Found 1,649 presentations matching your search
Explore common web application vulnerabilities like CSRF and XSS, and learn how ethical hackers use ...
Mobile app security solutions are the tools and technologies designed to protect mobile applications...
Security is no longer an afterthought but instead is DevOps success's foundational piece. See ho...
This document is a presentation by Yury Chemerkin for the DefCamp conference, focusing on the myths ...
Discover Passkeys, the next evolution in secure login methods that eliminate traditional password vu...
This presentation focuses on security vulnerabilities in health and fitness apps, wearable devices, ...
Overcoming Hurdles in IoT Development delves into the key challenges faced during IoT implementation...
Ethical hacking involves proactively identifying and addressing security vulnerabilities in systems ...
Website pentesting, or penetration testing, involves simulating cyberattacks on a website to identif...
Web application penetration testing involves simulating cyberattacks on a web application to identif...
A Security Risk Assessment is an independent, in-depth analysis of your security systems designed to...
This presentation explores the development and implementation of a Python-based security tool for de...
Ethical hacking involves identifying and exploiting vulnerabilities in computer systems and networks...
Ethical hacking involves testing systems for vulnerabilities to improve security, using the same met...
An Ethical Hacking course equips individuals with the skills to identify and address security vulner...
This presentation provides an in-depth analysis of HTML injection vulnerabilities in web application...
An ethical hacking course is a structured educational program designed to teach individuals how to i...
An ethical hacking course equips individuals with the skills to identify and address security vulner...
This project focuses on identifying a critical Cross-Site Scripting (XSS) vulnerability present on t...
Ethical hacking involves authorized individuals probing and testing an organization's systems to...