ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

127 results

Cline
Cline Hooks: Detecting Security Vulnerabilities

... decisions and reinforces secure coding practices. Finally, we discuss how hooks fit into enterprise and regulated environments.

10:45
Cline Hooks: Detecting Security Vulnerabilities

147 views

4 days ago

PCPL ALEX
SQL Injection with AI | Smart Web Security Testing Explained

... Defensive Focus This video focuses on: Security awareness Defensive testing techniques Secure coding practices Responsible ...

16:08
SQL Injection with AI | Smart Web Security Testing Explained

26 views

5 hours ago

adobecoldfusion
ColdFusion Security in Action: Defend, Secure, and Update by Satyam Mishra

This session will emphasize secure coding practices and highlight the developer's responsibility in safeguarding applications from ...

48:31
ColdFusion Security in Action: Defend, Secure, and Update by Satyam Mishra

43 views

3 days ago

Eddy Says Hi #EddySaysHi
Mastering the Microsoft SDL: 10 Practices for Secure Software

Mastering the Microsoft SDL: 10 Practices for Secure Software 🛡️ ** Ever wondered how the pros keep software safe in an ...

5:36
Mastering the Microsoft SDL: 10 Practices for Secure Software

0 views

6 days ago

Simplilearn
Cyber Security Course 2026 [FREE]| Cyber Security Full Course For Beginners 2026 | Simplilearn

... Threats and Vulnerabilities ✓ Ethical Hacking ✓ Penetration Testing ✓ Secure Coding Practices ✓ Vulnerability Assessment ...

11:00:59
Cyber Security Course 2026 [FREE]| Cyber Security Full Course For Beginners 2026 | Simplilearn

1,518 views

Streamed 1 day ago

ImranTheExploitHunter
ImranTheExploitHunter YouTube Channel Intro

... methodologies including Red Teaming, Adversary Emulation, cybersecurity automation, and secure programming practices .

0:51
ImranTheExploitHunter YouTube Channel Intro

2 views

7 days ago

Simplilearn
Cyber Security Course 2026 [FREE]| Cyber Security Full Course For Beginners 2026 | Simplilearn

... Threats and Vulnerabilities ✓ Ethical Hacking ✓ Penetration Testing ✓ Secure Coding Practices ✓ Vulnerability Assessment ...

11:00:37
Cyber Security Course 2026 [FREE]| Cyber Security Full Course For Beginners 2026 | Simplilearn

1,371 views

Streamed 1 day ago

CyberLearn Visual
5 Critical API Security Vulnerabilities Developers Miss | OWASP API Top 10 2023

... security testing tutorials ✓ Security architecture patterns ✓ Real-world vulnerability analysis ✓ Secure coding best practices ...

7:37
5 Critical API Security Vulnerabilities Developers Miss | OWASP API Top 10 2023

4 views

5 days ago

Ngane Emmanuel
Practical 2 Part 1 – SQL Injection Attack Demo | Breaking Login Systems with OR '1'='1

In this session, we demonstrate how insecure coding practices can expose applications to serious security threats using SQL ...

29:08
Practical 2 Part 1 – SQL Injection Attack Demo | Breaking Login Systems with OR '1'='1

6 views

1 day ago

Matrix 404
ETHICAL HACKING: Understanding SQL Injection (Login Bypass Demo) | Educational Purpose Only ⚠️

... How vulnerable login systems can be exploited • Why input validation is important • Importance of secure coding practices I ...

13:33
ETHICAL HACKING: Understanding SQL Injection (Login Bypass Demo) | Educational Purpose Only ⚠️

16 views

4 days ago

Simplilearn
What is Cryptography? | Cryptography Tutorial For Beginners | Types of Cryptography | Simplilearn

... Threats and Vulnerabilities ✓ Ethical Hacking ✓ Penetration Testing ✓ Secure Coding Practices ✓ Vulnerability Assessment ...

19:39
What is Cryptography? | Cryptography Tutorial For Beginners | Types of Cryptography | Simplilearn

833 views

1 day ago

MotivaLogic Academy
Injection Attacks

**Secure Coding Practices** – Avoid dynamic SQL, adopt prepared statements. **Regular Security Audits** – Use OWASP ...

13:10
Injection Attacks

1 view

6 days ago

Syncfusion, Inc
Getting Started with Code Studio

In this video, discover how Syncfusion® Code Studio transforms enterprise software development with an AI-powered IDE and ...

6:26
Getting Started with Code Studio

78 views

3 days ago

Alex Followell | AI Automation
Clawdbot: Complete Beginner Guide! (2026)

Get the Prompts + Templates: https://www.skool.com/the-ai-edge/about Ready to transform your business with AI? Let's talk: ...

23:12
Clawdbot: Complete Beginner Guide! (2026)

19,068 views

5 days ago

NDC Conferences
React AI - Jim Manico - NDC AI 2025

CEO, Manicode Security This talk was recorded at NDC AI in Oslo, Norway. #ndcai #ndcconferences #developer ...

58:37
React AI - Jim Manico - NDC AI 2025

348 views

4 days ago

Shiny shiny
Buffer overflow attack

buffer overflow attack.

5:00
Buffer overflow attack

22 views

7 days ago

The AI Law: AI Security, Risk & Liability
The AI Security Problem Nobody's Talking About!

The integration of artificial intelligence into development tools has permanently reshaped software security, demanding a new ...

6:04
The AI Security Problem Nobody's Talking About!

0 views

20 minutes ago

Hacker Bhao - AnonBBD
Class 06 | JavaScript for Hacking |  Problem Solving on Previous Classes | Part 02

Course Description – JavaScript for Web Security (Ethical Hacking Focus) This course introduces students to how modern ...

9:39
Class 06 | JavaScript for Hacking | Problem Solving on Previous Classes | Part 02

160 views

3 days ago

Ngane Emmanuel
Lesson 5: Injection Attacks in APIs – SQL Injection Explained & Defenses (Spring Boot)

... ORM security, Hibernate security, Spring Data JPA, backend engineering, web security, API attacks, secure coding practices, ...

24:50
Lesson 5: Injection Attacks in APIs – SQL Injection Explained & Defenses (Spring Boot)

31 views

2 days ago

AD_Penguin
2FA Madness Challenge — $70,000 Bug Bounty Case Study

2FA Bypass | Bug Bounty Real Scenario (Educational Purpose Only) In this video, I walk through a real-world Two-Factor ...

2:09
2FA Madness Challenge — $70,000 Bug Bounty Case Study

99 views

4 days ago