Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Web Application Security
YouTube
education
Showing:
586
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Bug Bounty Training Lessons and Bug Bounty Tutorials
1
rewiews
Comprehensive bug bounty training covering various security vulnerabilities, testing techniques, and tools. Ideal for aspiring ethical hackers and cybersecurity professionals.
Add to list
79
Lesons
20 hours
On-Demand
Free-Video
Burp Suite 101 - How to Use Burp Suite
1
rewiews
Learn essential web application security testing with Burp Suite's free version. Covers installation, settings, plugins, and key features like crawling, Repeater, and Intruder.
Add to list
6
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Bugbounty Hunting
2
rewiews
Comprehensive guide to bug bounty hunting, covering tools, techniques, and vulnerabilities for ethical hacking and cybersecurity enthusiasts.
Add to list
35
Lesons
7 hours
On-Demand
Free-Video
HackerSploit
Web App Penetration Testing Tutorials
1
rewiews
Comprehensive tutorial series on web app penetration testing, covering tools, techniques, and real-world scenarios for identifying and exploiting vulnerabilities in web applications.
Add to list
39
Lesons
12 hours
On-Demand
Free-Video
NahamSec
Hacking with Google Dorking
1
rewiews
Learn advanced Google search techniques to uncover hidden information and potential security vulnerabilities in websites and online systems.
Add to list
1
Lesons
11 minutes
On-Demand
Free-Video
Stanford University
Rocket- Securing the Web at Compile-Time
0
rewiews
Discover Rocket, a web framework for Rust that simplifies secure coding. Learn how it prevents common vulnerabilities and why companies like NPM and Mozilla use it in production.
Add to list
20
Lesons
49 minutes
On-Demand
Free-Video
HackerOne
Hacker101
0
rewiews
Learn essential bug bounty hunting skills through comprehensive video tutorials covering web security, exploitation techniques, and ethical hacking practices.
Add to list
27
Lesons
4 hours 30 minutes
On-Demand
Free-Video
Spring Security Tutorial
0
rewiews
Comprehensive guide to Spring Security, covering authentication, MySQL integration, password encoding, form login, and OAuth 2.0 implementation for robust application security.
Add to list
7
Lesons
1 hour 7 minutes
On-Demand
Free-Video
Cyber Mentor
How to Be an Ethical Hacker in 2021
0
rewiews
Comprehensive guide to becoming an ethical hacker, covering essential skills, techniques, and certifications. Offers practical advice for beginners and professionals looking to advance their cybersecurity careers.
Add to list
16
Lesons
47 minutes
On-Demand
Free-Video
Cyber Mentor
Beginner Web Application Hacking
0
rewiews
Comprehensive introduction to web application hacking, covering enumeration, XSS, SQL injection, broken access control, and more. Includes live bug bounty hunting demonstration.
Add to list
6
Lesons
5 hours 8 minutes
On-Demand
Free-Video
Cyber Mentor
Web App Testing - Enumeration, XSS, and UI Bypassing
0
rewiews
Learn web app testing techniques including enumeration, UI bypassing, and XSS through hands-on challenges. Gain practical skills in using Burp Suite and understanding common vulnerabilities.
Add to list
15
Lesons
1 hour 34 minutes
On-Demand
Free-Video
Cyber Mentor
Web App Testing - Enumeration
0
rewiews
Learn web app enumeration techniques including subdomain discovery, vulnerability scanning, and using tools like Burp Suite and Nikto to identify potential security weaknesses.
Add to list
19
Lesons
2 hours 34 minutes
On-Demand
Free-Video
David Bombal
Burp Suite
0
rewiews
Comprehensive introduction to Burp Suite for web application security testing, covering key features like proxy, repeater, and intruder. Includes hands-on demos for SQL injection and fuzzing.
Add to list
26
Lesons
1 hour 6 minutes
On-Demand
Free-Video
Cyber Mentor
Web Application Pentesting
0
rewiews
Learn comprehensive web application penetration testing techniques, from enumeration to advanced exploits, with hands-on practice and real-world bug bounty hunting scenarios.
