YearUp: Hacking for Jobs

Sam Bowne
Sam BowneInstructor at CCSF
Hacking for Jobs
YearUp, Dec. 6, 2016
Sam Bowne
City College San Francisco
All materials available at samsclass.info
• Hacking is indeed a circus
• Is that supposed to be a bad
thing?
Challenging Students
Student Diversity
• Beginners
• Old-school mainframe programmers
upgrading skills
• Amateurs from hackerspaces
• Professional IT workers
• Professional infosec workers
Levels of Achievement
• Memorize definitions of terms
• Hands-on projects with step-by-step
instructions
• Challenges without instructions
• Capture the Flag Competitions
• Professional information security employment
Violent Python
• Step-by-step project
• Challenges
• No instructions
• Increasing difficulty
• ty @mqaissaunee
YearUp: Hacking for Jobs
YearUp: Hacking for Jobs
YearUp: Hacking for Jobs
YearUp: Hacking for Jobs
YearUp: Hacking for Jobs
April 2014: Heartbleed
Vulnerable
Android
Devices
YearUp: Hacking for Jobs
A Job from One Tweet
Exploit Development Class
Command Injection
YearUp: Hacking for Jobs
YearUp: Hacking for Jobs
CNIT 127: Exploit
Development
YearUp: Hacking for Jobs
Buffer Overflow Vulnerability
• Input more than 1024 bytes will overflow the
buffer
DoS Exploit
Nonrepeating Pattern
Gnu Debugger
Generate Shellcode with
msfvenom
Construct Exploit
The Stack Frame
• The last word is the return value
• Must jump into the NOP sled
Listening Shell
Pwnage
Remote Code Execution
YearUp: Hacking for Jobs
YearUp: Hacking for Jobs
Vulnerability Disclosure
• ty @bugcrowd
Hacked by Anonsec
XSS
Rooted My Server
Rooted Twice the Same Way
• My first attempt to patch the vulnerability
failed
• With the help of a student, I got my kernel
updated after this
Stealing My Password
• Shoulder surfing
• http://tinyurl.com/
samspw
CTFs
How to Start
1. PicoCTF
2. EasyCTF
3. CTFTime
• Many levels, from very easy to very hard
• Complete walkthroughs
Graphical Gameboard
YearUp: Hacking for Jobs
• 1 week long
• Many easy problems, but also hard ones
• Sign up to hear about other easy CTFs
Write-Ups
YearUp: Hacking for Jobs
Find CTFs
Walk-Throughs!
YearUp: Hacking for Jobs
YearUp: Hacking for Jobs
YearUp: Hacking for Jobs
YearUp: Hacking for Jobs
YearUp: Hacking for Jobs
YearUp: Hacking for Jobs
Hacking Club
YearUp: Hacking for Jobs
YearUp: Hacking for Jobs
Remote Speakers
• Projector, webcam, Skype, speakers
• Two talks from professional penetration
testers
Student Contributions
• Cleaning up the lab to make an inviting
hangout space
• Bridging to the CCSF_Coders club
• Technical expertise from Google vuln labs
• Hacker contacts from Defcon, etc.
Hacking Lab
Free Fire Zone
YearUp: Hacking for Jobs
Signs on Wall
Keylogger
• One student wrote a Python keylogger and
installed it on the lab machines
YearUp: Hacking for Jobs
Lockpicking
Make Easy Locks
• Get cheap locks at Home Depot
• 2 for $11
• Normal lock has 5 pins
• Remove pins to make locks with 1, 2, 3, 4
pins
Cheap Locks are Fine
Re-Keying Kit ($11)
Remove the Clip
Insert Key, Turn to 45°
Slide Cylinder Out
Root Canal
• Actual re-keying involves carefully removing
pins and replacing them with pins of different
length
• But all we need is to remove pins & springs
entirely, making the lock easier to pick
Lockpick Training Set
YearUp: Hacking for Jobs
Internships
Employers
• OpenDNS
• NASA Ames
• Lawrence Berkeley Lab
• San Francisco Housing Authority
• UCSF Medical Center
Job Fair
• Students bring resumes at first (and only) class
meeting
• Employers describe jobs and grab applicants
on the spot
• Everyone welcome, including ex-students,
students from the Computer Science
department, students not enrolled in the
internship class
Administrative Resistance
• CCSF administrators cancelled the entire
program in Spring 2015
• I only saved it by appealing directly to the
Chancellor and threatening to resign
• However, the person who cancelled it is now
the Chancellor
Administrative Resistance
• The new curriculum review process doesn't
allow any class without lectures, textbook,
final exam, etc.
• This blocks seminar classes and Internship
classes
• The solution is to just break the rules--this is
what tenure is for
Guest Speakers
• At least one per class per semester
• "Careers" class consisting of visiting
industry speakers
YearUp: Hacking for Jobs
1 of 82

