All current Conference Talks courses in 2024
731 Courses
Igniting React Native Upgrades with Flame AI - React Native EU
Discover Flame CLI, an AI-powered solution for streamlining React Native app upgrades. Learn how this innovative tool leverages LLMs to simplify the traditionally tedious upgrade process.
Trends, Challenges and Best Practices for AI at the Edge
Explore trends, challenges, and optimization techniques for AI inference at the edge, focusing on machine vision applications and addressing limitations of edge devices for real-time processing.
Tactical Post Exploitation
Explore tactical post-exploitation techniques with Carlos Perez, covering advanced strategies for penetration testing and security assessment after initial system compromise.
OSINT Beyond the Basics
Advanced techniques for gathering and analyzing open-source intelligence, exploring innovative methods to enhance investigative capabilities and uncover hidden information.
Collecting Underpants to Win Your Network
Discover strategies for network penetration testing, focusing on information gathering techniques and exploiting vulnerabilities to gain unauthorized access.
Hack3rcon II 1-4 Joshua Perry OSINT
Explore OSINT techniques for competitive intelligence, covering tools and strategies to gather information on companies, networks, and individuals through various online sources.
OSInt, Cyberstalking, Footprinting and Recon - Getting to Know You Part 2
Explore anti-social networks and Google hacking techniques for advanced online reconnaissance and information gathering. Learn effective strategies for uncovering digital footprints and enhancing cybersecurity awareness.
Next Generation Web Reconnaissance
Explore advanced web reconnaissance techniques for ethical hacking, including cutting-edge tools and strategies to gather critical information and identify vulnerabilities.
Living to the Singularity - Geeks Guide to a Healthy Lifestyle
Explore a geek's guide to healthy living, covering ancient diets, modern challenges, nutrition, stress management, and lifestyle recommendations for optimal well-being.
Exploiting the Zeroth Hour - Developing Your Advanced Persistent Threat to Pwn the N
Explore advanced persistent threat development techniques to enhance your cybersecurity skills and understand sophisticated attack methodologies for improved network defense.