Instructional Video5:10
Curated Video

Fundamentals of Secure Software - OpenID and OpenID Connect

Higher Ed
This video talks about OpenID and why it is used.
Instructional Video5:30
Curated Video

Fundamentals of Secure Software - OAuth

Higher Ed
This video explains OAuth and how it is used.
Instructional Video6:28
Curated Video

Fundamentals of Secure Software - Web Sessions

Higher Ed
This video explains web session management.
Instructional Video6:32
Curated Video

Fundamentals of Secure Software - Introduction to Session Management

Higher Ed
This video provides an introduction to session management and best practices.
Instructional Video6:47
Curated Video

Fundamentals of Secure Software - Source Code Review

Higher Ed
This video explains how to perform a secure code review.
Instructional Video5:54
Curated Video

Fundamentals of Secure Software - SKF Labs Demo

Higher Ed
This is a demo video of the SKF (Security Knowledge Framework) Labs.
Instructional Video10:07
Curated Video

Fundamentals of Secure Software - SKF Demo

Higher Ed
This is a demo video of the SKF (Security Knowledge Framework).
Instructional Video3:17
Curated Video

Fundamentals of Secure Software - SKF (Security Knowledge Framework)

Higher Ed
This video explains how to use the SKF (Security Knowledge Framework).
Instructional Video3:06
Curated Video

Fundamentals of Secure Software - Server-Side Request Forgery

Higher Ed
This video demonstrates server-side request forgery.
Instructional Video5:45
Instructional Video3:38
Curated Video

Fundamentals of Secure Software - Software and Data Integrity Failures

Higher Ed
This video talks about software and data integrity failures.
Instructional Video3:56
Curated Video

Fundamentals of Secure Software - Identification and Authentication Failures

Higher Ed
This video explains identification and authentication failures.
Instructional Video7:28
Curated Video

Fundamentals of Secure Software - Vulnerable and Outdated Components

Higher Ed
This video explores using components with known vulnerabilities.
Instructional Video4:31
Curated Video

Fundamentals of Secure Software - Security Misconfiguration

Higher Ed
This video talks about security misconfiguration.
Instructional Video6:31
Curated Video

Fundamentals of Secure Software - Insecure Design

Higher Ed
This video explains the XML external entities.
Instructional Video9:02
Curated Video

Fundamentals of Secure Software - Injection

Higher Ed
This video explains Injection.
Instructional Video7:21
Curated Video

Fundamentals of Secure Software - Cryptographic Failures

Higher Ed
This video explains what sensitive data exposure is and talks about cryptographic failures.
Instructional Video5:24
Curated Video

Fundamentals of Secure Software - Broken Access Control

Higher Ed
This video talks about Broken authentication.
Instructional Video8:55
Curated Video

Fundamentals of Secure Software - API Security

Higher Ed
This video explains API security.
Instructional Video2:33
Curated Video

Fundamentals of Secure Software - Proxy Tools

Higher Ed
This video provides an introduction to proxy tools and their purpose.
Instructional Video4:32
Curated Video

Fundamentals of Secure Software - Defense In-Depth

Higher Ed
This video explains defense in-depth and its purpose.
Instructional Video9:22
Curated Video

Fundamentals of Secure Software - Introduction to OWASP Top 10

Higher Ed
This video is a high-level walkthrough of the OWASP Top 10 and other OWASP resources.
Instructional Video6:49
Curated Video

Fundamentals of Secure Software - Application Security Terms and Definitions

Higher Ed
In this video, we will cover the initial terms and definitions related to application security.
Instructional Video8:10
Curated Video

Fundamentals of Secure Software - Introduction to Application Security

Higher Ed
In this video, we will lay the groundwork for what an SDLC looks like.