ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

148 results

PCPL ALEX
SQL Injection with AI | Smart Web Security Testing Explained

... Defensive Focus This video focuses on: Security awareness Defensive testing techniques Secure coding practices Responsible ...

16:08
SQL Injection with AI | Smart Web Security Testing Explained

11 views

2 hours ago

Cline
Cline Hooks: Detecting Security Vulnerabilities

... decisions and reinforces secure coding practices. Finally, we discuss how hooks fit into enterprise and regulated environments.

10:45
Cline Hooks: Detecting Security Vulnerabilities

146 views

4 days ago

Eddy Says Hi #EddySaysHi
(Podcast Long) 20 Years of Microsoft SDL: How to Build Unstoppable Software!

20 Years of Microsoft SDL: How to Build Unstoppable Software!** Ever wondered how the giants keep their code safe from ...

33:40
(Podcast Long) 20 Years of Microsoft SDL: How to Build Unstoppable Software!

10 views

6 days ago

Eddy Says Hi #EddySaysHi
Mastering the Microsoft SDL: 10 Practices for Secure Software

Mastering the Microsoft SDL: 10 Practices for Secure Software 🛡️ ** Ever wondered how the pros keep software safe in an ...

5:36
Mastering the Microsoft SDL: 10 Practices for Secure Software

0 views

6 days ago

adobecoldfusion
ColdFusion Security in Action: Defend, Secure, and Update by Satyam Mishra

This session will emphasize secure coding practices and highlight the developer's responsibility in safeguarding applications from ...

48:31
ColdFusion Security in Action: Defend, Secure, and Update by Satyam Mishra

43 views

3 days ago

Sweet Life Beat Life
How to Store Secrets in Github - Step by Step

... Seed repository security, encrypted storage on GitHub, sensitive data protection, step-by-step guide, secure coding practices ...

1:47
How to Store Secrets in Github - Step by Step

0 views

7 days ago

Simplilearn
Cyber Security Course 2026 [FREE]| Cyber Security Full Course For Beginners 2026 | Simplilearn

... Threats and Vulnerabilities ✓ Ethical Hacking ✓ Penetration Testing ✓ Secure Coding Practices ✓ Vulnerability Assessment ...

11:00:59
Cyber Security Course 2026 [FREE]| Cyber Security Full Course For Beginners 2026 | Simplilearn

1,487 views

Streamed 1 day ago

Simplilearn
Cyber Security Course 2026 [FREE]| Cyber Security Full Course For Beginners 2026 | Simplilearn

... Threats and Vulnerabilities ✓ Ethical Hacking ✓ Penetration Testing ✓ Secure Coding Practices ✓ Vulnerability Assessment ...

11:00:37
Cyber Security Course 2026 [FREE]| Cyber Security Full Course For Beginners 2026 | Simplilearn

1,356 views

Streamed 1 day ago

ImranTheExploitHunter
ImranTheExploitHunter YouTube Channel Intro

... methodologies including Red Teaming, Adversary Emulation, cybersecurity automation, and secure programming practices .

0:51
ImranTheExploitHunter YouTube Channel Intro

0 views

7 days ago

Penrose Learning
How to Use Visual Studio Code in Python - Full Guide

How to Use Visual Studio Code in Python - Full Guide | Surfshark VPN Deal — Stay private and secure. $1.99/mo + 3 Months ...

1:48
How to Use Visual Studio Code in Python - Full Guide

0 views

4 days ago

Not Milk Never Milk
How to Optimize the Code (easy Method)

How to Optimize the Code (easy Method) | Surfshark VPN Deal — Stay private and secure. $1.99/mo + 3 Months Free ...

1:47
How to Optimize the Code (easy Method)

0 views

7 days ago

Ngane Emmanuel
Practical 2 Part 1 – SQL Injection Attack Demo | Breaking Login Systems with OR '1'='1

In this session, we demonstrate how insecure coding practices can expose applications to serious security threats using SQL ...

