Instructional Video8:40
Curated Video

The CISO Masterclass - Know Your Role

Higher Ed
In this video, delve into the key aspects of understanding and defining your role as a CISO within your organization.
Instructional Video10:40
Curated Video

Hands-On Continuous Integration and Automation with Jenkins - Install Jenkins on AWS

Higher Ed
This video shows how to assign an Elastic IP address to an EC2 instance, access an EC2 instance via ssh, and install Jenkins on AWS.
Instructional Video4:56
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Leveling Up in Solidity

Higher Ed
This video helps you with leveling up in Solidity by learning new concepts. This clip is from the chapter "Solidity Patterns I - Cybersecurity" of the series "The Complete Solidity Course - Zero to Advanced for Blockchain and Smart...
Instructional Video2:25
Curated Video

Building Microservices API in Go - Introduction

Higher Ed
In this video, we will provide an overview of the advanced topics covered in this section. We will introduce the concepts and techniques that will be covered in the subsequent videos. This clip is from the chapter "Advanced Topics" of...
Instructional Video2:22
Curated Video

Building Microservices API in Go - Securing Application

Higher Ed
In this video, we will discuss the authentication and authorization strategy we will be implementing in this section. We will explore the importance of securing our application and discuss best practices for implementing effective...
Instructional Video4:17
Instructional Video5:06
Curated Video

Chatbots Development with Amazon Lex - Overview of AWS

Higher Ed
In this lecture, we will look at Amazon Web Services, which is the most comprehensive and widely adopted web service. We will also discuss its functionality, Amazon Community, security, innovation pace, operational expertise, and more.
Instructional Video4:55
Curated Video

Chatbots Development with Amazon Lex - Salient Features of AWS

Higher Ed
Let's understand the salient features of AWS, including pricing, flexibility, and scalability, global architecture, PaaS services, reliability, scheduling, customization, and security.
Instructional Video3:45
Curated Video

Microsoft Project 2021 From Beginners to Advanced - Project Security

Higher Ed
Here, we will learn about project security and how to protect projects from unauthorized access or changes. Learn to set passwords, restrict user permissions, and encrypt project data. This clip is from the chapter "Saving Projects and...
Instructional Video2:04
Curated Video

Fundamentals of Secure Software - RASP (Runtime Application Self-Protection)

Higher Ed
This video talks about RASP (Runtime Application Self-Protection).
Instructional Video5:34
Curated Video

Fundamentals of Secure Software - DevSecOps

Higher Ed
This video explains the concept of DevSecOps.
Instructional Video7:46
Curated Video

Fundamentals of Secure Software - HIPAA (Health Insurance Portability and Accountability Act)

Higher Ed
This video explains the HIPAA (Health Insurance Portability and Accountability Act) and its purpose.
Instructional Video3:53
Curated Video

Fundamentals of Secure Software - Introduction to Manual Threat Modeling

Higher Ed
This video helps in performing a manual threat model.
Instructional Video7:14
Curated Video

Fundamentals of Secure Software - Introduction to Threat Modeling

Higher Ed
This video provides an introduction to threat modeling.
Instructional Video3:32
Curated Video

Fundamentals of Secure Software - JWT Example

Higher Ed
This video explains the breaking down a JWT.
Instructional Video3:17
Curated Video

Fundamentals of Secure Software - SKF (Security Knowledge Framework)

Higher Ed
This video explains how to use the SKF (Security Knowledge Framework).
Instructional Video5:50
Curated Video

Fundamentals of Secure Software - CSP Demo

Higher Ed
This is a demo video of CSP in action.
Instructional Video2:30
Curated Video

Fundamentals of Secure Software - OWASP ZAP (Zed Attack Proxy)

Higher Ed
In this video, we will install and configure OWASP ZAP.
Instructional Video6:31
Curated Video

Fundamentals of Secure Software - Insecure Design

Higher Ed
This video explains the XML external entities.
Instructional Video4:32
Curated Video

Fundamentals of Secure Software - Defense In-Depth

Higher Ed
This video explains defense in-depth and its purpose.
Instructional Video11:09
Curated Video

Fundamentals of Secure Software - Threat Actors and More Definitions

Higher Ed
This video demonstrates the different attackers that threaten software and systems. You will look at more foundational definitions.
Instructional Video9:46
Curated Video

Fundamentals of Secure Software - Application Security Goals

Higher Ed
In this video, we will continue defining terms and start talking about security goals.
Instructional Video6:49
Curated Video

Fundamentals of Secure Software - Application Security Terms and Definitions

Higher Ed
In this video, we will cover the initial terms and definitions related to application security.
Instructional Video8:10
Curated Video

Fundamentals of Secure Software - Introduction to Application Security

Higher Ed
In this video, we will lay the groundwork for what an SDLC looks like.