Curated Video
Fundamentals of Secure Software - OpenID and OpenID Connect
This video talks about OpenID and why it is used.
Curated Video
Fundamentals of Secure Software - CSP (Content Security Policy)
This video demonstrates the Content Security Policy.
Curated Video
Fundamentals of Secure Software - Identification and Authentication Failures
This video explains identification and authentication failures.
Curated Video
Fundamentals of Secure Software - Broken Access Control
This video talks about Broken authentication.
Curated Video
Fundamentals of Secure Software - Introduction to OWASP Top 10
This video is a high-level walkthrough of the OWASP Top 10 and other OWASP resources.
Curated Video
Fundamentals of Secure Software - Application Security Goals
In this video, we will continue defining terms and start talking about security goals.
Curated Video
Fundamentals of Secure Software - Application Security Terms and Definitions
In this video, we will cover the initial terms and definitions related to application security.
Curated Video
A Detailed Guide to the OWASP Top 10 - API9:2023 Improper Inventory Management
In this session, we will address the challenges of Improper Inventory Management in API ecosystems and propose solutions for better management.
Curated Video
A Detailed Guide to the OWASP Top 10 - API5:2023 Broken Function Level Authorization
In this session, we will analyze Broken Function Level Authorization, understanding its impact on API security and methods to prevent it.
Curated Video
A Detailed Guide to the OWASP Top 10 - API3:2023 Broken Object Property Level Authorization
In this session, we will uncover the dangers of Broken Object Property Level Authorization and learn effective prevention techniques.
Curated Video
A Detailed Guide to the OWASP Top 10 - API2:2023 Broken Authentication
In this video, examine the critical security risk of Broken Authentication within APIs and discuss methods for securing authentication mechanisms.
Curated Video
A Detailed Guide to the OWASP Top 10 - API1:2023 Broken Object Level Authorization (BOLA)
In this session, we will delve into the Broken Object Level Authorization risk, its implications, and strategies for mitigation.
Curated Video
A Detailed Guide to the OWASP Top 10 - API Endpoints
In this video, we will learn about API endpoints, their role in API architecture, and how they interact with web applications.
Curated Video
A Detailed Guide to the OWASP Top 10 - #10 Server-Side Request Forgery Prevention
This video explains the prevention of Server-Side Request Forgery.
Curated Video
A Detailed Guide to the OWASP Top 10 - #10 Server-Side Request Forgery
This video explains A10: 2021 - Server-Side Request Forgery (SSRF).
Curated Video
A Detailed Guide to the OWASP Top 10 - #5 Security Misconfiguration Prevention
This video explains the steps to be taken to prevent the OWASP 05 security misconfiguration.
Curated Video
A Detailed Guide to the OWASP Top 10 - #1 Broken Access Control Prevention
This video explains how to prevent broken access control on our website or on our applications.
Curated Video
A Detailed Guide to the OWASP Top 10 - #1 Broken Access Control
This video explains A01:2021 - broken access control, which is the most significant security risk-facing application.
Curated Video
A Detailed Guide to the OWASP Top 10 - The Tools We Shall Use
This video explains the tools that we will be using in the course, such as Hacksplaining.
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - You Have Been HACKED - Now What?
In this video, you will look at steps to take after you have been hacked and how exactly you would respond. This clip is from the chapter "Conclusion" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Checking Default App Permissions - IOS
This video talks about the kinds of permissions the applications have on an iOS device and how to reset the permission on an iOS device. This clip is from the chapter "Mobile Security" of the series "The Absolute Beginners Guide to...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Checking Default App Permissions - Android
This video talks about the kinds of permissions the applications have on an Android device. We will look at app permissions such as Instagram, Rebtel, and introduce to you an app to manage the permissions quickly and effectively. This...