Hi, what do you want to do?
Curated Video
Fundamentals of Secure Software - Introduction to Threat Modeling
This video provides an introduction to threat modeling.
Curated Video
Fundamentals of Secure Software - JWT Example
This video explains the breaking down a JWT.
Curated Video
Fundamentals of Secure Software - SKF (Security Knowledge Framework)
This video explains how to use the SKF (Security Knowledge Framework).
Curated Video
Fundamentals of Secure Software - OWASP ZAP (Zed Attack Proxy)
In this video, we will install and configure OWASP ZAP.
Curated Video
Fundamentals of Secure Software - Insecure Design
This video explains the XML external entities.
Curated Video
Fundamentals of Secure Software - Defense In-Depth
This video explains defense in-depth and its purpose.
Curated Video
Fundamentals of Secure Software - Threat Actors and More Definitions
This video demonstrates the different attackers that threaten software and systems. You will look at more foundational definitions.
Curated Video
Fundamentals of Secure Software - Application Security Goals
In this video, we will continue defining terms and start talking about security goals.
Curated Video
Fundamentals of Secure Software - Application Security Terms and Definitions
In this video, we will cover the initial terms and definitions related to application security.
Curated Video
Fundamentals of Secure Software - Introduction to Application Security
In this video, we will lay the groundwork for what an SDLC looks like.
Curated Video
A Detailed Guide to the OWASP Top 10 - API10:2023 Unsafe Consumption of APIs
In this video, we will delve into the dangers of Unsafe Consumption of APIs, emphasizing the need for secure API usage practices.
Curated Video
A Detailed Guide to the OWASP Top 10 - API9:2023 Improper Inventory Management
In this session, we will address the challenges of Improper Inventory Management in API ecosystems and propose solutions for better management.
Curated Video
A Detailed Guide to the OWASP Top 10 - API8:2023 Security Misconfiguration
In this video, explore Security Misconfiguration risks in APIs, highlighting common misconfigurations and how to secure API settings.
Curated Video
A Detailed Guide to the OWASP Top 10 - API7:2023 Server Side Request Forgery
In this session, tackle the issue of Server Side Request Forgery (SSRF) in APIs, including detection and prevention strategies.
Curated Video
A Detailed Guide to the OWASP Top 10 - API6:2023 Unrestricted Access to Sensitive Business Flows
In this video, discuss the risks and consequences of having unrestricted access to sensitive business flows in APIs.
Curated Video
A Detailed Guide to the OWASP Top 10 - API5:2023 Broken Function Level Authorization
In this session, we will analyze Broken Function Level Authorization, understanding its impact on API security and methods to prevent it.
Curated Video
A Detailed Guide to the OWASP Top 10 - API4:2023 Unrestricted Resource Consumption
In this video, explore how Unrestricted Resource Consumption can affect API performance and security, and how to protect against it.
Curated Video
A Detailed Guide to the OWASP Top 10 - API3:2023 Broken Object Property Level Authorization
In this session, we will uncover the dangers of Broken Object Property Level Authorization and learn effective prevention techniques.
Curated Video
A Detailed Guide to the OWASP Top 10 - API2:2023 Broken Authentication
In this video, examine the critical security risk of Broken Authentication within APIs and discuss methods for securing authentication mechanisms.
Curated Video
A Detailed Guide to the OWASP Top 10 - API1:2023 Broken Object Level Authorization (BOLA)
In this session, we will delve into the Broken Object Level Authorization risk, its implications, and strategies for mitigation.
Curated Video
A Detailed Guide to the OWASP Top 10 - API Endpoints
In this video, we will learn about API endpoints, their role in API architecture, and how they interact with web applications.
Curated Video
A Detailed Guide to the OWASP Top 10 - Introduction to APIs
In this session, we will explore the fundamentals of APIs, their importance in modern web applications, and the basics of how they work.
Curated Video
A Detailed Guide to the OWASP Top 10 - Section Intro
In this video, we introduce the focus on OWASP's Top 10 API Security Risks for 2023, setting the stage for deep dives into each risk.