ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

241 results

Bare Metal Cyber
Episode 90: Code Review and Static/Dynamic Testing

Code is a frequent source of vulnerabilities, and reviewing it is essential for secure software development. In this episode, we ...

12:13
Episode 90: Code Review and Static/Dynamic Testing

1 view

13 days ago

Bare Metal Cyber
Episode 119: Secure Design and Secure Coding Guidelines

Secure applications start with secure design. In this episode, we explore how to incorporate security into architecture and code ...

11:03
Episode 119: Secure Design and Secure Coding Guidelines

3 views

13 days ago

Secure Code Lab
This Python Login System Is Completely Broken (And How to Fix It)

This channel is dedicated to secure programming, cybersecurity concepts, and helping developers write code that cannot be ...

5:51
This Python Login System Is Completely Broken (And How to Fix It)

17 views

12 days ago

Joshua Cayetano
Part 1 - Software Quality & Secure Design Presentation

... and attacks are intended to enhance understanding of secure software construction concepts, including secure coding practices ...

10:45
Part 1 - Software Quality & Secure Design Presentation

3 views

3 weeks ago

Lab Prove Hub
Cybersecurity Architecture: Mastering Application Security and DevSecOps

We dive into: • Secure Coding Practices: Using industry standards like the OWASP Top Ten to prevent buffer overflows and input ...

6:22
Cybersecurity Architecture: Mastering Application Security and DevSecOps

19 views

3 weeks ago

Eddy Says Hi #EddySaysHi
Mastering the Microsoft SDL: 10 Practices for Secure Software

Mastering the Microsoft SDL: 10 Practices for Secure Software 🛡️ ** Ever wondered how the pros keep software safe in an ...

5:36
Mastering the Microsoft SDL: 10 Practices for Secure Software

3 views

6 days ago

Cline
Cline Hooks: Detecting Security Vulnerabilities

... decisions and reinforces secure coding practices. Finally, we discuss how hooks fit into enterprise and regulated environments.

10:45
Cline Hooks: Detecting Security Vulnerabilities

156 views

4 days ago

Learn In Minutes
Security Fundamentals for Developers: Auth, JWT, OAuth, Threats, and Secure Defaults

... and how to implement secure coding best practices by default. Learn to build robust, secure applications and safeguard against ...

4:52
Security Fundamentals for Developers: Auth, JWT, OAuth, Threats, and Secure Defaults

10 views

2 weeks ago

Zogu Cracking Hub
How to Dump from SQL Injection. How to make Hotmail Combolists (Part-3)

We discuss common causes of SQL Injection, the risks to user data, and the importance of secure coding practices such as input ...

4:33
How to Dump from SQL Injection. How to make Hotmail Combolists (Part-3)

65 views

2 weeks ago

PCPL ALEX
SQL Injection with AI | Smart Web Security Testing Explained

... Defensive Focus This video focuses on: Security awareness Defensive testing techniques Secure coding practices Responsible ...

16:08
SQL Injection with AI | Smart Web Security Testing Explained

48 views

15 hours ago

Cyber_Hero
Cybersecurity for Beginners | SQL Injection Explained 💻 #cybersecurity #sqlinjection #owasp

... injection attacks Secure coding practices to stop SQL injection This video is perfect for cybersecurity beginners, ethical hackers, ...

7:29
Cybersecurity for Beginners | SQL Injection Explained 💻 #cybersecurity #sqlinjection #owasp

121 views

3 weeks ago

CISSP Coffee Shot | Cybersecurity Exam Prep
CISSP Domain 8: SDLC vs SLC Explained | 7 Phases or 9? The Framework That Confuses 90% ☕

... questions explicitly, plus another 2-3 that reference phases when discussing: - Secure coding practices - Testing methodologies ...

7:48
CISSP Domain 8: SDLC vs SLC Explained | 7 Phases or 9? The Framework That Confuses 90% ☕

12 views

6 hours ago

CISSP Coffee Shot | Cybersecurity Exam Prep
10 CISSP Domain 8 Questions + EXAM TIPS You MUST Know to Pass (2026)

... concepts including SDLC security, SAST vs DAST, API authentication, database security, secure coding practices, and more.

15:29
10 CISSP Domain 8 Questions + EXAM TIPS You MUST Know to Pass (2026)

93 views

1 day ago

Simplilearn
What is Cryptography? | Cryptography Tutorial For Beginners | Types of Cryptography | Simplilearn

... Threats and Vulnerabilities ✓ Ethical Hacking ✓ Penetration Testing ✓ Secure Coding Practices ✓ Vulnerability Assessment ...

19:39
What is Cryptography? | Cryptography Tutorial For Beginners | Types of Cryptography | Simplilearn

899 views

1 day ago

ACSMI | Cybersecurity Training
Secure Development for IoT Devices in Information Security | ACSMI Cybersecurity Training

Secure Development for IoT Devices in Information Security | ACSMI Cybersecurity Training This cybersecurity certification lesson ...

7:29
Secure Development for IoT Devices in Information Security | ACSMI Cybersecurity Training

0 views

10 days ago

SOCDemystified
CWE-79 | Chapter 23 – Improper Neutralization of Input During Web Page Generation  Explained

#CWE79 #CWE #CrossSiteScripting #XSS #WebSecurity #ApplicationSecurity #SecureCoding #OWASP #AppSec #DevSecOps ...

7:58
CWE-79 | Chapter 23 – Improper Neutralization of Input During Web Page Generation Explained

18 views

2 weeks ago

Marlon Roldan | AI Consultant
The "Vibe Coding" Lie...

Everyone is talking about vibe coding, but it often produces a lot of junk. This video critically examines the cons of vibe coding, ...

12:06
The "Vibe Coding" Lie...

59 views

3 weeks ago

Microsoft Security
Agentic security threats and best practices | Microsoft Security Forum

As AI agents become more capable and autonomous, the operating system plays a critical role in securing how they interact with ...

10:43
Agentic security threats and best practices | Microsoft Security Forum

393 views

2 weeks ago

Lance Ma
Essential API Security Defenses: Protect Your APIs from Common Threats

Your API is a digital doorway. Is it locked? In just over 7 minutes, learn the essential, practical defenses every developer must ...

7:35
Essential API Security Defenses: Protect Your APIs from Common Threats

3 views

13 days ago

CyberSecurityTV
Your Password Reset Is Broken ⚠️

Many applications unknowingly trust user-controlled input when generating password reset links — and attackers exploit this trust.

5:22
Your Password Reset Is Broken ⚠️

54 views

13 days ago