Here are a few training videos I had made for new analysts. Geared towards performing an investigation for suspected inbound phishing activity, these videos gave the new analyst an investigative methodology to perform basic triage, finding common Indicators of Compromise (IOCs) for blocking, all the while keeping themselves and their corporate environment safe.
Here are a few other cyber-security related videos that really do not fit in anywhere else.
These slides are from my presentation on .dll Search Order Hijacking given at a Sony internal training event back in 2017. It does not go into overwhelming detail, just a general overview on the topic. The slides haves been saved here in PDF format.