ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

147 results

Cline
Cline Hooks: Detecting Security Vulnerabilities

... decisions and reinforces secure coding practices. Finally, we discuss how hooks fit into enterprise and regulated environments.

10:45
Cline Hooks: Detecting Security Vulnerabilities

143 views

4 days ago

Eddy Says Hi #EddySaysHi
(Podcast Long) 20 Years of Microsoft SDL: How to Build Unstoppable Software!

20 Years of Microsoft SDL: How to Build Unstoppable Software!** Ever wondered how the giants keep their code safe from ...

33:40
(Podcast Long) 20 Years of Microsoft SDL: How to Build Unstoppable Software!

10 views

6 days ago

adobecoldfusion
ColdFusion Security in Action: Defend, Secure, and Update by Satyam Mishra

This session will emphasize secure coding practices and highlight the developer's responsibility in safeguarding applications from ...

48:31
ColdFusion Security in Action: Defend, Secure, and Update by Satyam Mishra

43 views

3 days ago

Eddy Says Hi #EddySaysHi
Mastering the Microsoft SDL: 10 Practices for Secure Software

Mastering the Microsoft SDL: 10 Practices for Secure Software 🛡️ ** Ever wondered how the pros keep software safe in an ...

5:36
Mastering the Microsoft SDL: 10 Practices for Secure Software

0 views

5 days ago

NDC Conferences
React AI - Jim Manico - NDC AI 2025

CEO, Manicode Security This talk was recorded at NDC AI in Oslo, Norway. #ndcai #ndcconferences #developer ...

58:37
React AI - Jim Manico - NDC AI 2025

351 views

3 days ago

Ngane Emmanuel
Practical 2 Part 1 – SQL Injection Attack Demo | Breaking Login Systems with OR '1'='1

In this session, we demonstrate how insecure coding practices can expose applications to serious security threats using SQL ...

29:08
Practical 2 Part 1 – SQL Injection Attack Demo | Breaking Login Systems with OR '1'='1

6 views

1 day ago

Simplilearn
Cyber Security Course 2026 [FREE]| Cyber Security Full Course For Beginners 2026 | Simplilearn

... Threats and Vulnerabilities ✓ Ethical Hacking ✓ Penetration Testing ✓ Secure Coding Practices ✓ Vulnerability Assessment ...

11:00:59
Cyber Security Course 2026 [FREE]| Cyber Security Full Course For Beginners 2026 | Simplilearn

1,428 views

Streamed 1 day ago

Sweet Life Beat Life
How to Store Secrets in Github - Step by Step

... Seed repository security, encrypted storage on GitHub, sensitive data protection, step-by-step guide, secure coding practices ...

1:47
How to Store Secrets in Github - Step by Step

0 views

6 days ago

Simplilearn
What is Cryptography? | Cryptography Tutorial For Beginners | Types of Cryptography | Simplilearn

... Threats and Vulnerabilities ✓ Ethical Hacking ✓ Penetration Testing ✓ Secure Coding Practices ✓ Vulnerability Assessment ...

19:39
What is Cryptography? | Cryptography Tutorial For Beginners | Types of Cryptography | Simplilearn

771 views

21 hours ago

CyberLearn Visual
5 Critical API Security Vulnerabilities Developers Miss | OWASP API Top 10 2023

... security testing tutorials ✓ Security architecture patterns ✓ Real-world vulnerability analysis ✓ Secure coding best practices ...

7:37
5 Critical API Security Vulnerabilities Developers Miss | OWASP API Top 10 2023

4 views

5 days ago

Simplilearn
Cyber Security Course 2026 [FREE]| Cyber Security Full Course For Beginners 2026 | Simplilearn

... Threats and Vulnerabilities ✓ Ethical Hacking ✓ Penetration Testing ✓ Secure Coding Practices ✓ Vulnerability Assessment ...

11:00:37
Cyber Security Course 2026 [FREE]| Cyber Security Full Course For Beginners 2026 | Simplilearn

1,346 views

Streamed 1 day ago

ImranTheExploitHunter
ImranTheExploitHunter YouTube Channel Intro

... methodologies including Red Teaming, Adversary Emulation, cybersecurity automation, and secure programming practices .

