Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
61 results
... Defensive Focus This video focuses on: Security awareness Defensive testing techniques Secure coding practices Responsible ...
11 views
46 minutes ago
... decisions and reinforces secure coding practices. Finally, we discuss how hooks fit into enterprise and regulated environments.
146 views
4 days ago
Mastering the Microsoft SDL: 10 Practices for Secure Software 🛡️ ** Ever wondered how the pros keep software safe in an ...
0 views
5 days ago
... security testing tutorials ✓ Security architecture patterns ✓ Real-world vulnerability analysis ✓ Secure coding best practices ...
4 views
... Threats and Vulnerabilities ✓ Ethical Hacking ✓ Penetration Testing ✓ Secure Coding Practices ✓ Vulnerability Assessment ...
787 views
23 hours ago
... How vulnerable login systems can be exploited • Why input validation is important • Importance of secure coding practices I ...
**Secure Coding Practices** – Avoid dynamic SQL, adopt prepared statements. **Regular Security Audits** – Use OWASP ...
1 view
6 days ago
Course Description – JavaScript for Web Security (Ethical Hacking Focus) This course introduces students to how modern ...
153 views
3 days ago
buffer overflow attack.
22 views
In this video, discover how Syncfusion® Code Studio transforms enterprise software development with an AI-powered IDE and ...
76 views
2 days ago
204 views
In this NIST virtual event, Alper Kerman provides an overview of a NIST consortium project led by the National Cybersecurity ...
21 views
Learn Secure Coding with AppSecEngineer: https://www.appsecengineer.com/enterprises/secure-coding-collection In this ...
28 views
Dive into the key concepts of Certified Cloud Security Professional (CCSP) Domain 4: Cloud Application Security! This video ...
In DevOps Class 31, we explain the most common security leaks in DevOps pipelines and how DevSecOps helps prevent them.
OWASP Top 10 Vulnerabilities: Explained & How to Fix Them** Welcome to this essential guide to the **OWASP Top 10**—the ...
Google Gemini just got hacked through a calendar invite. No click required. No warning. Just your AI assistant betraying you.
32 views
In this video, you will learn how to get started with Syncfusion Code Studio Enterprise server. You will also see how to sign up and ...
35 views
Welcome to another video of the FastAPI Series! In this session, we're learning how to hash and verify passwords in FastAPI ...
96 views
The OWASP Top 10 2025 is here! Discover what changed from 2021 and why it matters for your application security strategy.
16 views