29:08
Practical 2 Part 1 – SQL Injection Attack Demo | Breaking Login Systems with OR '1'='1

6 views

1 day ago

CyberLearn Visual
5 Critical API Security Vulnerabilities Developers Miss | OWASP API Top 10 2023

... security testing tutorials ✓ Security architecture patterns ✓ Real-world vulnerability analysis ✓ Secure coding best practices ...

7:37
5 Critical API Security Vulnerabilities Developers Miss | OWASP API Top 10 2023

4 views

5 days ago

Simplilearn
What is Cryptography? | Cryptography Tutorial For Beginners | Types of Cryptography | Simplilearn

... Threats and Vulnerabilities ✓ Ethical Hacking ✓ Penetration Testing ✓ Secure Coding Practices ✓ Vulnerability Assessment ...

19:39
What is Cryptography? | Cryptography Tutorial For Beginners | Types of Cryptography | Simplilearn

787 views

1 day ago

Matrix 404
ETHICAL HACKING: Understanding SQL Injection (Login Bypass Demo) | Educational Purpose Only ⚠️

... How vulnerable login systems can be exploited • Why input validation is important • Importance of secure coding practices I ...

13:33
ETHICAL HACKING: Understanding SQL Injection (Login Bypass Demo) | Educational Purpose Only ⚠️

12 views

4 days ago

MotivaLogic Academy
Injection Attacks

**Secure Coding Practices** – Avoid dynamic SQL, adopt prepared statements. **Regular Security Audits** – Use OWASP ...

13:10
Injection Attacks

1 view

6 days ago

NDC Conferences
React AI - Jim Manico - NDC AI 2025

CEO, Manicode Security This talk was recorded at NDC AI in Oslo, Norway. #ndcai #ndcconferences #developer ...

58:37
React AI - Jim Manico - NDC AI 2025

348 views

4 days ago

Syncfusion, Inc
Getting Started with Code Studio

In this video, discover how Syncfusion® Code Studio transforms enterprise software development with an AI-powered IDE and ...

6:26
Getting Started with Code Studio

77 views

2 days ago

Alex Followell | AI Automation
Clawdbot: Complete Beginner Guide! (2026)

Get the Prompts + Templates: https://www.skool.com/the-ai-edge/about Ready to transform your business with AI? Let's talk: ...

23:12
Clawdbot: Complete Beginner Guide! (2026)

18,958 views

5 days ago

Penrose Learning
How to Program with Chatgpt - Full Guide

How to Program with Chatgpt - Full Guide | Surfshark VPN Deal — Stay private and secure. $1.99/mo + 3 Months Free ...

1:56
How to Program with Chatgpt - Full Guide

0 views

4 days ago

Shiny shiny
Buffer overflow attack

buffer overflow attack.

5:00
Buffer overflow attack

22 views

6 days ago

Hacker Bhao - AnonBBD
Class 06 | JavaScript for Hacking |  Problem Solving on Previous Classes | Part 02

Course Description – JavaScript for Web Security (Ethical Hacking Focus) This course introduces students to how modern ...

9:39
Class 06 | JavaScript for Hacking | Problem Solving on Previous Classes | Part 02

155 views

3 days ago

Ngane Emmanuel
Lesson 5: Injection Attacks in APIs – SQL Injection Explained & Defenses (Spring Boot)

... ORM security, Hibernate security, Spring Data JPA, backend engineering, web security, API attacks, secure coding practices, ...

24:50
Lesson 5: Injection Attacks in APIs – SQL Injection Explained & Defenses (Spring Boot)

27 views

2 days ago

Lightup Technologies
Fullstack Developer Hiring - Work From Anywhere

Implement secure coding practices and perform code reviews. Collaborate with DevOps teams for CI/CD deployment pipelines ...

1:52
Fullstack Developer Hiring - Work From Anywhere

113 views

3 days ago

Hacker Bhao - AnonBBD
Class 05 | JavaScript for Hacking |  Problem Solving on Previous Classes | Part 01

Course Description – JavaScript for Web Security (Ethical Hacking Focus) This course introduces students to how modern ...

12:27
Class 05 | JavaScript for Hacking | Problem Solving on Previous Classes | Part 01

212 views

3 days ago