Add to list
7
Lesons
12 hours
On-Demand
Free-Video
John Hammond
Using Snyk to Find & Fix Vulnerabilities
0
rewiews
Learn to use Snyk for finding and fixing vulnerabilities in web applications, including hands-on practice with a vulnerable app and a CTF challenge involving prototype pollution and RCE.
Add to list
17
Lesons
31 minutes
On-Demand
Free-Video
Burp Suite Complete Tutorial
0
rewiews
Comprehensive guide to Burp Suite for web application security, covering proxy setup, HTTPS, mapping, scanning, and intruder attacks for effective penetration testing.
Add to list
10
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Burp Suite Tips
0
rewiews
Learn essential Burp Suite techniques for web application security testing, including interception, scanning, and using powerful extensions like Turbo Intruder and XSSValidator.
Add to list
7
Lesons
1 hour 30 minutes
On-Demand
Free-Video
BurpSuite Extensions
0
rewiews
Explore popular BurpSuite extensions for advanced web security testing, including Request Smuggler, Logger++, J2EEScan, and JWT Attacker, to enhance your hacking capabilities.
Add to list
6
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Using Burp to Test for the OWASP Top Ten
0
rewiews
Learn to use Burp Suite for detecting and exploiting various web vulnerabilities, including SQL injection, XSS, and authentication bypass, aligned with OWASP Top Ten security risks.
Add to list
12
Lesons
30 minutes
On-Demand
Free-Video
Learn Burp Suite, the Nr. 1 Web Hacking Tool
0
rewiews
Master Burp Suite for web application penetration testing. Hands-on exercises with WebGoat, covering key modules like Proxy, Repeater, and Intruder. Automate tasks and perform efficient manual testing.
Add to list
9
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Linode
Securing Your Web App - Python App From Scratch With Justin Mitchel
0
rewiews
Learn essential web app security practices: SSH keys, user permissions, and NGINX with UFW. Hands-on tutorial for implementing crucial safeguards in Python web applications.
Add to list
5
Lesons
39 minutes
On-Demand
Free-Video
Hussein Nasser
Securing Backend Applications - OWASP Recommendations
0
rewiews
Explore OWASP's top 10 web application security vulnerabilities with real-life examples and practical insights to enhance backend security and protect against common threats.
Add to list
11
Lesons
28 minutes
On-Demand
Free-Video
Nginx
Secure Your Apps with NGINX and the ModSecurity WAF
0
rewiews
Learn to protect web applications using NGINX with ModSecurity WAF. Covers WAF basics, ModSecurity features, rule types, OWASP Top 10, custom rules, configurations, and includes a demo.
Add to list
13
Lesons
36 minutes
On-Demand
Free-Video
Tech with Tim
Python Blog Tutorial - Flask User Authentication and Security
0
rewiews
Learn to implement user authentication and security features in a Flask-based blog application, including sign-in, sign-out, and account creation functionalities.
Add to list
11
Lesons
52 minutes
On-Demand
Free-Video
Bug Bounty In Hindi
0
rewiews
Comprehensive guide to bug bounty hunting, covering various vulnerabilities and techniques using tools like Burp Suite. Includes practical demonstrations and real-world examples.
Add to list
15
Lesons
3 hours 30 minutes
On-Demand
Free-Video
Bug Bounty
0
rewiews
Learn essential bug bounty techniques, including XSS, EXIF data bugs, and subdomain takeovers. Explore tools like Burp Suite and gain practical skills to become a successful bug bounty hunter.
Add to list
16
Lesons
7 hours
On-Demand
Free-Video
Great Learning
Ethical Hacking Tutorial for Beginners in Hindi - Kali Linux
0
rewiews
Great Learning brings you this beginner-friendly tutorial on Ethical Hacking to take you from the starting point through the finishing point of everything you need to know about this domain and getting started on the journey to master it.
Add to list
14
Lesons
1 hour 55 minutes
On-Demand
Free-Video
BurpSuite Basics Tutorials
0
rewiews
Learn BurpSuite basics for web app penetration testing in Hindi. Covers installation, configuration, scoping, proxy interception, repeater, intruder attacks, decoder, comparer, and invisible proxy.
