less than two hours away from having a more secure WordPress website! Let's get going! PS - You'll also get my special pre-writen htaccess code, so you can implement one of my most powerful, and most difficult security patches flawlessly even if your a beginner simply by copying and pasting this special code where it belongs!

Udemy
Learn to protect your database against planned & unplanned downtimes What you'll learn: Create physical standby databaseConfigure redo transportConvert physical standby into snapshot standbyConvert physical standby into active data guardConvert physical standby into logical standbyPerform switchover and failoverSetup data guard broker Oracle Data Guard is a technology which helps you protect against planned and unplanned downtime. Master Oracle 12c Data Guard video course teaches you how to implement Oracle Data Guard in real time environment. The course briefly discuss about the need of Oracle Data Guard, Oracle High Availability and how to setup Oracle Data Guard. The course also explores Data Guard architecture, function, different types and more. Enroll into the course and start learning how to use Oracle Data Guard to achieve highly available Oracle Database!After the completion of the Course, you should be able to:Know the data guard components and different types of standby databasesProduction server changes for Data GuardParameter changes for production and standby serverClone production and create physical standbyMaster how to verify your Data Guard setupConvert Physical Standby into Active Data GuardManaging the Data Guard Configuration Course RequirementsBasic knowledge of Database AdministrationWindows / Mac / Linux PC, Minimum 16 GB RAM and 100 GB HDD StorageVirtualization software VirtualBox – Create two machines

YouTube
Explore the challenges and opportunities of Kubernetes adoption in diverse environments through this GOTO Amsterdam 2018 conference talk. Delve into how Kubernetes can be leveraged in closed internal networks, behind the Chinese firewall, or for software delivery to clients. Examine the technology adoption lifecycle and requirements for crossing the chasm to mainstream adoption. Discover insights on the whole product concept, early adopters, and ideal cloud-native use cases. Learn about practical challenges such as installing Kubernetes in China, using AWS in Beijing, and implementing Kubernetes Federation. Gain valuable perspectives on topics like Helm, Windows support, service meshes, and building custom solutions. Understand the potential benefits and pitfalls of Kubernetes adoption across various scenarios to make informed decisions for your organization's container orchestration strategy.

YouTube
Learn advanced techniques for physical penetration testing reconnaissance in this conference talk from Ekoparty 2024. Discover methods to analyze building exteriors to predict internal security measures, asset locations, and security patrol patterns. Gain insights from extensive research analyzing thousands of floor plans and real-world penetration testing experience to understand common building layouts and security implementations. Master the skills needed to assess potential security measures, identify critical asset placements, and determine likely locations of guard stations and alarm systems before entering a facility. Explore practical approaches to gathering intelligence that can inform physical security assessments and penetration test planning.

YouTube
Explore the critical aspects of flood safety and low-water crossing design in this informative webinar. Delve into hydraulic design principles for structures like floodways, ford crossings, and Irish bridges, focusing on scour protection, closure criteria, embankment design, and energy dissipation. Learn about the latest research on vehicle stability in flood flows, including mechanisms for instability, vehicle testing, and hydrodynamic forces. Examine evidence-based policies and stability curves, and understand current guidelines for serviceability. Gain valuable insights into why crossing flooded roadways is dangerous and how engineers can improve crossing designs to withstand flood events. Participate in polls, terminology discussions, and a Q&A session to enhance your understanding of flood safety and infrastructure design.

YouTube
Explore applications of Bridgeland stability conditions and wall-crossing in algebraic geometry through this 46-minute conference talk presented by Arend Bayer and Emanuele Macrì at the International Mathematical Union. Delve into advanced mathematical concepts and their implications in the field of algebraic geometry. Access accompanying presentation slides for a comprehensive understanding of the topic.

Udemy
Security Officer Skills for emergencies, legalities, technologies, health & safety, confrontations, and career success! What you'll learn: Understand the basic principles of security and safety, including identifying potential hazards and implementing appropriate measures to mitigate risks.Learn the legal and ethical considerations involved in the role of a security officer, including knowledge of relevant laws, regulations and policies.Develop the necessary skills to effectively communicate & interact with a diverse range of individuals and groups, including customers, employees, and police.Gain proficiency in basic security techniques and procedures, such as patrols, surveillance, incident response, and report writing. Are you considering a career as a security officer or security guard? Look no further than our comprehensive Professional Security Officer Training course. This program is designed to provide you with the essential security guard training needed to excel in this dynamic field. From emergency response to legalities, technologies, health and safety, confrontations, and career success, we cover all the key aspects.With our course, you'll learn how to handle a wide range of situations that may arise during your tenure as a security officer and/or security guard. Whether it's responding to emergencies, managing confrontations, or addressing other security challenges, you'll gain the necessary skills and knowledge to maintain safety and protect people and property. We'll also guide you on leveraging cutting-edge equipment and technology to enhance your effectiveness in the field.Our engaging video lessons are delivered by an experienced instructor who has worked in numerous high-security settings. Benefit from their expertise as they share practical insights and real-world examples to help you understand the complexities of the role.This course is suitable for individuals at all stages of their security career journey. Whether you're just starting out and looking to gain a solid foundation or seeking to refresh your skills, our training program caters to your needs. We've designed it to be accessible and easy to follow, even if you have no prior experience in the security industry.By enrolling in our Professional Security Officer Training, you're setting yourself up for a rewarding career launchpad. Our comprehensive curriculum ensures you gain the skills required for success in this exciting and ever-evolving field. Don't miss out on this opportunity to enhance your professional prospects.Enroll in our security officer training course today and take the first step towards an exciting career in the security industry. Gain the confidence and expertise to become a top-performing security officer!

