ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

836 results

Tom Olzak
Secure Coding Practices

In this video, we're going to treat secure coding like an engineering workflow—not a pile of tips. We'll start by identifying common ...

15:58
Secure Coding Practices

10 views

3 days ago

freeCodeCamp.org
OpenClaw Full Tutorial for Beginners – How to Set Up and Use OpenClaw (ClawdBot / MoltBot)

This course provides a comprehensive introduction to OpenClaw, a proactive autonomous agent and messaging gateway that ...

54:45
OpenClaw Full Tutorial for Beginners – How to Set Up and Use OpenClaw (ClawdBot / MoltBot)

152,044 views

5 days ago

Cline
Cline Hooks: Detecting Security Vulnerabilities

... decisions and reinforces secure coding practices. Finally, we discuss how hooks fit into enterprise and regulated environments.

10:45
Cline Hooks: Detecting Security Vulnerabilities

196 views

12 days ago

CyberTutor
What is DLL Injection Attack ?! | How Hackers Hijack Windows Processes

... injection attacks, including secure coding practices, endpoint protection strategies, and monitoring suspicious process behavior.

3:47
What is DLL Injection Attack ?! | How Hackers Hijack Windows Processes

63 views

2 weeks ago

Bare Metal Cyber
Episode 90: Code Review and Static/Dynamic Testing

Code is a frequent source of vulnerabilities, and reviewing it is essential for secure software development. In this episode, we ...

12:13
Episode 90: Code Review and Static/Dynamic Testing

1 view

3 weeks ago

Tech With Tim
ClawdBot - Full Tutorial & Setup Guide (SECURE)

Setup your VPS with Hostinger and use the code TECHWITHTIM for a 10% discount on annual plans: ...

50:04
ClawdBot - Full Tutorial & Setup Guide (SECURE)

35,797 views

1 day ago

Training Camp
CISSP Software Security: OWASP, Secure SDLC & DevSecOps

Join us for a deep dive into secure coding practices, the Secure Software Development Lifecycle (SSDLC), and how DevSecOps ...

1:18:20
CISSP Software Security: OWASP, Secure SDLC & DevSecOps

0 views

33 minutes ago

Tech Newsday
She Hacks Purple: An Interview With Cybersecurity Expert Tanya Janca

She discusses her work in training developers on secure coding practices and application security, emphasizing the need for ...

43:03
She Hacks Purple: An Interview With Cybersecurity Expert Tanya Janca

186 views

3 weeks ago

Bare Metal Cyber
Episode 119: Secure Design and Secure Coding Guidelines

Secure applications start with secure design. In this episode, we explore how to incorporate security into architecture and code ...

11:03
Episode 119: Secure Design and Secure Coding Guidelines

4 views

3 weeks ago

VULNCON
Secure by Design: Embedding Security Across the Software Lifecycle | CXO Panel | VULNCON 2025

... of involving security teams 36:12 - Understanding business perspectives for security 39:01 - Need for secure coding practices ...

50:16
Secure by Design: Embedding Security Across the Software Lifecycle | CXO Panel | VULNCON 2025

375 views

1 month ago

Retool
How to Vibe Code Securely: Building AI Apps Without Security Risks

Learn how to vibe code securely in AI-generated apps, covering risks like insecure defaults, broken auth, exposed secrets, and ...

8:44
How to Vibe Code Securely: Building AI Apps Without Security Risks

138 views

4 days ago

Joshua Cayetano
Part 1 - Software Quality & Secure Design Presentation

... and attacks are intended to enhance understanding of secure software construction concepts, including secure coding practices ...

10:45
Part 1 - Software Quality & Secure Design Presentation

3 views

4 weeks ago

adobecoldfusion
ColdFusion Security in Action: Defend, Secure, and Update by Satyam Mishra

This session will emphasize secure coding practices and highlight the developer's responsibility in safeguarding applications from ...

48:31
ColdFusion Security in Action: Defend, Secure, and Update by Satyam Mishra

49 views

11 days ago

Eddy Says Hi #EddySaysHi
(Podcast Long) 20 Years of Microsoft SDL: How to Build Unstoppable Software!

20 Years of Microsoft SDL: How to Build Unstoppable Software!** Ever wondered how the giants keep their code safe from ...

33:40
(Podcast Long) 20 Years of Microsoft SDL: How to Build Unstoppable Software!

13 views

2 weeks ago

Learn In Minutes
Security Fundamentals for Developers: Auth, JWT, OAuth, Threats, and Secure Defaults

... and how to implement secure coding best practices by default. Learn to build robust, secure applications and safeguard against ...

4:52
Security Fundamentals for Developers: Auth, JWT, OAuth, Threats, and Secure Defaults

10 views

4 weeks ago

PCPL ALEX
SQL Injection with AI | Smart Web Security Testing Explained

... Defensive Focus This video focuses on: Security awareness Defensive testing techniques Secure coding practices Responsible ...

16:08
SQL Injection with AI | Smart Web Security Testing Explained

94 views

8 days ago

AD_Penguin
2FA Madness Challenge — $70,000 Bug Bounty Case Study

Understanding 2FA Weaknesses in Bug Bounty Programs In this video, I walk through a real-world Two-Factor Authentication ...

2:09
2FA Madness Challenge — $70,000 Bug Bounty Case Study

126 views

12 days ago

censoredHacker
📂 PortSwigger: File Inclusion Vulnerabilities | LFI & RFI Explained 🔓

... file inclusion with other attacks - Secure coding practices to prevent LFI/RFI Links: Twitch: https://twitch.tv/censoredHacker X: ...

1:57:09
📂 PortSwigger: File Inclusion Vulnerabilities | LFI & RFI Explained 🔓

77 views

Streamed 3 weeks ago

Trevoir Williams
Preventing Path Traversal Attacks in ASP.NET Core (.NET 10)

NET - Learn how to write secure-by-design .NET applications by identifying vulnerabilities, applying secure coding practices, and ...

10:43
Preventing Path Traversal Attacks in ASP.NET Core (.NET 10)

262 views

4 days ago

Hank Hackerson
Full CySa+ (CS0-004) EP7 | Mitigating & Responding to Vulnerabilities

... 25:31 Patching, Secure Development Lifecycle, Threat Modeling 34:40 Attack Surface Management & Secure Coding Practices ...

1:26:35
Full CySa+ (CS0-004) EP7 | Mitigating & Responding to Vulnerabilities

109 views

4 days ago