Recommended

The Security Circus by
The Security CircusThe Security Circus
The Security CircusSam Bowne
688 views81 slides
.NET Core Summer event 2019 in Vienna, AT - War stories from .NET team -- Kar... by
.NET Core Summer event 2019 in Vienna, AT - War stories from .NET team -- Kar....NET Core Summer event 2019 in Vienna, AT - War stories from .NET team -- Kar...
.NET Core Summer event 2019 in Vienna, AT - War stories from .NET team -- Kar...Karel Zikmund
68 views21 slides
.NET Core Summer event 2019 in NL - War stories from .NET team -- Karel Zikmund by
.NET Core Summer event 2019 in NL - War stories from .NET team -- Karel Zikmund.NET Core Summer event 2019 in NL - War stories from .NET team -- Karel Zikmund
.NET Core Summer event 2019 in NL - War stories from .NET team -- Karel ZikmundKarel Zikmund
68 views21 slides
NDC Oslo 2019 - War stories from .NET team -- Karel Zikmund by
NDC Oslo 2019 - War stories from .NET team -- Karel ZikmundNDC Oslo 2019 - War stories from .NET team -- Karel Zikmund
NDC Oslo 2019 - War stories from .NET team -- Karel ZikmundKarel Zikmund
88 views23 slides
DevOps Security Coffee - Lazy hackers who think out of the box, but stay in t... by
DevOps Security Coffee - Lazy hackers who think out of the box, but stay in t...DevOps Security Coffee - Lazy hackers who think out of the box, but stay in t...
DevOps Security Coffee - Lazy hackers who think out of the box, but stay in t...Freek Kauffmann
933 views23 slides
Honeypots, Cybercompetitions, and Bug Bounties by
Honeypots, Cybercompetitions, and Bug BountiesHoneypots, Cybercompetitions, and Bug Bounties
Honeypots, Cybercompetitions, and Bug BountiesSam Bowne
453 views70 slides

More Related Content

Viewers also liked

CNIT 140: Perimeter Security by
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter SecuritySam Bowne
1.6K views22 slides
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis by
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic AnalysisCNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic AnalysisSam Bowne
2.6K views46 slides
CNIT 123: Ch 1 Ethical Hacking Overview by
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewSam Bowne
2.7K views28 slides
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2) by
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)Sam Bowne
1.2K views30 slides
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D... by
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...Sam Bowne
955 views70 slides
CNIT 129S: Ch 3: Web Application Technologies by
CNIT 129S: Ch 3: Web Application TechnologiesCNIT 129S: Ch 3: Web Application Technologies
CNIT 129S: Ch 3: Web Application TechnologiesSam Bowne
1.2K views83 slides

Viewers also liked(20)

