Instructional Video12:30
Curated Video

Fundamentals of Secure Software - Conclusion

Higher Ed
This video reviews a few of the important concepts learned throughout the course.
Instructional Video3:56
Curated Video

Fundamentals of Secure Software - Identification and Authentication Failures

Higher Ed
This video explains identification and authentication failures.
Instructional Video7:21
Curated Video

Fundamentals of Secure Software - Cryptographic Failures

Higher Ed
This video explains what sensitive data exposure is and talks about cryptographic failures.
Instructional Video5:24
Curated Video

Fundamentals of Secure Software - Broken Access Control

Higher Ed
This video talks about Broken authentication.
Instructional Video10:33
Curated Video

Fundamentals of Secure Software - OWASP WebGoat Demo

Higher Ed
WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security videos. In this video, we will do a brief demo to get you started on using WebGoat.
Instructional Video10:04
Curated Video

A Detailed Guide to the OWASP Top 10 - #7 Identification and Authentication Failures

Higher Ed
This video explains OWASP 07 - identification and authentication failures.
Instructional Video4:14
Curated Video

A Detailed Guide to the OWASP Top 10 - #4 Insecure Design Prevention

Higher Ed
This video explains how to prevent insecure design when developing software.
Instructional Video7:18
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - You Have Been HACKED - Now What?

Higher Ed
In this video, you will look at steps to take after you have been hacked and how exactly you would respond. This clip is from the chapter "Conclusion" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This...
Instructional Video17:06
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Personal Cybersecurity - What I Do

Higher Ed
In this video, the author talks about the necessary steps that he takes to keep himself and his data safe from malware and hackers. This clip is from the chapter "Introduction" of the series "The Absolute Beginners Guide to Cybersecurity...
Instructional Video3:05
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Set Up a Recovery Email

Higher Ed
In this video, the author shows you how to set up a recovery email account the right way. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part...
Instructional Video3:20
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Google Account - Part 2

Higher Ed
In part 2 of the video, which focuses on securing your Google account, you will look at signing into other sites part of the security. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute...
Instructional Video4:44
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Email Data Management

Higher Ed
In this video, the author talks about a few tips on how best to protect yourself in case your email gets hacked. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute Beginners Guide to...
Instructional Video8:54
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Phishing Attacks

Higher Ed
In this video, you will learn about Phishing attacks. It is an attempt by a hacker to obtain sensitive data by sending crafted emails to a potential victim while impersonating a known person or body. This clip is from the chapter "Social...
Instructional Video4:41
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Twitter Account

Higher Ed
In this video, you will discover effective strategies to enhance the security of your Twitter account, ensuring its protection and safeguarding your personal information. This clip is from the chapter "Social Media Security and Email...
Instructional Video8:37
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your LinkedIn Account

Higher Ed
In this video, you will discover effective strategies to enhance the security of your LinkedIn account, ensuring its protection and safeguarding your personal information. This clip is from the chapter "Social Media Security and Email...
Instructional Video8:22
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Facebook Account

Higher Ed
In this video, you will discover effective strategies to enhance the security of your Facebook account, ensuring its protection and safeguarding your personal information. This clip is from the chapter "Social Media Security and Email...
Instructional Video3:33
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Have I Been Pwned?

Higher Ed
In this video, the author introduces you to a web tool called “have I been pwnedâ€; this is a website where you can check whether your email address or password has been compromised. This clip is from the chapter "Personal Security" of...
Instructional Video9:11
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Protecting Yourself Against SIM Card Swap Fraud

Higher Ed
In this video, you will learn how to protect yourself against SIM card swap fraud. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section talks about...
Instructional Video7:37
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Two-Factor Authentications

Higher Ed
In this video, you will learn about two-factor authentication, which is used to add an extra layer of security when logging into an account. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to...
Instructional Video4:25
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Introduction to Password Managers

Higher Ed
In this video, you will be introduced to password manager tools such as LastPass or dashlane. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section...
Instructional Video12:13
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Password Management

Higher Ed
In this video, you will learn about password management and the need for using strong passwords to keep your system safe. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023...
Instructional Video2:10
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Creating New Accounts and Logging In (DO NOT DO THIS)

Higher Ed
In this video, you will learn to create a new account and log in to Reddit. This clip is from the chapter "Internet and Browsing Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section delves...
Instructional Video1:39
Curated Video

Linux PAM Security Administration - Account Access Through PAM

Higher Ed
This video explains account access through PAM.
Instructional Video5:25
Curated Video

Linux PAM Security Administration - The PAM File Configuration - Module Interface

Higher Ed
This video explains the first column of the PAM file configuration, which is the module interface or type.