Never Ending Security

It starts all here

Cyber Security Club Archive Presentations and Slides

Cyber Security Club Archive

from: http://www.isis.poly.edu/cyber-security-club and http://www.isis.poly.edu/cyber-security-club/archive

March 11, 2015 So you want to be a Hacker? Nick Freeman Notes RH 227
April 8, 2015 How to Score an Awesome Security Internship Emily Wicki Presentation RH 227
April 23, 2014 Rahil Parikh Presentation
April 16, 2014 Advanced Python Kevin Chung Presentation
April 2, 2014 Smashing the Ether for Fun and Profit iSEC Partners Presentation 
February 5, 2014 Intro to Web Pentesting Kevin Chung Presentation RH227
November 27, 2013 Finding Bugs for Profit and Fun Kevin Chung Presentation
November 20, 2013 Active Directory Nicholas Anderson Presentation
October 30, 2013 Physical Access Threats To Workstations Brad Antoniewicz Presentation
October 23, 2013 Keynote: Unsolved Problems in Computer Security Julian Cohen Presentation
September 18, 2013 How to play CSAW CTF Kevin Chung Presentation JAB 774
September 11, 2013 Intro to NFC Robert Portvliet Presentation JAB 774
April 24, 2013 Finding Bugs for Fun, Profit, and Cocaine Omar http://omar.li/ 
April 10, 2013 InfoSec Management Erik Cabetas Presentation 
March 13, 2013 Mobile Application Security Corey Benninger Presentation 
March 6, 2013 Building organizational policy that enhances security Sean Brooks Resources 
February 20, 2013 Malware Detection Ryan Van Antwerp Presentation 
December 5, 2012 Understanding Why Your Neighbor’s Wi-Fi is Vulnerable Kevin Chung Understanding Why Your Neighbor’s Wi-Fi is Vulnerable 
November 7, 2012 Clearing the Red Forest Michael Sikorski Clearing the Red Forest 
October 24, 2012 Passive Web Forensics: Monitoring, Logging and Analyzing Web Traffic with Net Sensor Boris Kochergin Passive Web Forensics 
October 3, 2012 IPv6 Security Invited Expert: Keith O’Brien, Cisco IPv6 Security 
September 19, 2012 Keynote: Raphael Mudge, Armitage Raphael Mudge, Armitage Armitage 
September 12, 2012 The Mobile Exploit Intelligence Project Dan Guido, Co-Founder and CEO, Trail of Bits The Mobile Exploit Intelligence Project 
April 11, 2012 Invited Expert: IPv6 Security Keith O’Brien IPv6 Security 
April 4, 2012 All About vtrace/Pin Phil Da Silva vtrace_internals 
March 28, 2012 Cross-Origin Resource Inclusion Julian Cohen Cross-Origin Resource Inclusion 
March 7, 2012 Keynote: The purpose of InfoSec is to support a business…O’RLY? YA’RLY! Erik Cabetas The Role of InfoSec in Business 
February 8, 2012 Introduction to x86 Julian Cohen Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration 
February 1, 2012 Greyhat Ruby: A Stephen Ridley Talk Luis Garcia Greyhat Ruby 
April 13, 2011 IPv6 Security Keith O’Brien IPv6 Security 
April 6, 2011 Applied Application Security Julian Cohen Applied Application Security 
March 30, 2011 Legal Developments in Information Security Rob Widham Secrecy, Surveillance and FISA: A Legal Overview 
March 23, 2011 Hardware Security Part 2 Jeyavijayan Rajendran Hardware Security 
March 9, 2011 Hardware Security Part 1 Jeyavijayan Rajendran Hardware Security 
March 2, 2011 Computer Crimes and Investigations John Koelzer Developments in Cyber Crime ACH Fraud 
February 16, 2011 Windows Active Directory Part 2 Jonathan Livolsi Windows Active Directory 
February 9, 2011 Windows Active Directory Part 1 Jonathan Livolsi Windows Active Directory 
February 2, 2011 Malware Research Jonathan Chittenden Malware Research 
December 1, 2010 Enterprise-Wide Incident Response James Carder and Justin Prosco Enterprise-Wide Incident Response  LC400
November 24, 2010 Introduction to Memory Corruption Part 3 Luis E. Garcia II and Julian Cohen Introduction To Memory Corruption 
November 17, 2010 Introduction to Memory Corruption Part 2 Luis E. Garcia II and Julian Cohen Introduction To Memory Corruption 
November 10, 2010 Introduction to Memory Corruption Part 1 Luis E. Garcia II and Julian Cohen Introduction To Memory Corruption 
October 27, 2010 Layer 2 Network Security Boris Kochergin Layer 2 Network Security 
October 20, 2010 Applied Application Security: How we secured boxes against the best hackers in the world for the 2010 CSAW CTF Julian Cohen Applied Application Security 
October 6, 2010 2010 CSAW CTF Challenges and Solutions Part 2 Julian Cohen and Luis E. Garcia II 2010 CSAW CTF 
September 29, 2010 2010 CSAW CTF Challenges and Solutions Part 1 Julian Cohen and Luis E. Garcia II 2010 CSAW CTF 
September 22, 2010 DLL Hijacking Julian Cohen DLL Hijacking 
Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s