Add to list
9
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Bug Bounty - Bugs and POC
0
rewiews
Explore bug bounty techniques including recon, subdomain enumeration, XSS, clickjacking, file vulnerabilities, CORS, SQL injection, and LFI. Learn to identify and exploit web security flaws.
Add to list
12
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Bug Bounty
0
rewiews
Comprehensive guide to bug bounty hunting, covering methodologies, tools, and techniques for identifying vulnerabilities in web applications and networks.
Add to list
9
Lesons
2 hours 30 minutes
On-Demand
Free-Video
OWASP Foundation
Zed Attack Proxy - Introduction to Web Application Security Testing
0
rewiews
Aprende a utilizar ZAP, un proxy de interceptación para observar solicitudes y respuestas en aplicaciones web. Descubre técnicas de hacking ético y seguridad informática con un experto en el campo.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
OWASP Foundation
El Proyecto GoLISMERO - Auditando Aplicaciones Web de Manera Fácil
0
rewiews
Descubre GoLISMERO, un spider web que detecta vulnerabilidades y formatea resultados para auditorías web eficientes, facilitando la identificación de puntos de entrada para pruebas de seguridad.
Add to list
1
Lesons
1 hour 1 minute
On-Demand
Free-Video
Ekoparty Security Conference
Exploring Web Applications Through Their JavaScript - Uncovering Hidden Information
0
rewiews
Descubre cómo analizar el código JavaScript de sitios web para encontrar información valiosa como API Keys, endpoints internos y usuarios, mejorando tus habilidades en seguridad web.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Hunting Web Vulnerabilities - Introduction to Ethical Hacking - Workshop 3
0
rewiews
Taller práctico sobre hacking ético de sitios web. Aprende técnicas legales para identificar vulnerabilidades, comprender el funcionamiento de la web y explorar oportunidades en seguridad informática.
Add to list
16
Lesons
2 hours
On-Demand
Free-Video
OWASP Foundation
OWASP ModSecurity: Web Application Firewall Overview
0
rewiews
Explore OWASP ModSecurity's features and implementation for enhancing web application security through this concise presentation by Ervin Hegedüs.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
media.ccc.de
Bumpy Roads - Exploring Security Vulnerabilities in Regional Carsharing Systems
0
rewiews
Entdecke Schwachstellen und unsichere Software eines regionalen Carsharing-Anbieters. Tauche ein in ein Korallenriff voller Sicherheitslücken und lerne über Web-Applikationen, deren Schwachstellen und unsicheres Design.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
HackerSploit
Docker for Pentesting & Bug Bounty Hunting
0
rewiews
Explore Docker's potential for pentesting and bug bounty hunting. Learn to set up Kali Linux, OWASP Juice Shop, and Bug Bounty Toolkit, enhancing your cybersecurity skills and workflow efficiency.
Add to list
12
Lesons
39 minutes
On-Demand
Free-Video
Cyber Mentor
Learn Offensive JavaScript Today
0
rewiews
Discover offensive JavaScript techniques including keylogging, data exfiltration, password theft, and CSRF bypass in this concise tutorial on exploiting web vulnerabilities.
Add to list
7
Lesons
13 minutes
On-Demand
Free-Video
zseano
Unique Mindset - Hacking Techniques and Favorite Findings
0
rewiews
Explore zseano's unique hacking mindset through real-world examples, favorite findings, and insights on identifying critical vulnerabilities in web applications.
Add to list
8
Lesons
27 minutes
On-Demand
Free-Video
Bugcrowd
LevelUp 0x04: Advanced Bug Bounty Techniques - Day 2
0
rewiews
Explore advanced bug bounty techniques and strategies with industry experts in this comprehensive cybersecurity event focused on enhancing hacking skills and knowledge.
