Resources: Webcasts


Securing Web Applications Made Simple and Scalable

Applying the 32 Zombieland Rules to IT Security

Putting your security assessment budget on a leash while avoiding the Pentest Puppy Mill

A Taste of SANS SEC760: Use-After-Free Vulnerabilities and Exploitation

Pen-Test-A-Go-Go: Integrating Mobile and Network Attacks for In-Depth Pwnage

A Taste of SANS Security 660 Part 1: Modifying Exploits to Disable Data Execution Prevention (DEP)

Pre-boot Attacks for Pentesters

BYOD - Yay or Nay?

Kinetic Pwnage - Obliterating the Line Between Computers and the Physical World

Ninja Developers: Is There a Framework for That?

5 Key Traits of Crappy Pentests

Python for Web App Pentesters

How Attackers Exploit Modern, Secure Wireless Networks

Ninja Developers: Discretely Scan Your Functional Testing