Curated Video
Fundamentals of Secure Software - Manual Threat Model demo
This is a demo video of performing a manual threat model.
Curated Video
Fundamentals of Secure Software - Introduction to Manual Threat Modeling
This video helps in performing a manual threat model.
Curated Video
Fundamentals of Secure Software - Type of Threat Modeling
This video demonstrates different types of threat modeling.
Curated Video
Fundamentals of Secure Software - Introduction to Threat Modeling
This video provides an introduction to threat modeling.
Curated Video
Fundamentals of Secure Software - Risk Rating Introduction
This video provides an introduction to risk rating and what it is used for.
Curated Video
Fundamentals of Secure Software - OpenID and OpenID Connect
This video talks about OpenID and why it is used.
Curated Video
Fundamentals of Secure Software - JWT Example
This video explains the breaking down a JWT.
Curated Video
Fundamentals of Secure Software - JWT (JSON Web Token)
This video explains the JSON Web Token and what it is used for.
Curated Video
Fundamentals of Secure Software - Web Sessions
This video explains web session management.
Curated Video
Fundamentals of Secure Software - Introduction to Session Management
This video provides an introduction to session management and best practices.
Curated Video
Fundamentals of Secure Software - Source Code Review
This video explains how to perform a secure code review.
Curated Video
Fundamentals of Secure Software - SKF Labs Demo
This is a demo video of the SKF (Security Knowledge Framework) Labs.
Curated Video
Fundamentals of Secure Software - SKF Demo
This is a demo video of the SKF (Security Knowledge Framework).
Curated Video
Fundamentals of Secure Software - SKF (Security Knowledge Framework)
This video explains how to use the SKF (Security Knowledge Framework).
Curated Video
Fundamentals of Secure Software - Scanning for OSS Vulnerabilities with Software Composition Analysis
This video helps in using SCA to find OSS (Open-Source Software) vulnerabilities.
Curated Video
Fundamentals of Secure Software - Security Models
This video explains the various security models and their purpose.
Curated Video
Fundamentals of Secure Software - CSP (Content Security Policy)
This video demonstrates the Content Security Policy.
Curated Video
Fundamentals of Secure Software - Cross-Site Scripting
This video explains cross-site scripting.
Curated Video
Fundamentals of Secure Software - Running a ZAP Scan
In this video, we will run a ZAP scan.
Curated Video
Fundamentals of Secure Software - OWASP ZAP (Zed Attack Proxy)
In this video, we will install and configure OWASP ZAP.
Curated Video
Fundamentals of Secure Software - Server-Side Request Forgery
This video demonstrates server-side request forgery.
Curated Video
Fundamentals of Secure Software - Security Logging and Monitoring Failures
This video demonstrates insecure logging.