Instructional Video3:38
Curated Video

Fundamentals of Secure Software - Software and Data Integrity Failures

Higher Ed
This video talks about software and data integrity failures.
Instructional Video3:56
Curated Video

Fundamentals of Secure Software - Identification and Authentication Failures

Higher Ed
This video explains identification and authentication failures.
Instructional Video7:28
Curated Video

Fundamentals of Secure Software - Vulnerable and Outdated Components

Higher Ed
This video explores using components with known vulnerabilities.
Instructional Video4:31
Curated Video

Fundamentals of Secure Software - Security Misconfiguration

Higher Ed
This video talks about security misconfiguration.
Instructional Video6:31
Curated Video

Fundamentals of Secure Software - Insecure Design

Higher Ed
This video explains the XML external entities.
Instructional Video9:02
Curated Video

Fundamentals of Secure Software - Injection

Higher Ed
This video explains Injection.
Instructional Video7:21
Curated Video

Fundamentals of Secure Software - Cryptographic Failures

Higher Ed
This video explains what sensitive data exposure is and talks about cryptographic failures.
Instructional Video5:24
Curated Video

Fundamentals of Secure Software - Broken Access Control

Higher Ed
This video talks about Broken authentication.
Instructional Video8:55
Curated Video

Fundamentals of Secure Software - API Security

Higher Ed
This video explains API security.
Instructional Video5:00
Curated Video

Fundamentals of Secure Software - Demo of Fiddler with JuiceShop

Higher Ed
This video is about using Fiddler to tamper with parameters in JuiceShop.
Instructional Video2:33
Curated Video

Fundamentals of Secure Software - Proxy Tools

Higher Ed
This video provides an introduction to proxy tools and their purpose.
Instructional Video4:32
Curated Video

Fundamentals of Secure Software - Defense In-Depth

Higher Ed
This video explains defense in-depth and its purpose.
Instructional Video11:09
Curated Video

Fundamentals of Secure Software - Threat Actors and More Definitions

Higher Ed
This video demonstrates the different attackers that threaten software and systems. You will look at more foundational definitions.
Instructional Video5:11
Curated Video

Fundamentals of Secure Software - SANS Top 25

Higher Ed
This video provides an introduction to the SANS Top 25.
Instructional Video9:22
Curated Video

Fundamentals of Secure Software - Introduction to OWASP Top 10

Higher Ed
This video is a high-level walkthrough of the OWASP Top 10 and other OWASP resources.
Instructional Video10:33
Curated Video

Fundamentals of Secure Software - OWASP WebGoat Demo

Higher Ed
WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security videos. In this video, we will do a brief demo to get you started on using WebGoat.
Instructional Video9:46
Curated Video

Fundamentals of Secure Software - Application Security Goals

Higher Ed
In this video, we will continue defining terms and start talking about security goals.
Instructional Video6:49
Curated Video

Fundamentals of Secure Software - Application Security Terms and Definitions

Higher Ed
In this video, we will cover the initial terms and definitions related to application security.
Instructional Video8:10
Curated Video

Fundamentals of Secure Software - Introduction to Application Security

Higher Ed
In this video, we will lay the groundwork for what an SDLC looks like.
Instructional Video0:37
Science Buddies

Make a Pinhole Projector to View the Solar Eclipse

K - 5th
Make a pinhole projector to safely use the solar eclipse with simple materials.
Instructional Video8:57
Curated Video

Writing A Piece about the Solar Eclipse

9th - Higher Ed
A story of how I wrote my latest piece. Using Curiosity and other interests to inform your writing.
Instructional Video9:21
Curated Video

Writing A Piece about the Solar Eclipse

9th - Higher Ed
A story of how I wrote my latest piece. Using Curiosity and other interests to inform your writing.
Instructional Video2:10
Curated Video

Exploring Eclipses: Lunar and Solar Phenomena

Pre-K - Higher Ed
An eclipse occurs when the Moon and Earth align with the Sun, resulting in either a lunar or solar eclipse. During a lunar eclipse, Earth blocks sunlight from reaching the Moon, casting a shadow. In a solar eclipse, the Moon blocks...
Instructional Video19:38
Mythology & Fiction Explained

The Forgotten Book of 16th-century Apocalyptic Visions - The Book of Miracles

12th - Higher Ed
In today's episode we take a look at the Augsburg book of miracles, a manuscript from an unknown author containing miraculous signs through out the ages, a collection of renaissance art and religious stories that many thought would...