FV

Frank Victory

Sort by
Container security Familiar problems in new technology
Kealy OWASP interactive_artifacts
Automation and open source turning the tide on the attackers
CNG 256 cloud computing
CNG 256 wireless wi-fi and bluetooth
Differential learning SnowFROC 2017
Phishing Forensics - SnowFROC - Denver Chapter of OWASP
Active defensecombo clean
Dns security threats and solutions
Cng 125 – chapter 12 network policies
Authentication vs authorization
9.0 security (2)
Lesson 6 web based attacks