Instructional Video5:10
Curated Video

Fundamentals of Secure Software - OpenID and OpenID Connect

Higher Ed
This video talks about OpenID and why it is used.
Instructional Video5:30
Curated Video

Fundamentals of Secure Software - OAuth

Higher Ed
This video explains OAuth and how it is used.
Instructional Video5:11
Curated Video

Fundamentals of Secure Software - CSP (Content Security Policy)

Higher Ed
This video demonstrates the Content Security Policy.
Instructional Video3:56
Curated Video

Fundamentals of Secure Software - Identification and Authentication Failures

Higher Ed
This video explains identification and authentication failures.
Instructional Video5:24
Curated Video

Fundamentals of Secure Software - Broken Access Control

Higher Ed
This video talks about Broken authentication.
Instructional Video8:55
Curated Video

Fundamentals of Secure Software - API Security

Higher Ed
This video explains API security.
Instructional Video9:22
Curated Video

Fundamentals of Secure Software - Introduction to OWASP Top 10

Higher Ed
This video is a high-level walkthrough of the OWASP Top 10 and other OWASP resources.
Instructional Video9:46
Curated Video

Fundamentals of Secure Software - Application Security Goals

Higher Ed
In this video, we will continue defining terms and start talking about security goals.
Instructional Video6:49
Curated Video

Fundamentals of Secure Software - Application Security Terms and Definitions

Higher Ed
In this video, we will cover the initial terms and definitions related to application security.
Instructional Video6:46
Curated Video

A Detailed Guide to the OWASP Top 10 - API9:2023 Improper Inventory Management

Higher Ed
In this session, we will address the challenges of Improper Inventory Management in API ecosystems and propose solutions for better management.
Instructional Video4:05
Curated Video

A Detailed Guide to the OWASP Top 10 - API5:2023 Broken Function Level Authorization

Higher Ed
In this session, we will analyze Broken Function Level Authorization, understanding its impact on API security and methods to prevent it.
Instructional Video5:27
Curated Video

A Detailed Guide to the OWASP Top 10 - API3:2023 Broken Object Property Level Authorization

Higher Ed
In this session, we will uncover the dangers of Broken Object Property Level Authorization and learn effective prevention techniques.
Instructional Video6:33
Curated Video

A Detailed Guide to the OWASP Top 10 - API2:2023 Broken Authentication

Higher Ed
In this video, examine the critical security risk of Broken Authentication within APIs and discuss methods for securing authentication mechanisms.
Instructional Video6:49
Curated Video

A Detailed Guide to the OWASP Top 10 - API1:2023 Broken Object Level Authorization (BOLA)

Higher Ed
In this session, we will delve into the Broken Object Level Authorization risk, its implications, and strategies for mitigation.
Instructional Video3:25
Curated Video

A Detailed Guide to the OWASP Top 10 - API Endpoints

Higher Ed
In this video, we will learn about API endpoints, their role in API architecture, and how they interact with web applications.
Instructional Video2:56
Curated Video

A Detailed Guide to the OWASP Top 10 - #10 Server-Side Request Forgery Prevention

Higher Ed
This video explains the prevention of Server-Side Request Forgery.
Instructional Video8:14
Curated Video

A Detailed Guide to the OWASP Top 10 - #10 Server-Side Request Forgery

Higher Ed
This video explains A10: 2021 - Server-Side Request Forgery (SSRF).
Instructional Video2:00
Curated Video

A Detailed Guide to the OWASP Top 10 - #5 Security Misconfiguration Prevention

Higher Ed
This video explains the steps to be taken to prevent the OWASP 05 security misconfiguration.
Instructional Video2:58
Curated Video

A Detailed Guide to the OWASP Top 10 - #1 Broken Access Control Prevention

Higher Ed
This video explains how to prevent broken access control on our website or on our applications.
Instructional Video5:40
Curated Video

A Detailed Guide to the OWASP Top 10 - #1 Broken Access Control

Higher Ed
This video explains A01:2021 - broken access control, which is the most significant security risk-facing application.
Instructional Video2:19
Curated Video

A Detailed Guide to the OWASP Top 10 - The Tools We Shall Use

Higher Ed
This video explains the tools that we will be using in the course, such as Hacksplaining.
Instructional Video7:18
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - You Have Been HACKED - Now What?

Higher Ed
In this video, you will look at steps to take after you have been hacked and how exactly you would respond. This clip is from the chapter "Conclusion" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This...
Instructional Video2:02
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Checking Default App Permissions - IOS

Higher Ed
This video talks about the kinds of permissions the applications have on an iOS device and how to reset the permission on an iOS device. This clip is from the chapter "Mobile Security" of the series "The Absolute Beginners Guide to...
Instructional Video5:43
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Checking Default App Permissions - Android

Higher Ed
This video talks about the kinds of permissions the applications have on an Android device. We will look at app permissions such as Instagram, Rebtel, and introduce to you an app to manage the permissions quickly and effectively. This...