Instructional Video7:46
Curated Video

Fundamentals of Secure Software - HIPAA (Health Insurance Portability and Accountability Act)

Higher Ed
This video explains the HIPAA (Health Insurance Portability and Accountability Act) and its purpose.
Instructional Video3:15
Curated Video

Fundamentals of Secure Software - Password Demo

Higher Ed
This is a demo video on password management.
Instructional Video5:20
Curated Video

Fundamentals of Secure Software - Password Management

Higher Ed
This video explains how to handle passwords securely.
Instructional Video4:16
Curated Video

Fundamentals of Secure Software - PKI (Public Key Infrastructure)

Higher Ed
This video explains the PKI (Public Key Infrastructure) and how it is used.
Instructional Video3:57
Curated Video

Fundamentals of Secure Software - Hashing Demo

Higher Ed
This is a demo video on hashing.
Instructional Video5:48
Curated Video

Fundamentals of Secure Software - Hashing Overview

Higher Ed
This video provides an introduction and overview of hashing.
Instructional Video3:58
Curated Video

Fundamentals of Secure Software - Encryption Overview

Higher Ed
This video provides an introduction and overview of encryption.
Instructional Video9:22
Curated Video

Fundamentals of Secure Software - Microsoft Threat Model Tool demo

Higher Ed
This is a demo video of the Microsoft Threat Model tool.
Instructional Video4:35
Curated Video

Fundamentals of Secure Software - Prepping for Microsoft Threat Model Tool

Higher Ed
This video will help you get ready to use the Microsoft Threat Model tool.
Instructional Video4:36
Curated Video

Fundamentals of Secure Software - Manual Threat Model demo

Higher Ed
This is a demo video of performing a manual threat model.
Instructional Video3:53
Curated Video

Fundamentals of Secure Software - Introduction to Manual Threat Modeling

Higher Ed
This video helps in performing a manual threat model.
Instructional Video5:04
Curated Video

Fundamentals of Secure Software - Type of Threat Modeling

Higher Ed
This video demonstrates different types of threat modeling.
Instructional Video7:14
Curated Video

Fundamentals of Secure Software - Introduction to Threat Modeling

Higher Ed
This video provides an introduction to threat modeling.
Instructional Video9:42
Curated Video

Fundamentals of Secure Software - Risk Rating Introduction

Higher Ed
This video provides an introduction to risk rating and what it is used for.
Instructional Video5:10
Curated Video

Fundamentals of Secure Software - OpenID and OpenID Connect

Higher Ed
This video talks about OpenID and why it is used.
Instructional Video5:30
Curated Video

Fundamentals of Secure Software - OAuth

Higher Ed
This video explains OAuth and how it is used.
Instructional Video3:32
Curated Video

Fundamentals of Secure Software - JWT Example

Higher Ed
This video explains the breaking down a JWT.
Instructional Video5:42
Curated Video

Fundamentals of Secure Software - JWT (JSON Web Token)

Higher Ed
This video explains the JSON Web Token and what it is used for.
Instructional Video6:28
Curated Video

Fundamentals of Secure Software - Web Sessions

Higher Ed
This video explains web session management.
Instructional Video6:32
Curated Video

Fundamentals of Secure Software - Introduction to Session Management

Higher Ed
This video provides an introduction to session management and best practices.
Instructional Video6:47
Curated Video

Fundamentals of Secure Software - Source Code Review

Higher Ed
This video explains how to perform a secure code review.
Instructional Video5:54
Curated Video

Fundamentals of Secure Software - SKF Labs Demo

Higher Ed
This is a demo video of the SKF (Security Knowledge Framework) Labs.
Instructional Video10:07
Curated Video

Fundamentals of Secure Software - SKF Demo

Higher Ed
This is a demo video of the SKF (Security Knowledge Framework).
Instructional Video3:17
Curated Video

Fundamentals of Secure Software - SKF (Security Knowledge Framework)

Higher Ed
This video explains how to use the SKF (Security Knowledge Framework).