Instructional Video3:38
Curated Video

Fundamentals of Secure Software - Software and Data Integrity Failures

Higher Ed
This video talks about software and data integrity failures.
Instructional Video3:56
Curated Video

Fundamentals of Secure Software - Identification and Authentication Failures

Higher Ed
This video explains identification and authentication failures.
Instructional Video7:28
Curated Video

Fundamentals of Secure Software - Vulnerable and Outdated Components

Higher Ed
This video explores using components with known vulnerabilities.
Instructional Video4:31
Curated Video

Fundamentals of Secure Software - Security Misconfiguration

Higher Ed
This video talks about security misconfiguration.
Instructional Video6:31
Curated Video

Fundamentals of Secure Software - Insecure Design

Higher Ed
This video explains the XML external entities.
Instructional Video9:02
Curated Video

Fundamentals of Secure Software - Injection

Higher Ed
This video explains Injection.
Instructional Video7:21
Curated Video

Fundamentals of Secure Software - Cryptographic Failures

Higher Ed
This video explains what sensitive data exposure is and talks about cryptographic failures.
Instructional Video5:24
Curated Video

Fundamentals of Secure Software - Broken Access Control

Higher Ed
This video talks about Broken authentication.
Instructional Video8:55
Curated Video

Fundamentals of Secure Software - API Security

Higher Ed
This video explains API security.
Instructional Video5:00
Curated Video

Fundamentals of Secure Software - Demo of Fiddler with JuiceShop

Higher Ed
This video is about using Fiddler to tamper with parameters in JuiceShop.
Instructional Video2:33
Curated Video

Fundamentals of Secure Software - Proxy Tools

Higher Ed
This video provides an introduction to proxy tools and their purpose.
Instructional Video4:32
Curated Video

Fundamentals of Secure Software - Defense In-Depth

Higher Ed
This video explains defense in-depth and its purpose.
Instructional Video11:09
Curated Video

Fundamentals of Secure Software - Threat Actors and More Definitions

Higher Ed
This video demonstrates the different attackers that threaten software and systems. You will look at more foundational definitions.
Instructional Video5:11
Curated Video

Fundamentals of Secure Software - SANS Top 25

Higher Ed
This video provides an introduction to the SANS Top 25.
Instructional Video9:22
Curated Video

Fundamentals of Secure Software - Introduction to OWASP Top 10

Higher Ed
This video is a high-level walkthrough of the OWASP Top 10 and other OWASP resources.
Instructional Video10:33
Curated Video

Fundamentals of Secure Software - OWASP WebGoat Demo

Higher Ed
WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security videos. In this video, we will do a brief demo to get you started on using WebGoat.
Instructional Video9:46
Curated Video

Fundamentals of Secure Software - Application Security Goals

Higher Ed
In this video, we will continue defining terms and start talking about security goals.
Instructional Video6:49
Curated Video

Fundamentals of Secure Software - Application Security Terms and Definitions

Higher Ed
In this video, we will cover the initial terms and definitions related to application security.
Instructional Video8:10
Curated Video

Fundamentals of Secure Software - Introduction to Application Security

Higher Ed
In this video, we will lay the groundwork for what an SDLC looks like.
Instructional Video6:54
Curated Video

CISSP Crash Course - Federated Identities

Higher Ed
This video explains centralized versus decentralized identities. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access...
Instructional Video7:08
Curated Video

Getting Started with HashiCorp Nomad - Learning Nomad Architecture

Higher Ed
In this video, we will explore the Nomad architecture at a high level. We will understand a data center, region, and consensus related to Nomad. We will examine the single region architecture and server-client interaction. This clip is...
Instructional Video2:29
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - STS and Cross Account Access

Higher Ed
This video focuses on AWS STS and cross-account access. This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about Amazon Web Services...
Instructional Video9:46
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - Identity Federation

Higher Ed
This video focuses on AWS identity federation. This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about Amazon Web Services (AWS)...
Instructional Video3:56
Soliloquy

Why isnât New Zealand part of Australia anyway?

12th - Higher Ed
Despite having completely different accents Iâm often mistaken for an Australian. To add insult to injury the Australian constitution claims New Zealand as a state â so much for trans-Tasman diplomacy. So why is New Zealand a separate...