Curated Video
Fundamentals of Secure Software - Risk Rating Demo
This video helps in performing a risk rating.
Curated Video
Fundamentals of Secure Software - Penetration Testing
This video explains penetration testing.
Curated Video
Fundamentals of Secure Software - HIPAA (Health Insurance Portability and Accountability Act)
This video explains the HIPAA (Health Insurance Portability and Accountability Act) and its purpose.
Curated Video
Fundamentals of Secure Software - PKI (Public Key Infrastructure)
This video explains the PKI (Public Key Infrastructure) and how it is used.
Curated Video
Fundamentals of Secure Software - Microsoft Threat Model Tool demo
This is a demo video of the Microsoft Threat Model tool.
Curated Video
Fundamentals of Secure Software - JWT Example
This video explains the breaking down a JWT.
Curated Video
Fundamentals of Secure Software - JWT (JSON Web Token)
This video explains the JSON Web Token and what it is used for.
Curated Video
Fundamentals of Secure Software - Introduction to Session Management
This video provides an introduction to session management and best practices.
Curated Video
Fundamentals of Secure Software - Source Code Review
This video explains how to perform a secure code review.
Curated Video
Fundamentals of Secure Software - SKF Demo
This is a demo video of the SKF (Security Knowledge Framework).
Curated Video
Fundamentals of Secure Software - SKF (Security Knowledge Framework)
This video explains how to use the SKF (Security Knowledge Framework).
Curated Video
Fundamentals of Secure Software - Running a ZAP Scan
In this video, we will run a ZAP scan.
Curated Video
Fundamentals of Secure Software - Identification and Authentication Failures
This video explains identification and authentication failures.
Curated Video
Fundamentals of Secure Software - Cryptographic Failures
This video explains what sensitive data exposure is and talks about cryptographic failures.
Curated Video
Fundamentals of Secure Software - Introduction to OWASP Top 10
This video is a high-level walkthrough of the OWASP Top 10 and other OWASP resources.
Curated Video
Fundamentals of Secure Software - OWASP WebGoat Demo
WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security videos. In this video, we will do a brief demo to get you started on using WebGoat.
Curated Video
Fundamentals of Secure Software - Application Security Goals
In this video, we will continue defining terms and start talking about security goals.
Curated Video
A Detailed Guide to the OWASP Top 10 - API7:2023 Server Side Request Forgery
In this session, tackle the issue of Server Side Request Forgery (SSRF) in APIs, including detection and prevention strategies.
Curated Video
A Detailed Guide to the OWASP Top 10 - Introduction to APIs
In this session, we will explore the fundamentals of APIs, their importance in modern web applications, and the basics of how they work.
Curated Video
A Detailed Guide to the OWASP Top 10 - #5 Security Misconfiguration Prevention
This video explains the steps to be taken to prevent the OWASP 05 security misconfiguration.
Curated Video
A Detailed Guide to the OWASP Top 10 - #4 Insecure Design Prevention
This video explains how to prevent insecure design when developing software.
Curated Video
A Detailed Guide to the OWASP Top 10 - Understanding SQL and Databases
This video explains databases and Structured Query Language (SQL).