CNIT 140: Perimeter Security by Sam Bowne
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter Security
Sam Bowne1.6K views
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis by Sam Bowne
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic AnalysisCNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
Sam Bowne2.6K views
CNIT 123: Ch 1 Ethical Hacking Overview by Sam Bowne
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking Overview
Sam Bowne2.7K views
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2) by Sam Bowne
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)
Sam Bowne1.2K views
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D... by Sam Bowne
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
Sam Bowne955 views
CNIT 129S: Ch 3: Web Application Technologies by Sam Bowne
CNIT 129S: Ch 3: Web Application TechnologiesCNIT 129S: Ch 3: Web Application Technologies
CNIT 129S: Ch 3: Web Application Technologies
Sam Bowne1.2K views
CNIT 129S: Ch 5: Bypassing Client-Side Controls by Sam Bowne
CNIT 129S: Ch 5: Bypassing Client-Side ControlsCNIT 129S: Ch 5: Bypassing Client-Side Controls
CNIT 129S: Ch 5: Bypassing Client-Side Controls
Sam Bowne2.2K views
CNIT 121: 12 Investigating Windows Systems (Part 3) by Sam Bowne
CNIT 121: 12 Investigating Windows Systems (Part 3)CNIT 121: 12 Investigating Windows Systems (Part 3)
CNIT 121: 12 Investigating Windows Systems (Part 3)
Sam Bowne1.1K views
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3) by Sam Bowne
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
Sam Bowne1.1K views
CNIT 40: 6: DNSSEC and beyond by Sam Bowne
CNIT 40: 6: DNSSEC and beyondCNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyond
Sam Bowne721 views
CNIT 129S: Ch 4: Mapping the Application by Sam Bowne
CNIT 129S: Ch 4: Mapping the ApplicationCNIT 129S: Ch 4: Mapping the Application
CNIT 129S: Ch 4: Mapping the Application
Sam Bowne1.7K views
CNIT 121: 2 IR Management Handbook by Sam Bowne
CNIT 121: 2 IR Management HandbookCNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management Handbook
Sam Bowne1.9K views
CNIT 129S: Securing Web Applications Ch 1-2 by Sam Bowne
CNIT 129S: Securing Web Applications Ch 1-2CNIT 129S: Securing Web Applications Ch 1-2
CNIT 129S: Securing Web Applications Ch 1-2
Sam Bowne2K views
CNIT 129S: 8: Attacking Access Controls by Sam Bowne
CNIT 129S: 8: Attacking Access ControlsCNIT 129S: 8: Attacking Access Controls
CNIT 129S: 8: Attacking Access Controls
Sam Bowne1.2K views
CNIT 121: 11 Analysis Methodology by Sam Bowne
CNIT 121: 11 Analysis MethodologyCNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis Methodology
Sam Bowne966 views
CNIT 129S: Ch 6: Attacking Authentication by Sam Bowne
CNIT 129S: Ch 6: Attacking AuthenticationCNIT 129S: Ch 6: Attacking Authentication
CNIT 129S: Ch 6: Attacking Authentication
Sam Bowne1.2K views
CNIT 129S: 13: Attacking Users: Other Techniques (Part 1 of 2) by Sam Bowne
CNIT 129S: 13: Attacking Users: Other Techniques (Part 1 of 2)CNIT 129S: 13: Attacking Users: Other Techniques (Part 1 of 2)
CNIT 129S: 13: Attacking Users: Other Techniques (Part 1 of 2)
Sam Bowne692 views
CNIT 121: Computer Forensics Ch 1 by Sam Bowne
CNIT 121: Computer Forensics Ch 1CNIT 121: Computer Forensics Ch 1
CNIT 121: Computer Forensics Ch 1
Sam Bowne2.5K views
CNIT 121: 3 Pre-Incident Preparation by Sam Bowne
CNIT 121: 3 Pre-Incident PreparationCNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident Preparation
Sam Bowne2K views
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection by Sam Bowne
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data CollectionCNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
Sam Bowne1.3K views

Similar to YearUp: Hacking for Jobs

Lessons Learned from Continuous Delivery by
Lessons Learned from Continuous DeliveryLessons Learned from Continuous Delivery
Lessons Learned from Continuous DeliveryMandi Walls
295 views32 slides
It's XP Stupid (2019) by
It's XP Stupid (2019)It's XP Stupid (2019)
It's XP Stupid (2019)Mike Harris
36 views38 slides
Technical Excellence Doesn't Just Happen--Igniting a Craftsmanship Culture by
Technical Excellence Doesn't Just Happen--Igniting a Craftsmanship CultureTechnical Excellence Doesn't Just Happen--Igniting a Craftsmanship Culture
Technical Excellence Doesn't Just Happen--Igniting a Craftsmanship CultureAllison Pollard
947 views46 slides
Outpost24 webinar: Turning DevOps and security into DevSecOps by
Outpost24 webinar: Turning DevOps and security into DevSecOpsOutpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24 webinar: Turning DevOps and security into DevSecOpsOutpost24
197 views33 slides
It's XP, Stupid by
It's XP, StupidIt's XP, Stupid
It's XP, StupidMike Harris
224 views37 slides
Technical debt in space jesse warden - 100yss 2015 by
Technical debt in space   jesse warden - 100yss 2015Technical debt in space   jesse warden - 100yss 2015
Technical debt in space jesse warden - 100yss 2015Jesse Warden
657 views39 slides

Similar to YearUp: Hacking for Jobs(20)

