Hi, what do you want to do?
Curated Video
Fundamentals of Secure Software - Identification and Authentication Failures
This video explains identification and authentication failures.
Curated Video
Fundamentals of Secure Software - Cryptographic Failures
This video explains what sensitive data exposure is and talks about cryptographic failures.
Curated Video
Fundamentals of Secure Software - Broken Access Control
This video talks about Broken authentication.
Curated Video
Fundamentals of Secure Software - OWASP WebGoat Demo
WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security videos. In this video, we will do a brief demo to get you started on using WebGoat.
Curated Video
A Detailed Guide to the OWASP Top 10 - #7 Identification and Authentication Failures
This video explains OWASP 07 - identification and authentication failures.
Curated Video
A Detailed Guide to the OWASP Top 10 - #4 Insecure Design Prevention
This video explains how to prevent insecure design when developing software.
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - You Have Been HACKED - Now What?
In this video, you will look at steps to take after you have been hacked and how exactly you would respond.
<
br/>
This clip is from the chapter "Conclusion" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part...
<
br/>
This clip is from the chapter "Conclusion" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Personal Cybersecurity - What I Do
In this video, the author talks about the necessary steps that he takes to keep himself and his data safe from malware and hackers.
<
br/>
This clip is from the chapter "Introduction" of the series "The Absolute Beginners Guide to...
<
br/>
This clip is from the chapter "Introduction" of the series "The Absolute Beginners Guide to...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Set Up a Recovery Email
In this video, the author shows you how to set up a recovery email account the right way.
<
br/>
This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute Beginners Guide to Cybersecurity...
<
br/>
This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute Beginners Guide to Cybersecurity...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Google Account - Part 2
In part 2 of the video, which focuses on securing your Google account, you will look at signing into other sites part of the security.
<
br/>
This clip is from the chapter "Social Media Security and Email Security" of the series...
<
br/>
This clip is from the chapter "Social Media Security and Email Security" of the series...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Email Data Management
In this video, the author talks about a few tips on how best to protect yourself in case your email gets hacked.
<
br/>
This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute Beginners...
<
br/>
This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute Beginners...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Phishing Attacks
In this video, you will learn about Phishing attacks. It is an attempt by a hacker to obtain sensitive data by sending crafted emails to a potential victim while impersonating a known person or body.
<
br/>
This clip is from the...
<
br/>
This clip is from the...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Twitter Account
In this video, you will discover effective strategies to enhance the security of your Twitter account, ensuring its protection and safeguarding your personal information.
<
br/>
This clip is from the chapter "Social Media Security...
<
br/>
This clip is from the chapter "Social Media Security...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your LinkedIn Account
In this video, you will discover effective strategies to enhance the security of your LinkedIn account, ensuring its protection and safeguarding your personal information.
<
br/>
This clip is from the chapter "Social Media Security...
<
br/>
This clip is from the chapter "Social Media Security...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Facebook Account
In this video, you will discover effective strategies to enhance the security of your Facebook account, ensuring its protection and safeguarding your personal information.
<
br/>
This clip is from the chapter "Social Media Security...
<
br/>
This clip is from the chapter "Social Media Security...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Have I Been Pwned?
In this video, the author introduces you to a web tool called “have I been pwnedâ€; this is a website where you can check whether your email address or password has been compromised.
<
br/>
This clip is from the chapter "Personal...
<
br/>
This clip is from the chapter "Personal...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Protecting Yourself Against SIM Card Swap Fraud
In this video, you will learn how to protect yourself against SIM card swap fraud.
<
br/>
This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section...
<
br/>
This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Two-Factor Authentications
In this video, you will learn about two-factor authentication, which is used to add an extra layer of security when logging into an account.
<
br/>
This clip is from the chapter "Personal Security" of the series "The Absolute...
<
br/>
This clip is from the chapter "Personal Security" of the series "The Absolute...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Introduction to Password Managers
In this video, you will be introduced to password manager tools such as LastPass or dashlane.
<
br/>
This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This...
<
br/>
This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Password Management
In this video, you will learn about password management and the need for using strong passwords to keep your system safe.
<
br/>
This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to...
<
br/>
This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Creating New Accounts and Logging In (DO NOT DO THIS)
In this video, you will learn to create a new account and log in to Reddit.
<
br/>
This clip is from the chapter "Internet and Browsing Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This...
<
br/>
This clip is from the chapter "Internet and Browsing Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This...
Curated Video
Linux PAM Security Administration - Account Access Through PAM
This video explains account access through PAM.
Curated Video
Linux PAM Security Administration - The PAM File Configuration - Module Interface
This video explains the first column of the PAM file configuration, which is the module interface or type.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Federated Directory Services
Active Directory Federation Services (ADFS) allows you to pass-through the authentication of a local AD logon to access AWS resources. This video explores the concept.