Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Security Testing
Showing:
259
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Dynatrace
Unguard: An Open Source Application Security Playground
0
rewiews
Explore Unguard, an open-source Twitter clone with deliberate vulnerabilities. Learn how Dynatrace detects web application exploits using this security playground for testing and demonstration.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Metasploit
0
rewiews
Learn Metasploit for ethical hacking: modules, exploits, payloads, information gathering, web server hacking, privilege escalation, and more. Hands-on tutorials for beginners to advanced users.
Add to list
12
Lesons
2 hours 30 minutes
On-Demand
Free-Video
SecurityTube Metasploit Framework Expert Community Edition
0
rewiews
Comprehensive training on Metasploit Framework, covering advanced techniques and strategies for penetration testing and ethical hacking. Gain expertise in this powerful cybersecurity tool.
Add to list
24
Lesons
6 hours
On-Demand
Free-Video
Burp Suite - Basic Concepts for Web Pentesting
0
rewiews
Learn essential web pentesting techniques using Burp Suite, covering parameter passing, code injection, XSS, LFI/RFI attacks, and SQL injection for effective security testing of web applications.
Add to list
9
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Ekoparty Security Conference
OWASP SAMM Approach: Creating Secure Applications from Scratch
0
rewiews
Explora el Modelo de Madurez de Seguridad de Aplicaciones de OWASP (SAMM), una metodología para crear aplicaciones seguras desde la planificación hasta el mantenimiento continuo.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
IEEE
Heapster- Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images
0
rewiews
Explore Heapster's innovative approach to analyzing dynamic allocators in monolithic firmware, enhancing security through advanced identification and evaluation techniques.
Add to list
12
Lesons
19 minutes
On-Demand
Free-Video
HackerOne
Bug Bounty Field Manual - Cliff Notes for Planning and Operating Successful Programs
0
rewiews
Comprehensive guide on planning, launching, and operating successful bug bounty programs, covering team formation, scope setting, bounty structures, and program management strategies.
Add to list
20
Lesons
41 minutes
On-Demand
Free-Video
Bugcrowd
Demystifying Program Management in Crowdsourced Security
0
rewiews
Explore expert program management in crowdsourced security testing, focusing on bug bounties and vulnerability disclosure. Learn key strategies for successful implementation and management.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
Bugcrowd
What is Access Control and How Can You Break It?
0
rewiews
Explore types of access control and techniques to exploit vulnerabilities, enhancing your understanding of cybersecurity and potential system weaknesses.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
NahamSec
Live Hacking Events - What They Are and How They Work
0
rewiews
Explore Live Hacking Events with HackerOne's Community Team. Learn about these unique cybersecurity gatherings, their benefits, and how to participate in this exciting hacking format.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
NahamSec
What Should You Do After Recon?
0
rewiews
Strategies for effective bug hunting after reconnaissance: prioritizing targets, analyzing attack surfaces, and tailoring your approach for maximum impact in bug bounty programs.
Add to list
1
Lesons
15 minutes
On-Demand
Free-Video
LASCON
Pentesting for Developers - Common Vulnerabilities and Prevention Techniques
0
rewiews
Learn essential pentesting techniques for developers, covering common web vulnerabilities, prevention methods, and tools to secure your applications effectively.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Why Has Your Toaster Been through More Security Testing than AI Systems
0
rewiews
Exploring the lack of standardized security testing for AI systems in critical sectors, contrasting with rigorous certifications for everyday appliances and traditional software.
Add to list
8
Lesons
19 minutes
On-Demand
Free-Video
LASCON
Running FaaS with Scissors - DevSecOps and Serverless Security Testing - 2019
0
rewiews
Explore DevSecOps and FaaS technologies to enhance secure code creation, utilizing OpenFaaS for faster, more consistent security assessments and continuous testing with quick feedback loops.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
Bugcrowd
Information Disclosure
0
rewiews
Explore various techniques for identifying information disclosure vulnerabilities, a diverse and intriguing category of security bugs with wide-ranging technical complexity.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
Bridging the Air Gap: Cross-Domain Solutions - PG08
0
rewiews
Explore cross-domain solutions for secure data transfer between networks, including examples, security testing, and future developments in bridging air-gapped systems.