0:51
ImranTheExploitHunter YouTube Channel Intro

0 views

7 days ago

Not Milk Never Milk
How to Optimize the Code (easy Method)

How to Optimize the Code (easy Method) | Surfshark VPN Deal — Stay private and secure. $1.99/mo + 3 Months Free ...

1:47
How to Optimize the Code (easy Method)

0 views

7 days ago

Penrose Learning
How to Use Visual Studio Code in Python - Full Guide

How to Use Visual Studio Code in Python - Full Guide | Surfshark VPN Deal — Stay private and secure. $1.99/mo + 3 Months ...

1:48
How to Use Visual Studio Code in Python - Full Guide

0 views

4 days ago

Matrix 404
ETHICAL HACKING: Understanding SQL Injection (Login Bypass Demo) | Educational Purpose Only ⚠️

... How vulnerable login systems can be exploited • Why input validation is important • Importance of secure coding practices I ...

13:33
ETHICAL HACKING: Understanding SQL Injection (Login Bypass Demo) | Educational Purpose Only ⚠️

11 views

4 days ago

Ngane Emmanuel
Practical 2 Part 2 – Preventing SQL Injection | Securing Login APIs with Validation & Safe Queries

In this session, we focus on fixing the security flaws exposed in Practical 2 Part 1 by implementing proper validation, exception ...

1:11:59
Practical 2 Part 2 – Preventing SQL Injection | Securing Login APIs with Validation & Safe Queries

10 views

1 day ago

Alex Followell | AI Automation
Clawdbot: Complete Beginner Guide! (2026)

Get the Prompts + Templates: https://www.skool.com/the-ai-edge/about Ready to transform your business with AI? Let's talk: ...

23:12
Clawdbot: Complete Beginner Guide! (2026)

18,844 views

4 days ago

MotivaLogic Academy
Injection Attacks

**Secure Coding Practices** – Avoid dynamic SQL, adopt prepared statements. **Regular Security Audits** – Use OWASP ...

13:10
Injection Attacks

1 view

6 days ago

Sonny Sangha
🔴 Let’s build an AI Dating App with REACT NATIVE! (Expo SDK 55, Clerk, Convex, OpenAI, Vector Embed)

1️⃣ Get Started with Clerk https://go.clerk.com/aV0wpm7 2️⃣ Get Started with Expo ...

4:16:45
🔴 Let’s build an AI Dating App with REACT NATIVE! (Expo SDK 55, Clerk, Convex, OpenAI, Vector Embed)

51,952 views

Streamed 6 days ago

Syncfusion, Inc
Getting Started with Code Studio

In this video, discover how Syncfusion® Code Studio transforms enterprise software development with an AI-powered IDE and ...

6:26
Getting Started with Code Studio

76 views

2 days ago

Ngane Emmanuel
Lesson 5: Injection Attacks in APIs – SQL Injection Explained & Defenses (Spring Boot)

... ORM security, Hibernate security, Spring Data JPA, backend engineering, web security, API attacks, secure coding practices, ...

24:50
Lesson 5: Injection Attacks in APIs – SQL Injection Explained & Defenses (Spring Boot)

27 views

2 days ago

Hacker Bhao - AnonBBD
Class 06 | JavaScript for Hacking |  Problem Solving on Previous Classes | Part 02

Course Description – JavaScript for Web Security (Ethical Hacking Focus) This course introduces students to how modern ...

9:39
Class 06 | JavaScript for Hacking | Problem Solving on Previous Classes | Part 02

147 views

2 days ago

Shiny shiny
Buffer overflow attack

buffer overflow attack.

5:00
Buffer overflow attack

22 views

6 days ago

NextLabs
Overview of NIST Secure Software Development, Security, & Operations (DevSecOps) Practices Project

In this NIST virtual event, Alper Kerman provides an overview of a NIST consortium project led by the National Cybersecurity ...

13:13
Overview of NIST Secure Software Development, Security, & Operations (DevSecOps) Practices Project

21 views

5 days ago

Penrose Learning
How to Program with Chatgpt - Full Guide

How to Program with Chatgpt - Full Guide | Surfshark VPN Deal — Stay private and secure. $1.99/mo + 3 Months Free ...

1:56
How to Program with Chatgpt - Full Guide

0 views

4 days ago