Submit Search
EnclaveSecurity
18
SlideShares
44
Followers
Block User
18
SlideShares
44
Followers
Presentations
(18)
See all
Using an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized Defense
The CIS Critical Security Controls the International Standard for Defense
The CIS Critical Security Controls the International Standard for Defense
Automating Post Exploitation with PowerShell
Automating Post Exploitation with PowerShell
Enterprise PowerShell for Remote Security Assessments
Enterprise PowerShell for Remote Security Assessments
An Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security Assessments
Practical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device security