Curated Video
Fundamentals of Secure Software - OWASP ZAP (Zed Attack Proxy)
In this video, we will install and configure OWASP ZAP.
Curated Video
Fundamentals of Secure Software - Server-Side Request Forgery
This video demonstrates server-side request forgery.
Curated Video
Fundamentals of Secure Software - Security Logging and Monitoring Failures
This video demonstrates insecure logging.
Curated Video
Fundamentals of Secure Software - Software and Data Integrity Failures
This video talks about software and data integrity failures.
Curated Video
Fundamentals of Secure Software - Identification and Authentication Failures
This video explains identification and authentication failures.
Curated Video
Fundamentals of Secure Software - Vulnerable and Outdated Components
This video explores using components with known vulnerabilities.
Curated Video
Fundamentals of Secure Software - Security Misconfiguration
This video talks about security misconfiguration.
Curated Video
Fundamentals of Secure Software - Insecure Design
This video explains the XML external entities.
Curated Video
Fundamentals of Secure Software - Cryptographic Failures
This video explains what sensitive data exposure is and talks about cryptographic failures.
Curated Video
Fundamentals of Secure Software - Broken Access Control
This video talks about Broken authentication.
Curated Video
Fundamentals of Secure Software - Demo of Fiddler with JuiceShop
This video is about using Fiddler to tamper with parameters in JuiceShop.
Curated Video
Fundamentals of Secure Software - Proxy Tools
This video provides an introduction to proxy tools and their purpose.
Curated Video
Fundamentals of Secure Software - Defense In-Depth
This video explains defense in-depth and its purpose.
Curated Video
Fundamentals of Secure Software - Threat Actors and More Definitions
This video demonstrates the different attackers that threaten software and systems. You will look at more foundational definitions.
Curated Video
Fundamentals of Secure Software - SANS Top 25
This video provides an introduction to the SANS Top 25.
Curated Video
Fundamentals of Secure Software - Introduction to OWASP Top 10
This video is a high-level walkthrough of the OWASP Top 10 and other OWASP resources.
Curated Video
Fundamentals of Secure Software - OWASP WebGoat Demo
WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security videos. In this video, we will do a brief demo to get you started on using WebGoat.
Curated Video
Fundamentals of Secure Software - Application Security Goals
In this video, we will continue defining terms and start talking about security goals.
Curated Video
Fundamentals of Secure Software - Application Security Terms and Definitions
In this video, we will cover the initial terms and definitions related to application security.
Curated Video
Fundamentals of Secure Software - Introduction to Application Security
In this video, we will lay the groundwork for what an SDLC looks like.
Curated Video
CISSP Crash Course - Federated Identities
This video explains centralized versus decentralized identities. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access...
Curated Video
Getting Started with HashiCorp Nomad - Learning Nomad Architecture
In this video, we will explore the Nomad architecture at a high level. We will understand a data center, region, and consensus related to Nomad. We will examine the single region architecture and server-client interaction. This clip is...