Add to list
1
Lesons
4 hours 37 minutes
On-Demand
Free-Video
Bugcrowd
Hacking with Burp Suite for Bug Bounties - Tutorial 1
0
rewiews
Learn essential Burp Suite techniques for bug bounty hunting, including setup and basic functionality, to enhance your web application security testing skills.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Bugcrowd
MarkDoom- How I Hacked Every Major IDE in 2 Weeks - Matt Austin, LevelUp 2017
0
rewiews
Explore web hacking techniques used to exploit major IDEs and desktop applications, revealing high-severity vulnerabilities in popular development tools.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
HackerOne
Burp Hacks for Bounty Hunters
0
rewiews
Discover personal Burp Suite techniques for effective bug bounty hunting, enhancing your web application security testing skills and increasing your chances of finding vulnerabilities.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Bugcrowd
Car Hacking Explained for Bug Hunters - Automotive Security Vulnerabilities and Methodologies
0
rewiews
Explore automotive security vulnerabilities, from IoT to CAN bus hacking. Learn methodologies, attack surfaces, and bug prioritization for car hacking, covering infotainment systems, APIs, and mobile apps.
Add to list
20
Lesons
37 minutes
On-Demand
Free-Video
NahamSec
Hacking, Content Creation, and API Security with TheXSSRat
0
rewiews
Insightful discussion on hacking, content creation, and API security with TheXSSRat. Covers career paths, learning strategies, and practical tips for aspiring cybersecurity professionals.
Add to list
28
Lesons
1 hour 15 minutes
On-Demand
Free-Video
Bugcrowd
Your Guide to Burp Suite - Setup and Usage in 30 Minutes
0
rewiews
Learn to set up and effectively use Burp Suite for web security testing in under 30 minutes, covering essential features and functionalities.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
NahamSec
Recon Sunday with Top HackerOne Paid Hackers - Dawgyg, Mayonaise, and cdl
0
rewiews
Live hacking event featuring top-paid hackers Dawgyg, Mayonaise, and cdl discussing reconnaissance techniques and strategies for bug bounty hunting on HackerOne's platform.
Add to list
1
Lesons
1 hour 9 minutes
On-Demand
Free-Video
NahamSec
SQL Injection Techniques - SQLMap and Hacker101's Photo Gallery CTF
0
rewiews
Explore SQL injection techniques using SQLMap and tackle Hacker101's "Photo Gallery" CTF challenge to enhance your ethical hacking skills and web security knowledge.
Add to list
1
Lesons
1 hour 57 minutes
On-Demand
Free-Video
NahamSec
Owning Cody's First Blog - RCE on Hacker101 and Hacking on FFH from BugBountyNotes.com - IDOR
0
rewiews
Explore IDOR and LFI/RCE vulnerabilities through hands-on hacking exercises on Hacker101 and BugBountyNotes.com platforms, enhancing your web security skills and bug bounty hunting techniques.
Add to list
1
Lesons
1 hour 44 minutes
On-Demand
Free-Video
NahamSec
What is Server-Side Request Forgery - SSRF?
0
rewiews
Explore Server-Side Request Forgery (SSRF): its definition, potential impacts, and importance in web security. Learn to identify and mitigate this critical vulnerability.
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
NahamSec
Live Recon on Snapchat - Demonstration of Amass, FFUF, and SecurityTrails
0
rewiews
Explore live reconnaissance techniques on Snapchat using tools like amass, FFUF, and SecurityTrails in this hands-on demonstration with @ITSecurityGuard.
Add to list
1
Lesons
1 hour 42 minutes
On-Demand
Free-Video
NahamSec
Bug Bounty Seminar with Verizon Media's Paranoids
0
rewiews
Explore bug bounty hunting with Verizon Media's Paranoids team. Learn strategies, techniques, and insights to enhance your cybersecurity skills and potentially earn rewards.
Add to list
1
Lesons
2 hours 3 minutes
On-Demand
Free-Video
NahamSec
Learning JavaScript for Hacking - Interview with Filedescriptor
0
rewiews
Explore JavaScript for hacking, reconless techniques, and Twitter vulnerabilities with expert insights on enhancing cybersecurity skills and ethical hacking practices.
Add to list
1
Lesons
1 hour 10 minutes
On-Demand
Free-Video
Cyber Mentor
Exploiting ChatGPT Code for Web Security Vulnerabilities
0
rewiews
Learn to exploit vulnerabilities in ChatGPT-generated code, including SQL injection and cross-site scripting. Practical demonstrations enhance cybersecurity skills for ethical hacking and penetration testing.
