Resources: Webcasts

Resources:

Securing Web Applications Made Simple and Scalable
https://www.sans.org/webcasts/securing-web-applications-simple-scalable-97022

Applying the 32 Zombieland Rules to IT Security
https://www.sans.org/webcasts/applying-32-zombieland-rules-security-97160

Putting your security assessment budget on a leash while avoiding the Pentest Puppy Mill
https://www.sans.org/webcasts/putting-security-assessment-budget-leash-avoiding-pentest-puppy-mill-96927

A Taste of SANS SEC760: Use-After-Free Vulnerabilities and Exploitation
https://www.sans.org/webcasts/taste-sec760-use-after-free-vulnerabilities-exploitation-97047

Pen-Test-A-Go-Go: Integrating Mobile and Network Attacks for In-Depth Pwnage
https://www.sans.org/webcasts/pen-test-a-go-go-integrating-mobile-network-attacks-in-depth-pwnage-97007

A Taste of SANS Security 660 Part 1: Modifying Exploits to Disable Data Execution Prevention (DEP)
https://www.sans.org/webcasts/taste-security-660-1-modifying-exploits-disable-data-execution-prevention-dep-96987

Pre-boot Attacks for Pentesters
https://www.sans.org/webcasts/pre-boot-attacks-pentesters-96937

BYOD - Yay or Nay?
https://www.sans.org/webcasts/byod-yay-nay-96595

Kinetic Pwnage - Obliterating the Line Between Computers and the Physical World
https://www.sans.org/webcasts/kinetic-pwnage-obliterating-line-computers-physical-world-96605

Ninja Developers: Is There a Framework for That?
https://www.sans.org/webcasts/ninja-developers-framework-that-96085

5 Key Traits of Crappy Pentests
https://www.sans.org/webcasts/5-key-traits-crappy-pentests-96437

Python for Web App Pentesters
https://www.sans.org/webcasts/python-web-app-pentesters-96255

How Attackers Exploit Modern, Secure Wireless Networks
https://www.sans.org/webcasts/attackers-exploit-modern-secure-wireless-networks-96337

Ninja Developers: Discretely Scan Your Functional Testing
https://www.sans.org/webcasts/ninja-developers-discretely-scan-functional-testing-96080