What's new
Warez.Ge

This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Virtual Intelligence Conference and CTF benefitting

tut4dl

Active member
xSeII4h.png
Virtual Intelligence Conference and CTF benefitting
English | Size: 1.54 GB
Genre: eLearning​

Topics :
1.Alan O'Reilly - A Beginners Guide to Shodan
2.Alethe Denis - Phishy Little Liars - Pretexts That Kill
3.Amy Herman - The Art of Perception Law Enforcement Workshop
4.Benjamin Strick - Location Finding and Visual Forensics - A Case Study Presentation
5.Bryan Hurd - Strategic Perspectives and (Mostly) True War Stories
6.Charles Shirer - Offensive OSINT How to effectively used OSINT for offensive engagements.
7.Charles Wroth - OSINT The entry drug your mother never told you about
8.Chris Ante - Cryptocurrency and the Evolving Ransomware Threat
9.Chris Poulter - Turning Information into Intelligence
10.Cytisus Eurydice - Dipping into the Darknet
11.David Westcott - OSINT Focused Android Analysis
12.Dhruv Majumdar - CTI and Threat Hunting
13.Gyle dela Cruz - Suspicious Minds Lessons from an Elvis Presley Song that Cyber Analysts Can Use
14.Joe Gray - Workshop 2 Hour People OSINT Walkthrough
15.Luke Phillips - A View From...
16.Michael Portera - Venemy An Intelligence Tool for Venmo (2020 Edition)
17.Mishaal Khan - Advancing OSINT with Social Engineering
18.Nicole Beckwith - Mind Hacks - Psychological profiling, and mental health in OSINT investigations
19.Paul Raffile - Open-Source Intelligence to Enable Real-Time Crisis Management
20.PresComm - Quick Glance at Malware OSINT
21.Rae Baker - Murders, Scams, and Cold Cases The Use of OSINT to Investigate Crime
22.Sinwindie - OSINT and Dark Web Markets, Why OPSEC Still Matters
23.Siobhan Kelleher - OSINT Getting Started
24.Tom Hocker - - Ethical OSINT Temptations and Unforeseen Consequences
25.Trevor Giffen - Exploring the history of breached data search services
26.Will Thomas - Using Intelligence to Defend Against Ransomware

yMNlxlr.png

DnAn0tn.png

Code:
https://nitro.download/view/7F2D0F855CFD9D0/Virtual-Intelligence-Conference-and-CTF-benefitting.23.3.part1.rar
https://nitro.download/view/24D0682FD15C19A/Virtual-Intelligence-Conference-and-CTF-benefitting.23.3.part2.rar
https://nitro.download/view/B4E129422244E34/Virtual-Intelligence-Conference-and-CTF-benefitting.23.3.part3.rar
https://nitro.download/view/8C6BAE0D4CC0F5F/Virtual-Intelligence-Conference-and-CTF-benefitting.23.3.part4.rar
lzLY3aA.png

Code:
https://rapidgator.net/file/7921a1e62501ca11f01e2fb01cc2fe1e/Virtual-Intelligence-Conference-and-CTF-benefitting.23.3.part1.rar.html
https://rapidgator.net/file/8e37ba6df9719f066455671a4f269d80/Virtual-Intelligence-Conference-and-CTF-benefitting.23.3.part2.rar.html
https://rapidgator.net/file/cea99cc048cf50360474f330fd090304/Virtual-Intelligence-Conference-and-CTF-benefitting.23.3.part3.rar.html
https://rapidgator.net/file/045738a0ab2b21f01e7bb38ef70cf564/Virtual-Intelligence-Conference-and-CTF-benefitting.23.3.part4.rar.html
If any links die or problem unrar, send request to
Code:
https://forms.gle/e557HbjJ5vatekDV9
 

Users who are viewing this thread

Back
Top