Add to list
13
Lesons
27 minutes
On-Demand
Free-Video
Threat Models for Exercising SIEM and Incident Response
0
rewiews
Explore effective threat modeling techniques to enhance SIEM and incident response capabilities, improving overall cybersecurity preparedness and resilience.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Terminal Cornucopia: Demystifying The Mullet - Lecture 4
0
rewiews
Explore innovative security vulnerabilities in airport terminals and learn about unconventional weapon creation using everyday items, as demonstrated by security researcher Evan Booth.
Add to list
1
Lesons
1 hour 12 minutes
On-Demand
Free-Video
Hackers vs Auditors: Cybersecurity Perspectives
0
rewiews
Explore the dynamic between hackers and auditors, examining their roles, motivations, and interactions in the cybersecurity landscape.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
Target-Specific Automated Dictionary Generation - BSidesLV 2014
0
rewiews
Generate targeted password dictionaries using automated techniques for more effective penetration testing and security assessments.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
Succeeding with Enterprise Software Security Key Performance Indicators
0
rewiews
Learn to implement and measure effective enterprise software security KPIs. Discover strategies for aligning security goals with organizational objectives and improving development processes.
Add to list
16
Lesons
58 minutes
On-Demand
Free-Video
Kicking Ass With Nmap
0
rewiews
Comprehensive Nmap training covering advanced scanning techniques, network exploration, and security auditing. Learn from industry experts to enhance your cybersecurity skills.
Add to list
1
Lesons
1 hour 24 minutes
On-Demand
Free-Video
Kali Linux Live Boot USB Flash Drive Creation - Workshop
0
rewiews
Learn to create a Kali Linux live boot USB flash drive with persistence, covering setup, partitioning, file systems, and troubleshooting for enhanced penetration testing capabilities.
Add to list
14
Lesons
1 hour
On-Demand
Free-Video
Building a Blackthrow with Raspberry Pi - Part 3
0
rewiews
Learn to build a Blackthrow device using Raspberry Pi for penetration testing and network security. Explore hardware setup, software configuration, and practical applications.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
Testing Enterprise DLP Systems - Advanced Data Exfiltration Techniques
0
rewiews
Explore advanced data exfiltration techniques and learn how to test enterprise DLP systems effectively, enhancing your cybersecurity skills and knowledge.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
Burp Suite: Informing the 99% of What the 1%ers Know - Lecture 1.2.4
0
rewiews
Explore advanced techniques and insights for using Burp Suite, a popular web application security testing tool, to enhance your penetration testing and vulnerability assessment skills.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
OWASP Foundation
Privacy Violations, Fines, and Economic Sanctions - Creating Darker Opportunities in Cybercrime
0
rewiews
Explore privacy violations, fines, and economic sanctions in cybersecurity. Learn about EU GDPR implications, cyber crime opportunities, and how sanctioned countries exploit digital vulnerabilities for funding.
Add to list
23
Lesons
41 minutes
On-Demand
Free-Video
OWASP Foundation
Building an AppSec Program with a Budget of $0 - Beyond the OWASP Top 10
0
rewiews
Explore OWASP projects to build a comprehensive AppSec program without spending money. Learn how to implement open-source tools for training, development, testing, and defense to create a robust security framework.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP Zap - Introduction and Usage Guide
0
rewiews
Explore OWASP Zap's capabilities for web application security testing with David Scrobonia's comprehensive overview, highlighting key features and best practices for effective vulnerability detection.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
OWASP Foundation
Threat Model-as-Code: Integrating Security into the Software Development Lifecycle
0
rewiews
Integrating threat modeling into software development lifecycle using "Automaton" framework, enabling actionable outputs and automated security testing for improved product security.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
OWASP Foundation
Monitoring Application Attack Surface and Integrating Security into DevOps Pipelines
0
rewiews
Explore methods for calculating and tracking web application attack surface evolution, and learn to integrate security testing into CI/CD pipelines using metrics-based policies.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
OWASP Foundation
Creating Accessible Security Testing with ZAP - AppSecCali 2019 Lightning Talk
0
rewiews
Introducing OWASP ZAP's Heads Up Display: A new UI that makes security testing more intuitive for developers and professionals, enabling efficient use of the attack proxy tool.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
OWASP Foundation
Monitoring Attack Surface and Integrating Security into DevOps Pipelines
0
rewiews
Explore methods for calculating and tracking web application attack surface, and learn to integrate security testing into CI/CD pipelines for effective DevOps practices.
