ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

141 results

Cline
Cline Hooks: Detecting Security Vulnerabilities

... decisions and reinforces secure coding practices. Finally, we discuss how hooks fit into enterprise and regulated environments.

10:45
Cline Hooks: Detecting Security Vulnerabilities

178 views

7 days ago

adobecoldfusion
ColdFusion Security in Action: Defend, Secure, and Update by Satyam Mishra

This session will emphasize secure coding practices and highlight the developer's responsibility in safeguarding applications from ...

48:31
ColdFusion Security in Action: Defend, Secure, and Update by Satyam Mishra

47 views

6 days ago

Arihant Online Academy
XSS Attack Explained Simply | Cross-Site Scripting for Beginners

... you understand why XSS attacks remain a critical security issue and how secure coding practices can significantly reduce risk.

1:38
XSS Attack Explained Simply | Cross-Site Scripting for Beginners

19 views

14 hours ago

Ngane Emmanuel
Practical 2 Part 1 – SQL Injection Attack Demo | Breaking Login Systems with OR '1'='1

In this session, we demonstrate how insecure coding practices can expose applications to serious security threats using SQL ...

29:08
Practical 2 Part 1 – SQL Injection Attack Demo | Breaking Login Systems with OR '1'='1

9 views

4 days ago

Keith AI
Complete Guide to OpenClaw / Clawdbot in 35 minutes

I spent 100 hours deep-diving into OpenClaw(formerly ClawdBot) - an AI agent that doesn't just assist, it actually takes action for ...

35:26
Complete Guide to OpenClaw / Clawdbot in 35 minutes

57,534 views

5 days ago

freeCodeCamp.org
OpenClaw Full Tutorial for Beginners – How to Set Up and Use OpenClaw (ClawdBot / MoltBot)

This course provides a comprehensive introduction to OpenClaw, a proactive autonomous agent and messaging gateway that ...

54:45
OpenClaw Full Tutorial for Beginners – How to Set Up and Use OpenClaw (ClawdBot / MoltBot)

14,910 views

6 hours ago

PCPL ALEX
SQL Injection with AI | Smart Web Security Testing Explained

... Defensive Focus This video focuses on: Security awareness Defensive testing techniques Secure coding practices Responsible ...

16:08
SQL Injection with AI | Smart Web Security Testing Explained

79 views

3 days ago

Simplilearn
Cyber Security Course 2026 [FREE]| Cyber Security Full Course For Beginners 2026 | Simplilearn

... Threats and Vulnerabilities ✓ Ethical Hacking ✓ Penetration Testing ✓ Secure Coding Practices ✓ Vulnerability Assessment ...

11:00:37
Cyber Security Course 2026 [FREE]| Cyber Security Full Course For Beginners 2026 | Simplilearn

1,524 views

Streamed 4 days ago

The Exploit Lab
Hack Android Apps Fast: 3-Hour Crash Course

Android Security & APK Analysis – Learn in Just 3 Hours! Want to understand how Android apps work internally and how security ...

2:50:26
Hack Android Apps Fast: 3-Hour Crash Course

91 views

5 days ago

RoboNuggets
Clawdbot Made Simple - No Hype, Just How It Works (and how to set it up)

Join RoboNuggets when you're ready to learn & earn from AI: ...

18:43
Clawdbot Made Simple - No Hype, Just How It Works (and how to set it up)

10,870 views

7 days ago

Mike Holcomb
Uncover the HIDDEN Threats in OT/ICS Cybersecurity

... (FrostyGoop) 08:48 Top 20 Secure PLC Coding Practices (https://www.plc-security.com) 12:15 Firmware Vulnerabilities in PLCs ...

25:38
Uncover the HIDDEN Threats in OT/ICS Cybersecurity

56 views

3 hours ago

Turbo Learn PHP
API-Over-fetching-Return-Everything-vs-Field-Selection #PHP

Watch how senior PHP developers write clean, secure code. Learn best practices and modern techniques that separate ...

0:17
API-Over-fetching-Return-Everything-vs-Field-Selection #PHP

0 views

1 day ago

Simplilearn
Cyber Security Course 2026 [FREE]| Cyber Security Full Course For Beginners 2026 | Simplilearn

... Threats and Vulnerabilities ✓ Ethical Hacking ✓ Penetration Testing ✓ Secure Coding Practices ✓ Vulnerability Assessment ...