Lessons Learned from Continuous Delivery by Mandi Walls
Lessons Learned from Continuous DeliveryLessons Learned from Continuous Delivery
Lessons Learned from Continuous Delivery
Mandi Walls295 views
It's XP Stupid (2019) by Mike Harris
It's XP Stupid (2019)It's XP Stupid (2019)
It's XP Stupid (2019)
Mike Harris36 views
Technical Excellence Doesn't Just Happen--Igniting a Craftsmanship Culture by Allison Pollard
Technical Excellence Doesn't Just Happen--Igniting a Craftsmanship CultureTechnical Excellence Doesn't Just Happen--Igniting a Craftsmanship Culture
Technical Excellence Doesn't Just Happen--Igniting a Craftsmanship Culture
Allison Pollard947 views
Outpost24 webinar: Turning DevOps and security into DevSecOps by Outpost24
Outpost24 webinar: Turning DevOps and security into DevSecOpsOutpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24197 views
Technical debt in space jesse warden - 100yss 2015 by Jesse Warden
Technical debt in space   jesse warden - 100yss 2015Technical debt in space   jesse warden - 100yss 2015
Technical debt in space jesse warden - 100yss 2015
Jesse Warden657 views
Hacker News Meetup April 2014 by Dan Quine
Hacker News Meetup April 2014Hacker News Meetup April 2014
Hacker News Meetup April 2014
Dan Quine1.3K views
What schools should be teaching IT students by Andy Lester
What schools should be teaching IT studentsWhat schools should be teaching IT students
What schools should be teaching IT students
Andy Lester1.6K views
The Great ID Challenge - DevLearn 2011 Session by WeejeeLearning by weejeelearning
The Great ID Challenge - DevLearn 2011 Session by WeejeeLearningThe Great ID Challenge - DevLearn 2011 Session by WeejeeLearning
The Great ID Challenge - DevLearn 2011 Session by WeejeeLearning
weejeelearning520 views
10 Things I Wish I Dad Known Before Scaling Deep Learning Solutions by Jesus Rodriguez
10 Things I Wish I Dad Known Before Scaling Deep Learning Solutions10 Things I Wish I Dad Known Before Scaling Deep Learning Solutions
10 Things I Wish I Dad Known Before Scaling Deep Learning Solutions
Jesus Rodriguez3.5K views
An Open Source Platform for Social Science Research by Jazkarta, Inc.
An Open Source Platform for Social Science ResearchAn Open Source Platform for Social Science Research
An Open Source Platform for Social Science Research
Jazkarta, Inc.794 views
Real World Application of Development by djones101
Real World Application of DevelopmentReal World Application of Development
Real World Application of Development
djones101304 views
OpenSubmit - How to grade 1200 code submissions by Peter Tröger
OpenSubmit - How to grade 1200 code submissionsOpenSubmit - How to grade 1200 code submissions
OpenSubmit - How to grade 1200 code submissions
Peter Tröger314 views
Lessons learned after 190M lessons served by Ricardo Bánffy
Lessons learned after 190M lessons servedLessons learned after 190M lessons served
Lessons learned after 190M lessons served
Ricardo Bánffy155 views
Ask the XPages Experts by Teamstudio
Ask the XPages ExpertsAsk the XPages Experts
Ask the XPages Experts
Teamstudio1.2K views
Owasp tds by snyff
Owasp tdsOwasp tds
Owasp tds
snyff647 views
Testistanbul 2016 - Keynote: "The Story of Appium" by Dan Cuellar by Turkish Testing Board
Testistanbul 2016 - Keynote: "The Story of Appium" by Dan CuellarTestistanbul 2016 - Keynote: "The Story of Appium" by Dan Cuellar
Testistanbul 2016 - Keynote: "The Story of Appium" by Dan Cuellar
Keeping ontology development Agile by robertstevens65
Keeping ontology development AgileKeeping ontology development Agile
Keeping ontology development Agile
robertstevens65429 views

More from Sam Bowne

Cyberwar by
CyberwarCyberwar
CyberwarSam Bowne
14 views22 slides
3: DNS vulnerabilities by
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities Sam Bowne
40 views40 slides
8. Software Development Security by
8. Software Development Security8. Software Development Security
8. Software Development SecuritySam Bowne
22 views85 slides
4 Mapping the Application by
4 Mapping the Application4 Mapping the Application
4 Mapping the ApplicationSam Bowne
62 views88 slides
3. Attacking iOS Applications (Part 2) by
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)Sam Bowne
33 views45 slides
12 Elliptic Curves by
12 Elliptic Curves12 Elliptic Curves
12 Elliptic CurvesSam Bowne
54 views50 slides

More from Sam Bowne(20)

