Hi, what do you want to do?
Curated Video
Fundamentals of Secure Software - OpenID and OpenID Connect
This video talks about OpenID and why it is used.
Curated Video
Fundamentals of Secure Software - Web Sessions
This video explains web session management.
Curated Video
Fundamentals of Secure Software - Introduction to Session Management
This video provides an introduction to session management and best practices.
Curated Video
Fundamentals of Secure Software - Source Code Review
This video explains how to perform a secure code review.
Curated Video
Fundamentals of Secure Software - SKF Labs Demo
This is a demo video of the SKF (Security Knowledge Framework) Labs.
Curated Video
Fundamentals of Secure Software - SKF Demo
This is a demo video of the SKF (Security Knowledge Framework).
Curated Video
Fundamentals of Secure Software - SKF (Security Knowledge Framework)
This video explains how to use the SKF (Security Knowledge Framework).
Curated Video
Fundamentals of Secure Software - Server-Side Request Forgery
This video demonstrates server-side request forgery.
Curated Video
Fundamentals of Secure Software - Security Logging and Monitoring Failures
This video demonstrates insecure logging.
Curated Video
Fundamentals of Secure Software - Software and Data Integrity Failures
This video talks about software and data integrity failures.
Curated Video
Fundamentals of Secure Software - Identification and Authentication Failures
This video explains identification and authentication failures.
Curated Video
Fundamentals of Secure Software - Vulnerable and Outdated Components
This video explores using components with known vulnerabilities.
Curated Video
Fundamentals of Secure Software - Security Misconfiguration
This video talks about security misconfiguration.
Curated Video
Fundamentals of Secure Software - Insecure Design
This video explains the XML external entities.
Curated Video
Fundamentals of Secure Software - Cryptographic Failures
This video explains what sensitive data exposure is and talks about cryptographic failures.
Curated Video
Fundamentals of Secure Software - Broken Access Control
This video talks about Broken authentication.
Curated Video
Fundamentals of Secure Software - Proxy Tools
This video provides an introduction to proxy tools and their purpose.
Curated Video
Fundamentals of Secure Software - Defense In-Depth
This video explains defense in-depth and its purpose.
Curated Video
Fundamentals of Secure Software - Introduction to OWASP Top 10
This video is a high-level walkthrough of the OWASP Top 10 and other OWASP resources.
Curated Video
Fundamentals of Secure Software - Application Security Terms and Definitions
In this video, we will cover the initial terms and definitions related to application security.
Curated Video
Fundamentals of Secure Software - Introduction to Application Security
In this video, we will lay the groundwork for what an SDLC looks like.