Instructional Video15:01
Curated Video

Fundamentals of Secure Software - Risk Rating Demo

Higher Ed
This video helps in performing a risk rating.
Instructional Video2:12
Curated Video

Fundamentals of Secure Software - Penetration Testing

Higher Ed
This video explains penetration testing.
Instructional Video7:46
Curated Video

Fundamentals of Secure Software - HIPAA (Health Insurance Portability and Accountability Act)

Higher Ed
This video explains the HIPAA (Health Insurance Portability and Accountability Act) and its purpose.
Instructional Video4:16
Curated Video

Fundamentals of Secure Software - PKI (Public Key Infrastructure)

Higher Ed
This video explains the PKI (Public Key Infrastructure) and how it is used.
Instructional Video9:22
Curated Video

Fundamentals of Secure Software - Microsoft Threat Model Tool demo

Higher Ed
This is a demo video of the Microsoft Threat Model tool.
Instructional Video5:30
Curated Video

Fundamentals of Secure Software - OAuth

Higher Ed
This video explains OAuth and how it is used.
Instructional Video3:32
Curated Video

Fundamentals of Secure Software - JWT Example

Higher Ed
This video explains the breaking down a JWT.
Instructional Video5:42
Curated Video

Fundamentals of Secure Software - JWT (JSON Web Token)

Higher Ed
This video explains the JSON Web Token and what it is used for.
Instructional Video6:32
Curated Video

Fundamentals of Secure Software - Introduction to Session Management

Higher Ed
This video provides an introduction to session management and best practices.
Instructional Video6:47
Curated Video

Fundamentals of Secure Software - Source Code Review

Higher Ed
This video explains how to perform a secure code review.
Instructional Video10:07
Curated Video

Fundamentals of Secure Software - SKF Demo

Higher Ed
This is a demo video of the SKF (Security Knowledge Framework).
Instructional Video3:17
Curated Video

Fundamentals of Secure Software - SKF (Security Knowledge Framework)

Higher Ed
This video explains how to use the SKF (Security Knowledge Framework).
Instructional Video5:50
Curated Video

Fundamentals of Secure Software - CSP Demo

Higher Ed
This is a demo video of CSP in action.
Instructional Video7:44
Curated Video

Fundamentals of Secure Software - Running a ZAP Scan

Higher Ed
In this video, we will run a ZAP scan.
Instructional Video3:56
Curated Video

Fundamentals of Secure Software - Identification and Authentication Failures

Higher Ed
This video explains identification and authentication failures.
Instructional Video7:21
Curated Video

Fundamentals of Secure Software - Cryptographic Failures

Higher Ed
This video explains what sensitive data exposure is and talks about cryptographic failures.
Instructional Video9:22
Curated Video

Fundamentals of Secure Software - Introduction to OWASP Top 10

Higher Ed
This video is a high-level walkthrough of the OWASP Top 10 and other OWASP resources.
Instructional Video10:33
Curated Video

Fundamentals of Secure Software - OWASP WebGoat Demo

Higher Ed
WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security videos. In this video, we will do a brief demo to get you started on using WebGoat.
Instructional Video9:46
Curated Video

Fundamentals of Secure Software - Application Security Goals

Higher Ed
In this video, we will continue defining terms and start talking about security goals.
Instructional Video4:45
Curated Video

A Detailed Guide to the OWASP Top 10 - API7:2023 Server Side Request Forgery

Higher Ed
In this session, tackle the issue of Server Side Request Forgery (SSRF) in APIs, including detection and prevention strategies.
Instructional Video8:43
Curated Video

A Detailed Guide to the OWASP Top 10 - Introduction to APIs

Higher Ed
In this session, we will explore the fundamentals of APIs, their importance in modern web applications, and the basics of how they work.
Instructional Video2:00
Curated Video

A Detailed Guide to the OWASP Top 10 - #5 Security Misconfiguration Prevention

Higher Ed
This video explains the steps to be taken to prevent the OWASP 05 security misconfiguration.
Instructional Video4:14
Curated Video

A Detailed Guide to the OWASP Top 10 - #4 Insecure Design Prevention

Higher Ed
This video explains how to prevent insecure design when developing software.
Instructional Video9:06
Curated Video

A Detailed Guide to the OWASP Top 10 - Understanding SQL and Databases

Higher Ed
This video explains databases and Structured Query Language (SQL).