Date | Tech Talk | Recording Link | Attachment | |
---|---|---|---|---|
Wednesday, February 5, 2020 | Reverse Engineering for Ethical Hackers |
![]() |
||
Thursday, November 14, 2019 | Building Secure Software Systems Using Security |
![]() |
||
Thursday, November 14, 2019 | Wireless and Mobile Softwarization: Security and Privacy Pandora’s Box |
![]() |
||
Thursday, October 17, 2019 | Malware Analysis Using Machine Learning |
![]() |
||
Thursday, September 19, 2019 | Dictionary Attacks on Biometric Systems |
![]() |
||
Thursday, September 19, 2019 | Secure and Intelligent Smartphone App |
![]() |
||
Thursday, May 16, 2019 | Equifax Breach as Cybersecurity Case Study |
![]() |
||
Thursday, March 21, 2019 | Deep and Dark Web |
![]() |
||
Thursday, November 15, 2018 | Car Hacking for Ethical Hackers |
![]() |
||
Thursday, November 15, 2018 | FR-WARD - Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of Things |
![]() |
||
Thursday, October 18, 2018 | Open Source Intelligence in Cybersecurity |
![]() |
||
Thursday, September 20, 2018 | Architecture - Driven Penetration Testing against an Identity Access Management (IAM) System |
![]() |
||
Thursday, September 20, 2018 | Teaching Cell Phone Texting Mechanism and Security | |||
Thursday, May 17, 2018 | White Hat Operations: Building an Effective Pen Testing Team |
![]() |
||
Thursday, May 17, 2018 | Cyberattack Forecasting using ARIMA with Intensity-based Regressors |
![]() |
||
Thursday, April 19, 2018 | Apache Metron and Apache Spot – Big Data Tools for Cybersecurity |
![]() |
||
Thursday, March 15, 2018 | The PyPy Sandbox |
![]() |
||
Thursday, February 15, 2018 | From Malware Analysis to Suricata Signatures - How to Defend your Networks | |||
Thursday, January 25, 2018 | How to test a Network Investigative Technique(NIT) |
![]() |