Add to list
9
Lesons
23 minutes
On-Demand
Free-Video
Cyber Mentor
Attacking JWT - Header Injection Techniques
0
rewiews
Learn techniques for attacking JSON Web Tokens through header injections, including algorithm and JWK header attacks. Gain practical insights into exploiting JWT vulnerabilities.
Add to list
6
Lesons
18 minutes
On-Demand
Free-Video
Cyber Mentor
Bypassing SQL Filters - SQL Injection Techniques
0
rewiews
Learn advanced SQL injection techniques to bypass filters and secure web applications. Practical examples and strategies for penetration testing and ethical hacking.
Add to list
9
Lesons
14 minutes
On-Demand
Free-Video
Cyber Mentor
API Information Disclosure - Real-World Bug Hunting
0
rewiews
Explore API information disclosure vulnerabilities and learn effective techniques for identifying and exploiting these security weaknesses in web applications.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
LASCON
Automating App Security Tests in Development with Docker
0
rewiews
Learn to automate application security testing using Docker. Explore tools like ZAProxy, nikto, and SQLmap for continuous attack simulation in the software development lifecycle, with live demonstrations.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
LASCON
Detecting and Controlling Rogue Third-Party Scripts in Web Applications
0
rewiews
Explore web supply chain attacks, their impact on sensitive data, and strategies to detect and prevent rogue third-party scripts from compromising web application security.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
LASCON
Open-Source OWASP Tools for Enhanced Penetration Testing Coverage - 2018
0
rewiews
Explore open-source OWASP tools for efficient white box testing. Learn about Code Pulse for real-time code coverage and Attack Surface Detector for comprehensive endpoint discovery, enhancing penetration testing effectiveness.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
LASCON
Vulnerability Management Best Practices and Common Pitfalls
0
rewiews
Optimize threat and vulnerability management with best practices for deployment, operations, reporting, and automation. Learn to align TVM with business needs and improve stakeholder communication.
Add to list
17
Lesons
52 minutes
On-Demand
Free-Video
LASCON
Pentesting for Developers - Common Vulnerabilities and Prevention Techniques
0
rewiews
Learn essential pentesting techniques for developers, covering common web vulnerabilities, prevention methods, and tools to secure your applications effectively.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
LASCON
Tangled Web: Defense in Deception - 2017
0
rewiews
Explore defensive deception strategies for web applications, including tools and techniques to detect, confuse, and corral attackers. Learn to plan, execute, and monitor effective deception in cybersecurity.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
LASCON
2019 OWASP Top 10 - Part 1
0
rewiews
Comprehensive exploration of the first half of OWASP Top 10, covering critical web application security risks and effective mitigation strategies for developers and security professionals.
Add to list
1
Lesons
2 hours 53 minutes
On-Demand
Free-Video
LASCON
OWASP Top 10 Training - Part 3
0
rewiews
Comprehensive exploration of OWASP Top 10 security vulnerabilities, focusing on prevention strategies and best practices for web application security.
Add to list
1
Lesons
1 hour 25 minutes
On-Demand
Free-Video
LASCON
OWASP Top 10 Training - Part 1
0
rewiews
Comprehensive overview of OWASP Top 10 security vulnerabilities, focusing on identification, prevention, and mitigation strategies for web application developers and security professionals.
Add to list
1
Lesons
1 hour 10 minutes
On-Demand
Free-Video
LASCON
OWASP Top 10 Security Risks - Part 5
0
rewiews
Explore the latest OWASP Top 10 security vulnerabilities, their impact, and effective mitigation strategies to enhance web application security and protect against common threats.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
Start with the BPT Then Worry About the APT - Lecture 1
0
rewiews
Explore essential cybersecurity strategies, from basic protection techniques to advanced memory analysis, covering various systems and devices for comprehensive digital defense.
Add to list
13
Lesons
38 minutes
On-Demand
Free-Video
Application Penetration Testing
0
rewiews
Learn application penetration testing techniques and methodologies to identify vulnerabilities and secure web applications effectively.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
Webshells - History, Techniques, and Obfuscation
0
rewiews
Explore webshell history, techniques, and obfuscation methods in this comprehensive talk by Adrian Crenshaw, covering essential cybersecurity concepts for IT professionals and security enthusiasts.