11:00:59
Cyber Security Course 2026 [FREE]| Cyber Security Full Course For Beginners 2026 | Simplilearn

1,791 views

Streamed 4 days ago

Wiz
What Is Software Composition Analysis (SCA)? | Wiz CloudSec Shorts

... OSS SCA Tools: https://www.wiz.io/academy/application-security/oss-sca-tools - Secure Coding Best Practices Cheat Sheet: ...

2:17
What Is Software Composition Analysis (SCA)? | Wiz CloudSec Shorts

0 views

4 hours ago

Ngane Emmanuel
Practical 2 Part 2 – Preventing SQL Injection | Securing Login APIs with Validation & Safe Queries

In this session, we focus on fixing the security flaws exposed in Practical 2 Part 1 by implementing proper validation, exception ...

1:11:59
Practical 2 Part 2 – Preventing SQL Injection | Securing Login APIs with Validation & Safe Queries

32 views

4 days ago

B2B TD
WebAttack Sandbox — AI-Powered Cybersecurity Learning Platform | Hackathon Demo

... vulnerable labs with an AI security mentor that explains both attacks and secure coding practices. Tech Stack: Frontend: Netlify ...

4:08
WebAttack Sandbox — AI-Powered Cybersecurity Learning Platform | Hackathon Demo

0 views

7 days ago

NDC Conferences
React AI - Jim Manico - NDC AI 2025

CEO, Manicode Security This talk was recorded at NDC AI in Oslo, Norway. #ndcai #ndcconferences #developer ...

58:37
React AI - Jim Manico - NDC AI 2025

363 views

7 days ago

CSCP28
CNS ASSIGNMENT 1(23VV1A1244),buffer overflow attack

CNS assignment 1(buffer overflow attack)

5:22
CNS ASSIGNMENT 1(23VV1A1244),buffer overflow attack

7 views

6 days ago

Syncfusion, Inc
Getting Started with Code Studio

In this video, discover how Syncfusion® Code Studio transforms enterprise software development with an AI-powered IDE and ...

6:26
Getting Started with Code Studio

92 views

6 days ago

Hacker Bhao - AnonBBD
Class 06 | JavaScript for Hacking |  Problem Solving on Previous Classes | Part 02

Course Description – JavaScript for Web Security (Ethical Hacking Focus) This course introduces students to how modern ...

9:39
Class 06 | JavaScript for Hacking | Problem Solving on Previous Classes | Part 02

207 views

6 days ago

Ngane Emmanuel
Lesson 5: Injection Attacks in APIs – SQL Injection Explained & Defenses (Spring Boot)

... ORM security, Hibernate security, Spring Data JPA, backend engineering, web security, API attacks, secure coding practices, ...

24:50
Lesson 5: Injection Attacks in APIs – SQL Injection Explained & Defenses (Spring Boot)

42 views

5 days ago

Matrix 404
ETHICAL HACKING: Understanding SQL Injection (Login Bypass Demo) | Educational Purpose Only ⚠️

... How vulnerable login systems can be exploited • Why input validation is important • Importance of secure coding practices I ...

13:33
ETHICAL HACKING: Understanding SQL Injection (Login Bypass Demo) | Educational Purpose Only ⚠️

16 views

7 days ago

AppSecEngineer
What is Broken Access Control? Java Edition

... vulnerable code can be exploited and guide you on implementing secure code practices to prevent unauthorized data access.

4:27
What is Broken Access Control? Java Edition

0 views

1 day ago

Simplilearn
What is Cryptography? | Cryptography Tutorial For Beginners | Types of Cryptography | Simplilearn

... Threats and Vulnerabilities ✓ Ethical Hacking ✓ Penetration Testing ✓ Secure Coding Practices ✓ Vulnerability Assessment ...

19:39
What is Cryptography? | Cryptography Tutorial For Beginners | Types of Cryptography | Simplilearn

985 views

4 days ago

Ngane Emmanuel
Practical 2 Part 3 – Securing Login with JPA Repository | Clean Architecture & Safe Authentication

... security with jpa,java repository pattern,spring boot login tutorial,secure coding practices,service layer refactoring,secure rest ...

30:07
Practical 2 Part 3 – Securing Login with JPA Repository | Clean Architecture & Safe Authentication

6 views

4 days ago