Layer8/Layer8 2019/Chris Hadnagy - So You Wanna Be a Social Engineer.mp4 |
78.7 MB |
Layer8/Layer8 2019/Chris Kirsch - Pickpocketing Competition Wait, where is my access badge.mp4 |
136.5 MB |
Layer8/Layer8 2019/Emilie St-Pierre & Robby Stewart - A Proven Methodology for OSINT Gathering and Social Engineering.mp4 |
66.4 MB |
Layer8/Layer8 2019/Ira Winkler - How to Make Social Engineering Simulations Actually Useful.mp4 |
97.3 MB |
Layer8/Layer8 2019/Jonathan Stines - Make Vishing Suck Less.mp4 |
69.1 MB |
Layer8/Layer8 2019/Kate Mullin - Social Engineering from a CISO's Perspective.mp4 |
69.6 MB |
Layer8/Layer8 2019/Krittika Lalwaney & David Cafaro - Social Engineering for Red and Blue Teams.mp4 |
88 MB |
Layer8/Layer8 2019/Micah Hoffman - Getting the Good Stuff Understanding the Web to Achieve Your OSINT Goals.mp4 |
86.7 MB |
Layer8/Layer8 2019/Michael Portera (@mportatoes) - Venemy An Intelligence Tool for Venmo.mp4 |
46.7 MB |
Layer8/Layer8 2019/Noel Tautges - Connecting Information via User Account Recovery and Filling in the Blanks.mp4 |
45.7 MB |
Layer8/Layer8 2019/Patrick McNeil - The Right Way to Do Wrong Physical Security Secrets of Criminals and Professionals.mp4 |
98.2 MB |
Layer8/Layer8 2019/Paul Asadoorian - Social Engineering Your Way to an Infosec Career.mp4 |
56.5 MB |
Layer8/Layer8 2019/Sarka - Facial Expressions Behind Social Engineering Attacks.mp4 |
75.3 MB |
Layer8/Layer8 2019/Social Engineering CTF Winners Panel.mp4 |
82.9 MB |
Layer8/Layer8 2019/Tigran Terpandjian - Cultivating a 'Renaissance Approach' for the Social Engineer.mp4 |
20.5 MB |
Layer8/Layer8 2019/Tinker Secor - Transitive Trust Pivoting and Escalating Privileges in a Social Engineering Scenario.mp4 |
59.3 MB |
Layer8/Layer8 2019/Tracy Z. Maleeff (InfoSecSherpa) - An Introduction to Legal, Government, and Business Research.mp4 |
95.1 MB |
Layer8/Layer8 2019/Whitney Maxwell & Chris Kirsch SE CTF Call Re-Enactment.mp4 |
33.6 MB |
Layer8/Layer8 2019/Whitney Maxwell - An Analysis of the Size and Impact of Digital Footprints.mp4 |
34.6 MB |
Layer8/Layer8 2020/Alethe Denis - Phishy Little Liars – Pretexts That Kill.mp4 |
56.1 MB |
Layer8/Layer8 2020/Allie Barnes - Naked & Unafraid The Basics Of Securing Your Nudes.mp4 |
23.6 MB |
Layer8/Layer8 2020/Allie Mellen - Trust, But Verify Maintaining Democracy In Spite Of Информационные Контрмеры.mp4 |
32.4 MB |
Layer8/Layer8 2020/Cassandra Brunetto - Using OSINT To Catch An Online Predator.mp4 |
17.1 MB |
Layer8/Layer8 2020/Cat Murdock - Red Teaming Complicated Decision-Making In Work & Life.mp4 |
46.7 MB |
Layer8/Layer8 2020/Chris Kirsch - Using OSINT For Competitive Intelligence.mp4 |
22.2 MB |
Layer8/Layer8 2020/Erich Kron - Lies, Deception And Manipulation Let’s Talk About Deepfakes.eng.eng.srt |
94 KB |
Layer8/Layer8 2020/Erich Kron - Lies, Deception And Manipulation Let’s Talk About Deepfakes.mp4 |
56.5 MB |
Layer8/Layer8 2020/Gabriel Whalen - Working With Legacy Systems In Security Humans.mp4 |
37.2 MB |
Layer8/Layer8 2020/Joe Gray - Social Engineering Your Metrics Using Data Science To Provide Value In Reporting.mp4 |
36.4 MB |
Layer8/Layer8 2020/Joseph Sarkisian - JUST JUMP! Lessons For WannaBe Social Engineers By A WannaBe Social Engineer.eng.eng.srt |
50 KB |
Layer8/Layer8 2020/Joseph Sarkisian - JUST JUMP! Lessons For WannaBe Social Engineers By A WannaBe Social Engineer.mp4 |
51.6 MB |
Layer8/Layer8 2020/Krittika Lalwaney What E Holmes And Oprah Have In Common 4 Effective Ways To Build Instant Rapport.mp4 |
61.1 MB |
Layer8/Layer8 2020/Lauren Brennan - Disappearing Act Can You Avoid Public Surveillance Cameras.mp4 |
23.9 MB |
Layer8/Layer8 2020/Maureen Gibbons Varela - Painting a Portrait of an Individual with OSINT.mp4 |
61.5 MB |
Layer8/Layer8 2020/Micah Hoffman - Git’ing Users For OSINT Analysis Of All GitHub Users.mp4 |
46.3 MB |
Layer8/Layer8 2020/Rachel Bleiman & Wilson Diaz - Undergraduate Student Experiences In Social Engineering.mp4 |
73 MB |
Layer8/Layer8 2020/Rae Baker - OSINT On The Ocean Maritime Intelligence Gathering.mp4 |
28.7 MB |
Layer8/Layer8 2020/Shane McCombs - A Practical Application of OSINT in a Dark World (Trigger Warning).mp4 |
27.6 MB |
Layer8/Layer8 2020/Zeshan Aziz - Using OSINT And NLP To Track Jihadists In Conflict Zones.mp4 |
52.8 MB |
Layer8/Layer8 2020/Zoey Selman - The Misconceptions Of Open Source Intelligence.mp4 |
47.1 MB |
Layer8/Layer8 logo.jpg |
13 KB |
Layer8/Layer8 thank you.txt |
899 B |
Layer8/Security Weekly at Layer 8 2019/Helen Negre - Layer8 Conference 2019.mp4 |
18.3 MB |
Layer8/Security Weekly at Layer 8 2019/Ira Winkler, Secure Mentem - Layer8 Conference 2019.mp4 |
26.3 MB |
Layer8/Security Weekly at Layer 8 2019/Joe Gray - Layer8 Conference 2019.mp4 |
19.8 MB |
Layer8/Security Weekly at Layer 8 2019/Michael James - Layer8 Conference 2019.mp4 |
9.7 MB |
Layer8/Security Weekly at Layer 8 2019/Susan Peediyakkal - Layer8 Conference 2019.mp4 |
17.1 MB |
Layer8/Security Weekly at Layer 8 2019/Tracy Maleeff, @InfoSecSherpa - Layer8 Conference 2019.mp4 |
24.2 MB |
Layer8/Security Weekly at Layer 8 2019/Whitney Maxwell, Rapid7 - Layer8 Conference 2019.mp4 |
25.4 MB |