YouTube
Learn about enabling Windows Credential Guard in KVM through this 28-minute conference talk from KVM Forum. Explore the core concepts of Virtual Secure Mode (VSM), including Virtual Trust Levels, per VTL page protections, IRQ delivery, and overlay pages. Discover how Microsoft leverages these fundamentals to build security features. Gain insights into the efforts to integrate Windows Credential Guard into KVM, the challenges faced in upstreaming the feature, and potential commonalities with other virtualization-based security features. Understand the importance of this security feature, which is enabled by default in Windows 11 and becoming an industry prerequisite, and its implications for KVM support.

YouTube
Explore unusual and fascinating international boundaries through firsthand experiences visiting some of the world's most peculiar border crossings. Learn about unique geographical, political, and cultural phenomena that create extraordinary border situations, from enclaves and exclaves to disputed territories and unusual crossing procedures. Discover the stories behind these strange frontiers, including the historical events and political decisions that shaped them, while gaining insights into how these borders affect the daily lives of people living in these regions. Examine the practical challenges and interesting customs associated with crossing these unconventional boundaries, and understand the broader geopolitical implications of these territorial anomalies.

YouTube
Explore the intricacies of knot theory in this 57-minute lecture by Christine Ruey Shan Lee from the University of South Alabama. Delve into the challenging problem of determining minimal crossing numbers of knots, with a focus on Whitehead doubles. Learn how the colored Jones polynomial can be applied to study crossing numbers, and discover the connection between polynomial degree asymptotics and crossing numbers. Examine an infinitely family of satellite knots and their minimum crossing numbers. The talk covers general results, satellites, an infinite family, Jones polynomials, attitude, resolution, and nonadequate diagrams. This lecture, presented at the University of Miami, offers valuable insights into advanced knot theory concepts and techniques.

YouTube
This talk from the Workshop on "Recent Perspectives on Non-crossing Partitions through Algebra, Combinatorics, and Probability" at the Erwin Schrödinger International Institute explores the relationship between non-crossing partitions and webs. Discover how webs provide a diagrammatic calculus for spaces of SL(r)-tensor invariants, with a focus on recent joint work introducing hourglass plabic graphs as a new avatar of webs to create the first rotation invariant SL(4)-web bases. Learn about a construction that generates an hourglass plabic graph from a non-crossing partition and its Kreweras complement, which recovers Chris Fraser's rotation-invariant web basis for Plücker degree two representations of arbitrary SL(r). The 33-minute presentation delivers advanced mathematical concepts at the intersection of algebra, combinatorics, and representation theory.

YouTube
Learn about the Guard pattern in Rust through this conference talk from RustLab, where Angelo Rendina explores data structures that provide compile-time guarantees and safe runtime functionality mediation. Discover various practical use cases and implementations of the Guard pattern, a powerful design approach for ensuring compile-time property validation in Rust programming. Presented at Italy's first international Rust programming language conference, organized by Develer, this technical session demonstrates how to leverage Guards to enhance code safety and reliability.

YouTube
Explore the intricacies of bypassing Control Flow Guard (CFG) in this 37-minute Black Hat conference talk. Delve into the security mechanism designed to prevent indirect branches from redirecting control flow to unexpected locations. Learn about the implementation of CFG in Windows 10 and its functioning through control-flow check-functions. Discover the research approach using Performance Monitoring Unit (PMU) and Windows API to identify unguarded gates. Examine attack surfaces, including indirect jumps and temporary code buffers. Analyze results focusing on Windows Storage Library, IE LQR Library, and IE Data Segment. Understand the implications of writable function pointers and Microsoft's response to reported vulnerabilities. Gain insights into future work and current developments in this critical area of cybersecurity.

YouTube
Watch an 18-minute OpenSSF conference talk exploring the critical question of securing open-source security tools and frameworks. Delve into how the open-source community implements multiple layers of protection through five key aspects: transparency as a defensive mechanism, automated security tooling, supply chain security initiatives, maintainer oversight protocols, and community-driven bug bounty programs. Learn how developers, maintainers, and security tools work together to create an ecosystem of mutual verification, where human oversight, automated systems, and cryptographic measures combine to ensure the integrity and trustworthiness of open-source software security infrastructure.

YouTube
Explore advanced techniques for bypassing Control Flow Guard in Windows 10 through this conference talk from Louisville Infosec 2015. Delve into memory corruption, attack prevention strategies, and the intricacies of Control Flow Integrity. Learn about the need for relaxed control flow, performance impacts, and sample programs demonstrating guard checks. Discover security research methodologies, bypass techniques, and the role of Windows operations in coarse-grain protection. Examine virtual protect mechanisms, Flash vulnerabilities, and generic bypass methods. Investigate stack desynchronization, the "Jackpot Pattern," and censored slides revealing critical insights. Gain valuable recommendations for enhancing system security and participate in a Q&A session to deepen your understanding of these complex cybersecurity concepts.