Curated Video
Fundamentals of Secure Software - Scanning for OSS Vulnerabilities with Software Composition Analysis
This video helps in using SCA to find OSS (Open-Source Software) vulnerabilities.
Curated Video
Fundamentals of Secure Software - Security Models
This video explains the various security models and their purpose.
Curated Video
Fundamentals of Secure Software - CSP (Content Security Policy)
This video demonstrates the Content Security Policy.
Curated Video
Fundamentals of Secure Software - Cross-Site Scripting
This video explains cross-site scripting.
Curated Video
Fundamentals of Secure Software - Running a ZAP Scan
In this video, we will run a ZAP scan.
Curated Video
Fundamentals of Secure Software - OWASP ZAP (Zed Attack Proxy)
In this video, we will install and configure OWASP ZAP.
Curated Video
Fundamentals of Secure Software - Server-Side Request Forgery
This video demonstrates server-side request forgery.
Curated Video
Fundamentals of Secure Software - Security Logging and Monitoring Failures
This video demonstrates insecure logging.
Curated Video
Fundamentals of Secure Software - Software and Data Integrity Failures
This video talks about software and data integrity failures.
Curated Video
Fundamentals of Secure Software - Identification and Authentication Failures
This video explains identification and authentication failures.
Curated Video
Fundamentals of Secure Software - Vulnerable and Outdated Components
This video explores using components with known vulnerabilities.
Curated Video
Fundamentals of Secure Software - Security Misconfiguration
This video talks about security misconfiguration.
Curated Video
Fundamentals of Secure Software - Insecure Design
This video explains the XML external entities.
Curated Video
Fundamentals of Secure Software - Cryptographic Failures
This video explains what sensitive data exposure is and talks about cryptographic failures.
Curated Video
Fundamentals of Secure Software - Broken Access Control
This video talks about Broken authentication.
Curated Video
Fundamentals of Secure Software - Demo of Fiddler with JuiceShop
This video is about using Fiddler to tamper with parameters in JuiceShop.
Curated Video
Fundamentals of Secure Software - Proxy Tools
This video provides an introduction to proxy tools and their purpose.
Curated Video
Fundamentals of Secure Software - Defense In-Depth
This video explains defense in-depth and its purpose.
Curated Video
Fundamentals of Secure Software - Threat Actors and More Definitions
This video demonstrates the different attackers that threaten software and systems. You will look at more foundational definitions.
Curated Video
Fundamentals of Secure Software - SANS Top 25
This video provides an introduction to the SANS Top 25.
Curated Video
Fundamentals of Secure Software - Introduction to OWASP Top 10
This video is a high-level walkthrough of the OWASP Top 10 and other OWASP resources.