ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

107,870 results

Cobalt Strike
What is Adversary Simulation?

This short video reveals what adversary simulation is, why it's important to conduct them, and how solutions can help you conduct ...

3:07
What is Adversary Simulation?

826 views

3 years ago

Prabh Nair
Adversary Simulation vs Adversary Emulation Explained

Welcome, Cybersecurity Enthusiasts! Today, we're diving deep into the realms of digital defense, exploring the differences and ...

18:07
Adversary Simulation vs Adversary Emulation Explained

3,269 views

2 years ago

HackerSploit
Red Team Adversary Emulation With Caldera

In this video, we will be exploring the process of automating Red Team adversary emulation exercises with MITRE Caldera. A Red ...

1:37:58
Red Team Adversary Emulation With Caldera

131,212 views

4 years ago

SANS Institute
ATT&CKing Your Enterprise: Adversary Detection Pipelines & Adversary Simulation

In a world where cybersecurity is filled with con-men, rock stars, n00bs, security evangelists, dude-bros, and the rest of us, can red ...

55:18
ATT&CKing Your Enterprise: Adversary Detection Pipelines & Adversary Simulation

1,939 views

6 years ago

RSA Conference
Adversary Emulation: How I Stopped Being Polite and Got Real Results

Presenters: Brian Donohue, Principal Security Specialist, Red Canary Adam Mashinchi, Director, Product Management, Red ...

49:41
Adversary Emulation: How I Stopped Being Polite and Got Real Results

212 views

2 years ago

ThinkInfoSec with Andre Camillo
Automating Adversary Emulation with MITRE Caldera

MITRE CALDERA is a Breach Attack Simulation (BAS) tool for automated and scalable red/blue team operations. Let's have a ...

19:44
Automating Adversary Emulation with MITRE Caldera

15,491 views

2 years ago

SANS Offensive Operations
Mastering Adversary Emulation with Caldera: A Practical Guide

Presenters: Jeroen Vandeleur and Jason Ostrom Adversary emulation stands as an indispensable cornerstone in the ...

1:26:08
Mastering Adversary Emulation with Caldera: A Practical Guide

8,667 views

1 year ago

RSA Conference
Increasing Security ROI with Adversary Simulation and Purple Teaming

Moderator: Jonathan Baker, Director, Center for Threat-Informed Defense, MITRE Engenuity Panelists: Abhijith B R, Founder and ...

52:43
Increasing Security ROI with Adversary Simulation and Purple Teaming

149 views

2 years ago

AstroLabs
Adversary Simulation Techniques and Methodologies

In this workshop, we will be doing an introduction to Hardware Hacking and a brief introduction to physical penetration testing.

2:07:00
Adversary Simulation Techniques and Methodologies

206 views

Streamed 2 years ago

Tevora
Adversary Simulation How a holistic approach can evolve your defenses Webinar Recording

cybersecurity #cybersecurityinsights #infosec #tevora FOLLOW US ON SOCIAL MEDIA* LinkedIn: ...

29:33
Adversary Simulation How a holistic approach can evolve your defenses Webinar Recording

16 views

2 years ago

Fatih Ozavci
TA505+ Adversary Simulation: Weaponisation - 1 C2 and Malware Development

TA505+ Adversary Simulation: Weaponisation - 1 C2 and Malware Development Info: https://github.com/fozavci/ta505plus.

11:15
TA505+ Adversary Simulation: Weaponisation - 1 C2 and Malware Development

489 views

5 years ago

SecPgh
Open Source Adversary Simulation Toolset Review - Ryan Voloch

Goals of Presentation are to help the audience: - Understand the practical benefits of using Adversary Simulation Toolsets such as ...

44:35
Open Source Adversary Simulation Toolset Review - Ryan Voloch

479 views

6 years ago

Adrian Crenshaw
1 20 I simulate therefore i catch enhancing detection engineering with adversary simulation Mauricio

These are the videos from Derbycon 2019: http://www.irongeek.com/i.php?page=videos/derbycon9/mainlist Subscribestar: ...

49:40
1 20 I simulate therefore i catch enhancing detection engineering with adversary simulation Mauricio

1,014 views

6 years ago

RSA Conference
Adversary Simulation: Close the Gaps in Your Security Posture

Don Murdoch, Senior Principal Engineer, RSA Need to validate a security posture and assess network resilience against an ...

40:01
Adversary Simulation: Close the Gaps in Your Security Posture

353 views

4 years ago

Mohamed M. Fouad
APT 28 Adversary Simulation

APT 28 Adversary Simulation.

8:56
APT 28 Adversary Simulation

302 views

2 years ago

Hackerman
Red Teaming: Adversary Simulation [Bypassing Windows Defender]

This video demonstrates a custom C2 being used to bypass windows defender detection mechanism. The final payload used here ...

3:12
Red Teaming: Adversary Simulation [Bypassing Windows Defender]

479 views

2 years ago

Fatih Ozavci
TA505+ Adversary Simulation:  Exploitation - 2 Stealing SYSTEM Token and Giving it to Meterpreter

TA505+ Adversary Simulation: Exploitation - 2 Stealing SYSTEM Token and Giving it to Meterpreter Info: ...

16:40
TA505+ Adversary Simulation: Exploitation - 2 Stealing SYSTEM Token and Giving it to Meterpreter

73 views

5 years ago

Adversary Village
DEF CON 29 Adversary Village - Mauricio Velazco - PurpleSharp Automated Adversary Simulation

Hello everyone welcome and thanks for stopping by my session purple sharp automated adversary simulation really happy to be ...

38:36
DEF CON 29 Adversary Village - Mauricio Velazco - PurpleSharp Automated Adversary Simulation

225 views

Streamed 4 years ago

Mathias Lemiso
Adversary Emulation Explained | Cybersecurity Red Teaming vs Simulation

Adversary emulation is one of the most powerful cybersecurity practices used by red teams and defenders to test real-world ...

16:21
Adversary Emulation Explained | Cybersecurity Red Teaming vs Simulation

29 views

5 months ago

SANS Cyber Defense
Adversary Simulation: Measure and Close the Gaps in Your Security Posture

Need to validate a security posture and assess network resilience against an adversary? Looking for techniques to develop and ...

36:48
Adversary Simulation: Measure and Close the Gaps in Your Security Posture

1,080 views

4 years ago