SecureWV/Hack3rcon 2018 Videos

Link: http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/mainlistThese are the videos of the presentations from Secure West Virginia 2018. Thanks to Justin, Tim, Lacy, Dave, Katie, Kevin, Todd, Alice, Brian, Brandon & Jon for helping …

Link: http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/mainlist
These are the videos of the presentations from Secure West Virginia 2018. Thanks to Justin, Tim, Lacy, Dave, Katie, Kevin, Todd, Alice, Brian, Brandon & Jon for helping record.

Intro/Welcome to SecureWV / Hack3rCon

Keynote - Hackers, Hugs, & Drugs.... Part II
Amanda Berlin

Why The Legal System Needs Your Help
Brian Martin

Mobile devices and you.
Detective Jeremy M. Thompson

The New Age of Ransomware: Cybercriminals Adopt Nation State Techniques
Allan Liska

Outside the Box: How the Internet of Things Poses New Cybersecurity Risks and Challenges the Law
Evan Kime

Applying the principles of Dodgeball: A True Underdog Story to CTFs
Branden Miller

Gun Safety Class
Branden Miller

Python Scripting
Justin Rogosky

Red Hat Enterprise Linux Security Technologies Lab
Lucy Kerner and Roy Williams

Automating Security Operations - on a budget
Jeremy Mio

Security Automation for the Blue Team
Eric Waters

Home Alone: A Pentester Perspective
Craig Vincent & Derek Banks

Simplified Red Hat Enterprise Linux Identity, Authentication, and Authorization management with Microsoft Active Directory and Red Hat Identity Management Trust
Roy Williams

Simple Attribution in Social Media and Websites
Brian Martin

Offensive and Defensive Security with Ansible
Lucy Kerner

High School Competitive Robotics and why you should care.
Charleston Area Robotics Team (CART)

Guaranteed Failure - Awareness The Greatest Cyber Insanity
Joshua Crumbaugh

Developing a Cloud Based Cyber Security Simulation Portal
David Krovich

The Hybrid Home Lab: From Laptop to Cloud
Holden Fenner

Securing your networks with Ansible
Adam Vincent

A deep look at Stack Buffer Overflows and Format String Vulnerabilities
Philip Polstra

Advanced threat hunting with open-source tools and no budget
Joseph DePlato

What's in a Domain Name?
Collin Meadows

Monitoring your home LAN with Python
Zach Tackett

Left of Boom
Ted Corbeill

Your Dead! Now what. How to help your family after your gone.
Steven Truax

A Brief Introduction to Metasploit
Joey Maresca

SecureWV / Hack3rCon Closing / Awards
Benny Karnes


Print Share Comment Cite Upload Translate
APA
() » SecureWV/Hack3rcon 2018 Videos. Retrieved from https://www.truth.cx/2018/12/03/securewv-hack3rcon-2018-videos/.
MLA
" » SecureWV/Hack3rcon 2018 Videos." - , https://www.truth.cx/2018/12/03/securewv-hack3rcon-2018-videos/
HARVARD
» SecureWV/Hack3rcon 2018 Videos., viewed ,
VANCOUVER
- » SecureWV/Hack3rcon 2018 Videos. [Internet]. [Accessed ]. Available from: https://www.truth.cx/2018/12/03/securewv-hack3rcon-2018-videos/
CHICAGO
" » SecureWV/Hack3rcon 2018 Videos." - Accessed . https://www.truth.cx/2018/12/03/securewv-hack3rcon-2018-videos/
IEEE
" » SecureWV/Hack3rcon 2018 Videos." [Online]. Available: https://www.truth.cx/2018/12/03/securewv-hack3rcon-2018-videos/. [Accessed: ]
Select a language: