Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Getting started in security research - Kevin Backhouse

Автор: GitHub Education

Загружено: 2020-12-18

Просмотров: 9710

Описание:

Computer security is an unusual field. Many of the most accomplished security researchers are either self-taught or did not come from a formal computer science background. For example, two of the most talented security researchers Kevin knows studied journalism in college. His own path into computer security was more conventional: he studied mathematics and computer science and then worked as a developer for 15 years. But he never expected to become a professional hacker— and his career transition into security was mostly an accident. So how do you get started in security research? There are many paths in, and security is a big field. In this talk, Kevin will give you the specific point of view of a former developer, and will focus on the secure code field. He will cover some of the techniques that he uses: code auditing, CodeQL, and fuzzing. He will also briefly discuss the different mindsets of a security researcher, compared to a developer.

Getting started in security research - Kevin Backhouse

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Students leading the way: Campus Experts - Juan Pablo Flores

Students leading the way: Campus Experts - Juan Pablo Flores

DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

Off-by-One 2024 Day 1 - Keynote : Breaking Into Vulnerability Research: Dr Silvio Cesare - InfoSect

Off-by-One 2024 Day 1 - Keynote : Breaking Into Vulnerability Research: Dr Silvio Cesare - InfoSect

Azure Focused Security Research

Azure Focused Security Research

trust_90: NSO Group Hacker turned Web3 Security Researcher

trust_90: NSO Group Hacker turned Web3 Security Researcher

Reverse Engineering for Beginners: How to Perform Static Analysis on any Piece of Software

Reverse Engineering for Beginners: How to Perform Static Analysis on any Piece of Software

Vulnerability research as a lifestyle - Faraz

Vulnerability research as a lifestyle - Faraz

Android Exploits 101 Workshop

Android Exploits 101 Workshop

1. Introduction, Threat Models

1. Introduction, Threat Models

GitHub Octernships Stream | Ivy

GitHub Octernships Stream | Ivy

Finding Bugs: 42 Tips from 4 Security Researchers | Desmond, Joran, Nat, 0xRajeev - DSS 101 2024

Finding Bugs: 42 Tips from 4 Security Researchers | Desmond, Joran, Nat, 0xRajeev - DSS 101 2024

Exploit Development Is Dead, Long Live Exploit Development!

Exploit Development Is Dead, Long Live Exploit Development!

CS50 Cybersecurity - Lecture 1 - Securing Data

CS50 Cybersecurity - Lecture 1 - Securing Data

How to Make Sense of Cybersecurity Frameworks

How to Make Sense of Cybersecurity Frameworks

35C3 -  Attacking Chrome IPC

35C3 - Attacking Chrome IPC

Smart Contract Audits, Security, and DeFi FULL Course | Learn smart contract auditing

Smart Contract Audits, Security, and DeFi FULL Course | Learn smart contract auditing

USENIX Enigma 2016 - What Makes Software Exploitation Hard?

USENIX Enigma 2016 - What Makes Software Exploitation Hard?

Windows Security Research: A Practical Guide for Beginners to find 0 days - HackTricks Track 2023

Windows Security Research: A Practical Guide for Beginners to find 0 days - HackTricks Track 2023

Kubernetes — Простым Языком на Понятном Примере

Kubernetes — Простым Языком на Понятном Примере

Bug Hunting with Static Code Analysis - Nick Jones

Bug Hunting with Static Code Analysis - Nick Jones

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]