3: DNS vulnerabilities by Sam Bowne
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
Sam Bowne40 views
8. Software Development Security by Sam Bowne
8. Software Development Security8. Software Development Security
8. Software Development Security
Sam Bowne22 views
4 Mapping the Application by Sam Bowne
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
Sam Bowne62 views
3. Attacking iOS Applications (Part 2) by Sam Bowne
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
Sam Bowne33 views
12 Elliptic Curves by Sam Bowne
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
Sam Bowne54 views
11. Diffie-Hellman by Sam Bowne
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
Sam Bowne58 views
2a Analyzing iOS Apps Part 1 by Sam Bowne
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
Sam Bowne42 views
9 Writing Secure Android Applications by Sam Bowne
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
Sam Bowne31 views
12 Investigating Windows Systems (Part 2 of 3) by Sam Bowne
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
Sam Bowne30 views
12 Investigating Windows Systems (Part 1 of 3 by Sam Bowne
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
Sam Bowne59 views
9. Hard Problems by Sam Bowne
9. Hard Problems9. Hard Problems
9. Hard Problems
Sam Bowne43 views
8 Android Implementation Issues (Part 1) by Sam Bowne
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
Sam Bowne23 views
11 Analysis Methodology by Sam Bowne
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
Sam Bowne12 views
8. Authenticated Encryption by Sam Bowne
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
Sam Bowne70 views
7. Attacking Android Applications (Part 2) by Sam Bowne
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
Sam Bowne35 views
7. Attacking Android Applications (Part 1) by Sam Bowne
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
Sam Bowne26 views
5. Stream Ciphers by Sam Bowne
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
Sam Bowne108 views
6 Scope & 7 Live Data Collection by Sam Bowne
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
Sam Bowne121 views

Recently uploaded

GCSE Media by
GCSE MediaGCSE Media
GCSE MediaWestHatch
48 views46 slides
Java Simplified: Understanding Programming Basics by
Java Simplified: Understanding Programming BasicsJava Simplified: Understanding Programming Basics
Java Simplified: Understanding Programming BasicsAkshaj Vadakkath Joshy
532 views155 slides
STRATEGIC MANAGEMENT MODULE 1_UNIT1 _UNIT2.pdf by
STRATEGIC MANAGEMENT MODULE 1_UNIT1 _UNIT2.pdfSTRATEGIC MANAGEMENT MODULE 1_UNIT1 _UNIT2.pdf
STRATEGIC MANAGEMENT MODULE 1_UNIT1 _UNIT2.pdfDr Vijay Vishwakarma
87 views68 slides
Monthly Information Session for MV Asterix (November) by
Monthly Information Session for MV Asterix (November)Monthly Information Session for MV Asterix (November)
Monthly Information Session for MV Asterix (November)Esquimalt MFRC
91 views26 slides
Collective Bargaining and Understanding a Teacher Contract(16793704.1).pptx by
Collective Bargaining and Understanding a Teacher Contract(16793704.1).pptxCollective Bargaining and Understanding a Teacher Contract(16793704.1).pptx
Collective Bargaining and Understanding a Teacher Contract(16793704.1).pptxCenter for Integrated Training & Education
96 views57 slides
ICS3211_lecture 09_2023.pdf by
ICS3211_lecture 09_2023.pdfICS3211_lecture 09_2023.pdf
ICS3211_lecture 09_2023.pdfVanessa Camilleri
126 views10 slides

Recently uploaded(20)

Monthly Information Session for MV Asterix (November) by Esquimalt MFRC
Monthly Information Session for MV Asterix (November)Monthly Information Session for MV Asterix (November)
Monthly Information Session for MV Asterix (November)
Esquimalt MFRC91 views
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx by Ms. Pooja Bhandare
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptxPharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx
Ms. Pooja Bhandare120 views
Retail Store Scavenger Hunt.pptx by jmurphy154
Retail Store Scavenger Hunt.pptxRetail Store Scavenger Hunt.pptx
Retail Store Scavenger Hunt.pptx
jmurphy15447 views
GCSE Spanish by WestHatch
GCSE SpanishGCSE Spanish
GCSE Spanish
WestHatch53 views
GCSE Geography by WestHatch
GCSE GeographyGCSE Geography
GCSE Geography
WestHatch47 views
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant... by Ms. Pooja Bhandare
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Ms. Pooja Bhandare166 views
Relationship of psychology with other subjects. by palswagata2003
Relationship of psychology with other subjects.Relationship of psychology with other subjects.
Relationship of psychology with other subjects.
palswagata200377 views
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx by ISSIP
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
ISSIP407 views

YearUp: Hacking for Jobs