Add to list
17
Lesons
27 minutes
On-Demand
Free-Video
OWASP Foundation
Security and the Self-Contained Unit of Software - AppSec EU 2017
0
rewiews
Exploring security challenges in modern software development, focusing on self-contained components and shifting security features from infrastructure to application level.
Add to list
8
Lesons
25 minutes
On-Demand
Free-Video
OWASP Foundation
Embedding GDPR Into the Secure Development Lifecycle
0
rewiews
Practical guide to integrating GDPR requirements into software development lifecycle, covering privacy awareness, risk analysis, secure coding, and breach notification processes.
Add to list
27
Lesons
44 minutes
On-Demand
Free-Video
OWASP Foundation
InfoSec at Peak Prevention
0
rewiews
Explore InfoSec at Peak Prevention with Daniel Miessler, an experienced security tester and consultant. Learn about cutting-edge strategies in application security and IoT security from an industry expert.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
OWASP Foundation
Bypassing Browser Policies and Privacy Extensions for Cookies
0
rewiews
Explore bypasses to browser policies and extensions for cookie security. Learn about an automated framework for evaluating countermeasures against cross-site attacks and third-party tracking.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
OWASP Foundation
Software Security 5D Framework - Evolution of Security Verification
0
rewiews
Explore the OWASP Software Security 5D Framework and its impact on integrating security bugs into the software lifecycle, revolutionizing traditional assessment methods.
Add to list
27
Lesons
31 minutes
On-Demand
Free-Video
OWASP Foundation
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security
0
rewiews
Explore threat modeling for CI/CD pipelines to enhance software supply chain security, covering key vulnerabilities, data flow analysis, and mitigation strategies.
Add to list
23
Lesons
28 minutes
On-Demand
Free-Video
OWASP Foundation
Security Chaos Engineering - Turning the Tide in the War on Uncertainty in Cyber Security
0
rewiews
Explore security chaos engineering to proactively discover system weaknesses, increase confidence in security mechanisms, and move from subjective assessment to objective measurement through continuous experimentation.
Add to list
21
Lesons
23 minutes
On-Demand
Free-Video
OWASP Foundation
Topics of Interest: Developers Struggle with Application Security and How to Make It Better
0
rewiews
Explore challenges in application security for developers and learn strategies to improve DevSecOps practices, drawing from real-world experiences at major tech companies.
Add to list
18
Lesons
27 minutes
On-Demand
Free-Video
OWASP Foundation
Shifting Security Everywhere
0
rewiews
Explore strategies for integrating security throughout the software development lifecycle, emphasizing proactive measures and collaboration between development and security teams.
Add to list
1
Lesons
1 hour 4 minutes
On-Demand
Free-Video
OWASP Foundation
Shift Left Security with the Security Test Pyramid
0
rewiews
Explore the concept of shifting security testing left in the development process using the Security Test Pyramid, enhancing software security from the early stages.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP Application Security Verification Standard (ASVS) Project Overview
0
rewiews
Explore the OWASP Application Security Verification Standard (ASVS) project, its importance in secure software development, and practical implementation strategies.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
OWASP Foundation
Bringing Security Testing to Development: Enabling Developers as Security Experts
0
rewiews
Discover strategies for integrating security testing into development processes, empowering developers to become security experts and enhance application safety.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
OWASP Foundation
Running a Bug Bounty Program - What You Need to Know
0
rewiews
Discover essential insights for running successful bug bounty programs, including strategies, resources, and best practices for effective vulnerability management and rewards.
Add to list
25
Lesons
46 minutes
On-Demand
Free-Video
OWASP Foundation
Serverless Security for DevOps and Defenders
0
rewiews
Explore serverless architecture's impact on DevOps and security with James Wickett. Learn how this emerging technology enhances defense strategies and streamlines development processes.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
OWASP Foundation
Building a Better Hacker to Improve Cybersecurity Defense
0
rewiews
Explore how understanding hacker mentality bridges the gap between developers and security teams, leading to more effective cybersecurity strategies and proactive threat prevention.