Add to list
1
Lesons
1 hour 4 minutes
On-Demand
Free-Video
Web Penetration Testing Workshop: Uploading a Web Shell via SQL Injection - Part 3
0
rewiews
Explore SQL injection techniques to upload web shells, enhancing your penetration testing skills in this hands-on workshop segment led by security expert Jeremy Druin.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Mirror Mirror - Reflected PDF Attacks Using SQL Injection
0
rewiews
Explore innovative techniques for exploiting SQL injection vulnerabilities to launch reflected PDF attacks, enhancing your understanding of web application security.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
Burp Suite: Informing the 99% of What the 1%ers Know - Lecture 1.2.4
0
rewiews
Explore advanced techniques and insights for using Burp Suite, a popular web application security testing tool, to enhance your penetration testing and vulnerability assessment skills.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
HTML5 Security Vulnerabilities and Attacks - Taking a Byte Out of HTML5
0
rewiews
Explore HTML5 security vulnerabilities and attacks, including client-side threats, browser support issues, and defensive strategies using the SHARK repository and testing environment.
Add to list
18
Lesons
50 minutes
On-Demand
Free-Video
OWASP Foundation
MarkDoom: How I Hacked Every Major IDE in 2 Weeks
0
rewiews
Explore how major IDEs were hacked through embedded browsers, revealing critical security vulnerabilities in desktop applications built with web technologies. Learn about the risks and safeguards in the "Desktop Web" era.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP Top 10 - Application Security Risks
0
rewiews
Explore the latest OWASP Top 10 web application security risks with expert Andrew van der Stock. Learn about critical vulnerabilities and effective mitigation strategies for safer software development.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
OWASP Foundation
Mobile-First Websites Security Evaluation - Attacker-Friendly or User-Friendly?
0
rewiews
Evaluate security vulnerabilities in mobile-first websites, exploring potential risks and attacker-friendly features. Learn to identify and mitigate threats in mobile web development.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
OWASP Foundation
AppSec Challenges - Overcoming Framework Limitations and Building Robust Security
0
rewiews
Exploring challenges in application security, analyzing framework limitations, and discussing robust approaches to improve security at scale while making it more manageable.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
OWASP Foundation
DNS Hijacking Using Cloud Providers: No Verification Needed - AppSec EU 2017
0
rewiews
Explore advanced domain hijacking techniques, including undisclosed methods, to understand vulnerabilities in DNS providers and cloud services. Learn to identify and mitigate risks beyond common subdomain takeover scenarios.
Add to list
16
Lesons
36 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP Zap - Introduction and Usage Guide
0
rewiews
Explore OWASP Zap's capabilities for web application security testing with David Scrobonia's comprehensive overview, highlighting key features and best practices for effective vulnerability detection.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
OWASP Foundation
Monitoring Application Attack Surface and Integrating Security into DevOps Pipelines
0
rewiews
Explore methods for calculating and tracking web application attack surface evolution, and learn to integrate security testing into CI/CD pipelines using metrics-based policies.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
OWASP Foundation
Popular Approaches to Preventing Code Injection Attacks are Dangerously Wrong
0
rewiews
Explores limitations of current code injection prevention methods and introduces Name Space Layout Randomization (NSLR) as a novel approach to secure Java applications against known and zero-day vulnerabilities.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
OWASP Foundation
Detecting CSRF Vulnerability Reliably - Programmatic Approach
0
rewiews
Explore a programmatic approach to reliably detect CSRF vulnerabilities in web applications, overcoming common shortcomings of existing tools and improving automated security testing.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
OWASP Foundation
Remediating XSS in GitHub Open Source Projects - Lessons Learned
0
rewiews
Insights on scaling XSS remediation across GitHub open source projects, focusing on risk reduction, adding security controls, and automating code modification for diverse applications.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
OWASP Foundation
Creating Accessible Security Testing with ZAP - AppSecCali 2019 Lightning Talk
0
rewiews
Introducing OWASP ZAP's Heads Up Display: A new UI that makes security testing more intuitive for developers and professionals, enabling efficient use of the attack proxy tool.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
OWASP Foundation
Open-Source OWASP Tools for Enhancing Penetration Testing Coverage
0
rewiews
Explore open-source OWASP tools for efficient white box penetration testing. Learn about Code Pulse for real-time code coverage and Attack Surface Detector for comprehensive endpoint discovery to enhance security assessments.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
OWASP Foundation
Monitoring Attack Surface and Integrating Security into DevOps Pipelines
0
rewiews
Explore methods for calculating and tracking web application attack surface, and learn to integrate security testing into CI/CD pipelines for effective DevOps practices.
