Channel Avatar

VetSec @UCToriQ3j1xonxRqI-EMtFqA@youtube.com

654 subscribers - no pronouns :c

Official videos of VetSec, Inc. VetSec is a US-based regist


48:24
Cybersecurity: How to See the Threat You Can't See
24:07
Warriors Ethos: Helping Veterans Find Jobs
23:36
Veteran's Guide to Private Sector Compensation
21:57
Military Transition and Mental Health - Tom Marsland
22:25
Targeted Security Tips for an Evolving Cyber Battlefield
29:32
Machine Learning Basics for Cybersecurity Professionals
06:22
Getting Resume Help Through VetSec
07:39
Conference Wrap Up - VetSecCon '23
44:52
Staying Afloat in a Tsunami of Security Information
44:06
Tales of Physical Penetration Tests: How to Defend Your Org
44:53
Still Serving: An Overview of CISA and Federal Employment
43:41
Shades of Gray: Transitioning from Military Intelligence to CTI
40:30
Using Informal Table-Tops to Build Better Teams and Processes in Cybersecurity
45:59
The Four Horses of Evil: Threat Actors & Malware, May – June
39:17
Military Transitions: What to Expect when You're Only Half Expecting
49:22
Why are you here? Surviving as a security professional.
41:37
Open Source Tools for Adversary Emulation
41:22
How CTI Platforms/STIX are Changing the Game
39:30
Kubehound: A Scalable Kubernetes Attack Graph Model
35:25
How I went from homeless to Google: Managing the Military Transition
44:42
My Military Transition - The Importance of Networking & Mental Health
47:23
It's Always DNS: How to Troubleshoot DNS Issues
39:28
Infosec Veteran Social Impact: How to volunteer your cyberdefense skills without getting burned out
49:12
Cyberpunk Security - Refreshing your security mindset
42:20
Effective Adversary Emulation
44:25
Hiring analysts, the inside scoop
01:10:37
Hook, Line, and Sinker: Unraveling the Bait of Modern Phishing
45:02
Cybersecurity GRC: Your Next Mission with a Twist!
29:19
Capture The Flags: The Missing Link Between Training and Employment
37:28
College Student to Penetration Tester Using Discord
01:17:52
Cloud, Kubernetes, Infrastructure as Code, DevOps
02:58:56
Resumes and Refreshments - VetSecCon '23
44:27
Build A New Team: Starting Your Own Cybersecurity Company
15:07
The Mission of VetSec - VetSecCon '23
43:26
Journey to Cybersecurity - Maril Vernon - VetSecCon '23 Keynote
14:10
Opening Ceremonies - VetSecCon 2022
03:38:33
Hacking Radio Frequencies with Software-Defined Radio - Michael Smith
02:48:44
Resumes and Refreshments - John Stoner and Warren Fish - VetSecCon '22
01:38:06
LinkedIn Branding and Networking - Jax Scott - VetSecCon '22
43:44
How We Found Our Next Missions in Cybersecurity - Steve Scoles and Joe Roesch - VetSecCon '22
03:23:22
How to Build an Effective Intel Analysis Program - Daniel Stiegman - VetSecCon '22
47:55
Hit Your Career Goal with Professional Help & Free Resources - Patrick Gillespie - VetSecCon '22
02:01:05
Building a True OpenSOC Solution for Nearly Free - Robert Bingham - VetSecCon '22
01:27:08
Demystify Computer Networking: A Hands-on Approach - Sam Wong - VetSecCon '22
12:28
The Equilibrium of Easy & Impossible - Peter Cline - VetSecCon '22
40:57
Accelerate Your Cyber Career - Maril Vernon - VetSecCon '22
35:25
How to Engineer Your Military Transition into a Tech Career - Anouar Bencheqroun - VetSecCon '22
19:52
The Mission of VetSec - Tom Marsland - VetSecCon '22
45:39
Getting Your First Cyber Job Isn't Easy - Tom Marsland and Greg Ake - VetSecCon '22
47:49
How Amazon is Helping - Jason Edwards - VetSecCon '22
40:53
Cyber Physical Security Nexxus - Chris Wolski and Panel
46:32
Keynote: The Perfect Weapons: Vets as Cybersecurity Leaders - John Hultquist - VetSecCon '22
46:41
Building a Better DDoS Strategy - Michael Smith - VetSecCon '22
43:57
Leading in the Eye of the Storm - Benjamin Spencer - VetSecCon '22
39:56
Web Application Penetration Methodology - Mike Padrick - VetSecCon '22
42:12
Escapades in DFIR, An Incident Responder's Perspective - Mark Nakamura - VetSecCon '22
45:32
Reducing Software Vulnerability at a Global Scale
35:33
Resilience: Beyond Security and Continuity
42:16
The Business of Ransomware
39:29
Meshing up Zero Trust Network Architecture