Instructional Video1:26
Curated Video

Chatbots Development with Amazon Lex - Response Cards

Higher Ed
This is the last step in creating an Amazon Lex chatbot, creating and adding response cards, including the card setup, slot upgradation, chatbot building, and demonstration.
Instructional Video6:47
Curated Video

Fundamentals of Secure Software - Source Code Review

Higher Ed
This video explains how to perform a secure code review.
Instructional Video10:07
Curated Video

Fundamentals of Secure Software - SKF Demo

Higher Ed
This is a demo video of the SKF (Security Knowledge Framework).
Instructional Video10:53
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Exploiting Race Conditions Case 2

Higher Ed
This video explains exploiting race conditions for case 2. Here, you would be looking at how the hackers reuse a one-time discount code. This clip is from the chapter "Exploiting Race Conditions with OWASP ZAP" of the series "Web...
Instructional Video11:28
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Exploiting Race Conditions Case 1 (Part1)

Higher Ed
This is the first of the two-part video on exploiting race conditions for case 1. Here, you would be looking at how hackers use multithreading conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Instructional Video11:36
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Fuzzing for Path Traversal Demo

Higher Ed
This is a demo video on Fuzzing for path traversal. This clip is from the chapter "Fuzzing with Burp Suite Intruder" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on Fuzzing with Burp Suite...
Instructional Video3:13
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Insecure HTTP Web Pages

Higher Ed
This video talks about how to find insecure HTTP web pages using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...
Instructional Video3:16
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Sensitive Data in URLs

Higher Ed
This video talks about how to find sensitive data in URLs using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...
Instructional Video2:59
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Internal Server Errors

Higher Ed
This video talks about how to find internal server errors using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...
Instructional Video2:51
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Publicly Exposed Backup Files

Higher Ed
This video talks about how to find publicly exposed backup files using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...
Instructional Video3:56
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding SQL Syntax Errors

Higher Ed
This video talks about how to find SQL syntax errors using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This...
Instructional Video2:53
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Directory Listings

Higher Ed
This video talks about how to find directory listings using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This...
Instructional Video4:00
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - From SQL Injection to Remote Code Execution Demo

Higher Ed
This is a demo video that demonstrates how to execute the code from SQL injection to remote. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by...
Instructional Video4:20
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - From SQL Injection to Remote Code Execution Overview

Higher Ed
This video provides an overview of how to execute the code from SQL injection to remote. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by...
Instructional Video4:40
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - The Basics of Sqlmap Demo

Higher Ed
This is a demo video of the basics of Sqlmap. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on how...
Instructional Video6:59
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - The Basics of Sqlmap Overview

Higher Ed
This video provides an overview of the basics of Sqlmap. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses...
Instructional Video24:09
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Account Takeover through Clickjacking – Part 1

Higher Ed
This is the first of the two-part video that demonstrates the actual attack where you would take control of the account with the help of Clickjacking. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the...
Instructional Video6:03
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - HTTP Parameter Pollution – Part 1

Higher Ed
This is the first of the two-part video that talks about the root cause of the problem in the browser where we can use this HTTP Parameter Pollution. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the...
Instructional Video1:18
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Full-Stack Attacks on Modern Web Applications

Higher Ed
This video introduces the section. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".null
Instructional Video10:52
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Exploiting Race Conditions – Case 2

Higher Ed
This video explains exploiting race conditions for case 2. Here, you would be looking at how the hackers re-use one-time discount code. This clip is from the chapter "Exploiting Race Conditions in Web Applications" of the series "Web...
Instructional Video3:05
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Summary – Hacking AngularJS Applications

Higher Ed
This is a summary video on hacking AngularJS applications. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking AngularJS...
Instructional Video3:36
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Hacking AngularJS Applications

Higher Ed
This video introduces the section. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking AngularJS applications.
Instructional Video10:29
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - User Redirection through window.opener Tabnabbing – Part 1

Higher Ed
This is the first of the two-part video that talks about how to attack through link. You will work on the user redirection through window.opener tabnabbing. This clip is from the chapter "Hacking Web Applications through PDFs, Images,...
Instructional Video15:49
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Token Hijacking through PDF – Part 2

Higher Ed
This is the second of the two-part video that demonstrates token hijacking through PDF. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation...