Curated Video
Fundamentals of Secure Software - Demo of Fiddler with JuiceShop
This video is about using Fiddler to tamper with parameters in JuiceShop.
Curated Video
Fundamentals of Secure Software - Proxy Tools
This video provides an introduction to proxy tools and their purpose.
Curated Video
Fundamentals of Secure Software - Defense In-Depth
This video explains defense in-depth and its purpose.
Curated Video
Fundamentals of Secure Software - Threat Actors and More Definitions
This video demonstrates the different attackers that threaten software and systems. You will look at more foundational definitions.
Curated Video
Fundamentals of Secure Software - SANS Top 25
This video provides an introduction to the SANS Top 25.
Curated Video
Fundamentals of Secure Software - Introduction to OWASP Top 10
This video is a high-level walkthrough of the OWASP Top 10 and other OWASP resources.
Curated Video
Fundamentals of Secure Software - OWASP WebGoat Demo
WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security videos. In this video, we will do a brief demo to get you started on using WebGoat.
Curated Video
Fundamentals of Secure Software - Application Security Goals
In this video, we will continue defining terms and start talking about security goals.
Curated Video
Fundamentals of Secure Software - Application Security Terms and Definitions
In this video, we will cover the initial terms and definitions related to application security.
Curated Video
Fundamentals of Secure Software - Introduction to Application Security
In this video, we will lay the groundwork for what an SDLC looks like.
Curated Video
A Detailed Guide to the OWASP Top 10 - #2 Cryptographic Failures
This video explains A02: 2021 - cryptographic failures, which focuses on failures related to cryptography.
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - You Have Been HACKED - Now What?
In this video, you will look at steps to take after you have been hacked and how exactly you would respond. This clip is from the chapter "Conclusion" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Identify Legit Apps
In this video, the author shares a few tips on how to successfully navigate Google Play Store and download the right kind of application to help you identify legit apps and spot the fake apps out there. This clip is from the chapter...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Personal Cybersecurity - What I Do
In this video, the author talks about the necessary steps that he takes to keep himself and his data safe from malware and hackers. This clip is from the chapter "Introduction" of the series "The Absolute Beginners Guide to Cybersecurity...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Checking Default App Permissions - IOS
This video talks about the kinds of permissions the applications have on an iOS device and how to reset the permission on an iOS device. This clip is from the chapter "Mobile Security" of the series "The Absolute Beginners Guide to...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Checking Default App Permissions - Android
This video talks about the kinds of permissions the applications have on an Android device. We will look at app permissions such as Instagram, Rebtel, and introduce to you an app to manage the permissions quickly and effectively. This...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Understanding App Permissions
This video talks about app permissions and the kind of permissions that an application demands while you install them on your phone. These permissions can be features or tools that the app needs in order to function properly. This clip...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Introduction
This is an introduction to the section in which the author talks about mobile cybersecurity. This clip is from the chapter "Mobile Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".In this section, you...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Set Up a Recovery Email
In this video, the author shows you how to set up a recovery email account the right way. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Google Account - Part 2
In part 2 of the video, which focuses on securing your Google account, you will look at signing into other sites part of the security. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Google Account
In this video, you will learn to secure your Google account. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section focuses on...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Email Data Management
In this video, the author talks about a few tips on how best to protect yourself in case your email gets hacked. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute Beginners Guide to...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Phishing Attacks
In this video, you will learn about Phishing attacks. It is an attempt by a hacker to obtain sensitive data by sending crafted emails to a potential victim while impersonating a known person or body. This clip is from the chapter "Social...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Twitter Account
In this video, you will discover effective strategies to enhance the security of your Twitter account, ensuring its protection and safeguarding your personal information. This clip is from the chapter "Social Media Security and Email...