Curated Video
A Detailed Guide to the OWASP Top 10 - #5 Security Misconfiguration
This video explains the A05 - security misconfiguration using an attack scenario.
Curated Video
A Detailed Guide to the OWASP Top 10 - #4 Insecure Design Prevention
This video explains how to prevent insecure design when developing software.
Curated Video
A Detailed Guide to the OWASP Top 10 - #4 Insecure Design
This video explains the A04: 2021 - insecure design, which focuses on risks related to design and architectural flaws.
Curated Video
A Detailed Guide to the OWASP Top 10 - #3 Cross-Site Scripting Attacks
This video explains another important client-side based attack, which is called the cross-site scripting attack.
Curated Video
A Detailed Guide to the OWASP Top 10 - #3 SQL Injection Attacks
This video explains the most common type of attack on a website, which is the SQL injection attack.
Curated Video
A Detailed Guide to the OWASP Top 10 - Understanding SQL and Databases
This video explains databases and Structured Query Language (SQL).
Curated Video
A Detailed Guide to the OWASP Top 10 - Quick Notice
This video is a quick notice to SQL before diving into other attacks.
Curated Video
A Detailed Guide to the OWASP Top 10 - #2 Cryptographic Failures
This video explains A02: 2021 - cryptographic failures, which focuses on failures related to cryptography.
Curated Video
A Detailed Guide to the OWASP Top 10 - #1 Broken Access Control Prevention
This video explains how to prevent broken access control on our website or on our applications.
Curated Video
A Detailed Guide to the OWASP Top 10 - #1 Broken Access Control
This video explains A01:2021 - broken access control, which is the most significant security risk-facing application.
Curated Video
A Detailed Guide to the OWASP Top 10 - The Tools We Shall Use
This video explains the tools that we will be using in the course, such as Hacksplaining.
Curated Video
A Detailed Guide to the OWASP Top 10 - Introduction
This video is a brief explanation of the course and what to expect from the course.
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Twitter Account
In this video, you will discover effective strategies to enhance the security of your Twitter account, ensuring its protection and safeguarding your personal information. This clip is from the chapter "Social Media Security and Email...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Facebook Account
In this video, you will discover effective strategies to enhance the security of your Facebook account, ensuring its protection and safeguarding your personal information. This clip is from the chapter "Social Media Security and Email...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Two-Factor Authentications
In this video, you will learn about two-factor authentication, which is used to add an extra layer of security when logging into an account. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Password Management
In this video, you will learn about password management and the need for using strong passwords to keep your system safe. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Securing Your Home Router
In this video, you will learn how to enhance the security of your home router by discovering the IP address associated with it. Gain valuable insights on securing your router effectively. This clip is from the chapter "Internet and...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Browser Security - Brave Browser
In this video, you will dive into the realm of browser security, focusing on the specific features and tools available for enhancing security while using the Brave Browser. This clip is from the chapter "Internet and Browsing Security"...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Welcome to the Course
In this video, the author talks about what to expect from this course and explains why cybersecurity is important. This clip is from the chapter "Introduction" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part...
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Trusted Advisor
Wouldn't it be amazing if you have someone you could turn to and ask them to evaluate your AWS implementation for problems in security, performance, and cost management? The good news is that you do. It's the Trusted Advisor within AWS...
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - AWS Compliance Program
AWS implements templates and recommended architectures that comply with various regulatory constraints under the AWS compliance program. This video introduces the compliance program and reveals where you can get detailed information...
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - EC2 Overview
Cloud computing is all the buzz today, but what is the service in AWS that allows for this? The answer is EC2, and this video introduces the concepts around the EC2 service.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Gateways (VPGs and CGWs)
Do you want to connect your local network to AWS in a seemingly permanent way that is also secure? If so, you need to understand VPGs and CGWs, the topic of this video.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Storage Access Security Lab
Creating storage solutions in Amazon Web Services (AWS) is one thing, and it is another thing to ensure their security. In this video, you will explore the storage security features of AWS, including the console and CLI.