Add to list
17
Lesons
27 minutes
On-Demand
Free-Video
OWASP Foundation
HTTPS Security Headers: HSTS, TLS, HPKP, and CSP Implementation - APPSEC CA 2017
0
rewiews
Comprehensive guide to implementing HTTPS using HSTS, TLS, HPKP, and CSP. Learn best practices for secure web communication from Salesforce security experts.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
OWASP Foundation
DASTProxy: Automated Security Testing Focused on Business Context
0
rewiews
Explore DASTProxy: a tool for automated security testing that focuses on business context rather than crawling, enhancing efficiency and effectiveness in application security assessments.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
OWASP Foundation
Monitoring Application Attack Surface to Integrate Security into DevOps Pipelines
0
rewiews
Explore integrating security into DevOps pipelines through application attack surface monitoring. Learn strategies from a recognized expert to enhance your organization's software security practices.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
OWASP Foundation
Application Security California 2017 - Keynote Address
0
rewiews
Explore cutting-edge application security insights and strategies with industry expert Chenxi Wang in this OWASP Foundation presentation from AppSec California 2017.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
OWASP Foundation
Rhyming with Hacks - The Ballad of Supply Chain Attacks
0
rewiews
Explore supply chain attacks, their anatomy, and prevention strategies. Learn about real-life examples, existing solutions, and a new DOM monitoring approach with live demonstration.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
OWASP Foundation
How to Break APIs - Security Testing Techniques
0
rewiews
Comprehensive guide to identifying and exploiting vulnerabilities in APIs, focusing on practical techniques for security testing and penetration.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP Top 10 - The Making of the OWASP Top 10 and Beyond
0
rewiews
Explore the creation process and principles behind the OWASP Top 10, a crucial resource for web application security, including data analysis, likelihood management, and scoring methodologies.
Add to list
9
Lesons
26 minutes
On-Demand
Free-Video
OWASP Foundation
Stop the Looters: Method to Detect Digital Skimming Attacks
0
rewiews
Discover a method to detect and prevent digital skimming attacks on websites, protecting sensitive customer data from theft by malicious actors like Magecart.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP Top 10 Privacy Risks 2021 - Understanding and Mitigating Web Application Privacy Threats
0
rewiews
Explore OWASP's updated Top 10 Privacy Risks for web applications, covering vulnerabilities, consent issues, and data quality. Learn countermeasures to build a more private digital future.
Add to list
11
Lesons
23 minutes
On-Demand
Free-Video
OWASP Foundation
Good Bot, Bad Bot: Characterizing Automated Browsing Activity
0
rewiews
Explore Aristeus, a system for deploying honeysites to study malicious bot behavior. Learn about bot traffic patterns, attack strategies, and the importance of understanding automated browsing activity for web security.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
OWASP Foundation
Hacking and Defending APIs - Red and Blue Make Purple
0
rewiews
Learn techniques for both attacking and defending APIs, combining offensive and defensive security perspectives to enhance overall API protection.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
OWASP Foundation
Trusted Types: A World Without XSS
0
rewiews
Explore cutting-edge web security with Trusted Types, a powerful defense against XSS attacks. Learn implementation strategies and best practices from industry experts.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
OWASP Foundation
Landmines in the API Landscape
0
rewiews
Explore potential security vulnerabilities in API development and learn strategies to mitigate risks in this insightful talk by a cybersecurity expert.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
load more...