ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

642 results

Bare Metal Cyber
Episode 90: Code Review and Static/Dynamic Testing

Code is a frequent source of vulnerabilities, and reviewing it is essential for secure software development. In this episode, we ...

12:13
Episode 90: Code Review and Static/Dynamic Testing

1 view

2 weeks ago

Cline
Cline Hooks: Detecting Security Vulnerabilities

... decisions and reinforces secure coding practices. Finally, we discuss how hooks fit into enterprise and regulated environments.

10:45
Cline Hooks: Detecting Security Vulnerabilities

179 views

7 days ago

CyberTutor
What is DLL Injection Attack ?! | How Hackers Hijack Windows Processes

... injection attacks, including secure coding practices, endpoint protection strategies, and monitoring suspicious process behavior.

3:47
What is DLL Injection Attack ?! | How Hackers Hijack Windows Processes

57 views

11 days ago

Secure Code Lab
Secure Code Lab – Learn Secure Coding & Application Security

In this video, we explore secure coding concepts and real-world programming scenarios. Source code and examples are ...

1:04
Secure Code Lab – Learn Secure Coding & Application Security

55 views

3 weeks ago

Whiteboard Security 🛡️
Secure Software Development Lifecycle (Sdlc)

This whiteboard style video explains the Secure Software Development Lifecycle SDLC in a clear and practical way, making it ...

3:41
Secure Software Development Lifecycle (Sdlc)

91 views

3 weeks ago

SmartMoneyTutorials
How To Use Visual Studio Code For Secure Coding Practices (Best Practices)

How To Use Visual Studio Code For Secure Coding Practices (Best Practices) Access Visual Studio Code Here: ...

2:51
How To Use Visual Studio Code For Secure Coding Practices (Best Practices)

8 views

4 weeks ago

adobecoldfusion
ColdFusion Security in Action: Defend, Secure, and Update by Satyam Mishra

This session will emphasize secure coding practices and highlight the developer's responsibility in safeguarding applications from ...

48:31
ColdFusion Security in Action: Defend, Secure, and Update by Satyam Mishra

47 views

6 days ago

Xelion Tech
SQL Injection 🤔💉.

SQL Injection Explained Visually | How Attacks Happen & How to Prevent Them SQL Injection is one of the most dangerous and ...

0:46
SQL Injection 🤔💉.

10 views

2 weeks ago

Tech Newsday
She Hacks Purple: An Interview With Cybersecurity Expert Tanya Janca

She discusses her work in training developers on secure coding practices and application security, emphasizing the need for ...

43:03
She Hacks Purple: An Interview With Cybersecurity Expert Tanya Janca

185 views

2 weeks ago

VtexAI
Revolutionizing DevSecOps: AI and Generative AI in Action

Generative AI enhances secure coding practices and synthetic data generation for testing, while automated compliance checks ...

0:15
Revolutionizing DevSecOps: AI and Generative AI in Action

4 views

3 weeks ago

Software Excellence Alliance
Lessons from Using LLMs to Check Software Security

... role in software generation and assessment, emphasizing the influence of training data that includes insecure coding practices.

36:33
Lessons from Using LLMs to Check Software Security

235 views

3 weeks ago

VULNCON
Secure by Design: Embedding Security Across the Software Lifecycle | CXO Panel | VULNCON 2025

... of involving security teams 36:12 - Understanding business perspectives for security 39:01 - Need for secure coding practices ...

50:16
Secure by Design: Embedding Security Across the Software Lifecycle | CXO Panel | VULNCON 2025

355 views

3 weeks ago

Bare Metal Cyber
Episode 119: Secure Design and Secure Coding Guidelines

Secure applications start with secure design. In this episode, we explore how to incorporate security into architecture and code ...

11:03
Episode 119: Secure Design and Secure Coding Guidelines

4 views

2 weeks ago

Ngane Emmanuel
Practical 2 Part 1 – SQL Injection Attack Demo | Breaking Login Systems with OR '1'='1

In this session, we demonstrate how insecure coding practices can expose applications to serious security threats using SQL ...

29:08
Practical 2 Part 1 – SQL Injection Attack Demo | Breaking Login Systems with OR '1'='1

10 views

5 days ago

PCPL ALEX
SQL Injection with AI | Smart Web Security Testing Explained

... Defensive Focus This video focuses on: Security awareness Defensive testing techniques Secure coding practices Responsible ...

16:08
SQL Injection with AI | Smart Web Security Testing Explained

80 views

3 days ago

HARISH JAGDALE
Attacks by Danger Zone!!

Developers must follow secure coding practices and test applications thoroughly. Businesses must invest in security training, ...

0:26
Attacks by Danger Zone!!

7 views

3 weeks ago

Joshua Cayetano
Part 1 - Software Quality & Secure Design Presentation

... and attacks are intended to enhance understanding of secure software construction concepts, including secure coding practices ...

10:45
Part 1 - Software Quality & Secure Design Presentation

3 views

3 weeks ago

Infosec Now
Critical Security Flaws in Wondershare RepairIt Expose User Data

In this video, we explore the serious security vulnerabilities recently uncovered in Wondershare RepairIt, a popular data repair ...

8:57
Critical Security Flaws in Wondershare RepairIt Expose User Data

15 views

2 weeks ago

Lab Prove Hub
Cybersecurity Architecture: Mastering Application Security and DevSecOps

We dive into: • Secure Coding Practices: Using industry standards like the OWASP Top Ten to prevent buffer overflows and input ...

6:22
Cybersecurity Architecture: Mastering Application Security and DevSecOps

31 views

4 weeks ago

Secure Code Lab
This Python Login System Is Completely Broken (And How to Fix It)

This channel is dedicated to secure programming, cybersecurity concepts, and helping developers write code that cannot be ...

5:51
This Python Login System Is Completely Broken (And How to Fix It)

17 views

2 weeks ago