Add to list
1
Lesons
56 minutes
On-Demand
Free-Video
OWASP Foundation
Why Your AppSec Experts Are Killing You - Evolving to Continuous Application Security
0
rewiews
Explore how to evolve into a "Continuous Application Security" organization using instrumentation-based testing, real-time feedback loops, and innovative tools for improved DevOps integration and portfolio-wide assurance.
Add to list
28
Lesons
59 minutes
On-Demand
Free-Video
OWASP Foundation
Security Testing Windows Store Apps
0
rewiews
Explore security testing for Windows Store Apps, focusing on HTML/JavaScript development, architecture, and potential vulnerabilities in this emerging application model.
Add to list
32
Lesons
47 minutes
On-Demand
Free-Video
OWASP Foundation
Building Secure Containers for Mobile Devices
0
rewiews
Explore secure container solutions for BYOD environments, covering application wrapping, design challenges, iOS runtime analysis, and implementation best practices for mobile data protection.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
OWASP Foundation
NIST Missions and Impacts on US Industry, Economy, and Citizens - Lecture
0
rewiews
Explore NIST's mission, impact on US industry, and cybersecurity initiatives. Learn about current programs, projects, and R&D activities in this premier scientific institution.
Add to list
25
Lesons
40 minutes
On-Demand
Free-Video
Linux Foundation
Shifting Application Security Left: Practical Steps to Get There
0
rewiews
Explore practical steps to integrate automated security testing into software delivery pipelines, enabling efficient and secure development practices for modern engineering teams.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
Cooper
Find and Fix Software Security Problems - Preventing Security Mistakes
0
rewiews
Explore effective strategies for identifying, fixing, and preventing software security issues. Learn how to prioritize and address vulnerabilities to enhance overall system security.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
media.ccc.de
Ethical Hacking: Good Intentions and Questionable Outcomes
0
rewiews
Explore ethical boundaries in security testing, from fuzzing servers to buying dark web credentials. Discuss grey areas and the need for beneficial practices that maintain moral high ground.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Designing Your Own Electronic Attack Device
0
rewiews
Learn to design and create custom electronic attack devices, from circuit boards to complete Linux systems, for personalized and efficient security testing and penetration tasks.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
OWASP Foundation
Empowering the Guardians of Your Code Kingdom
0
rewiews
Explore strategies for empowering developers to become guardians of code security, enhancing application protection and fostering a security-first mindset in software development.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
NahamSec
AI Powered Wordlist - How to Bug Bounty
0
rewiews
Learn to create custom wordlists using AI for effective bug bounty hunting. Enhance your cybersecurity skills with this innovative approach to ethical hacking and web application testing.
Add to list
1
Lesons
12 minutes
On-Demand
Free-Video
HackerSploit
Bypassing UAC with UACMe - HEK.SI 2022 Conference Presentation
0
rewiews
Comprehensive guide to bypassing User Account Control on Windows 10 for privilege escalation, presented at HEK.SI 2022. Covers techniques using UACMe tool to elevate privileges and enhance system access.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
NashKnolX
Securing Web Applications: Integrating OWASP with Burp Suite
0
rewiews
Integrate OWASP tools with Burp Suite to identify vulnerabilities, conduct security assessments, and implement effective mitigation strategies for web applications.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP IoT Security Testing Guide (ISTG)
0
rewiews
Comprehensive guide for IoT security testing, covering methodologies and best practices to identify vulnerabilities and enhance device protection in the interconnected world.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
Conf42
Securing the Software Factory
0
rewiews
Explore strategies for securing the software development lifecycle, from code to deployment, enhancing overall application security and resilience.
Add to list
2
Lesons
19 minutes
On-Demand
Free-Video
Conf42
Why Put Security in DevOps - and How
0
rewiews
Explore integrating security into DevOps practices, understanding its importance and implementation strategies for enhanced software development.
Add to list
2
Lesons
20 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP DefectDojo - Introduction and Overview
0
rewiews
Learn about DefectDojo, an open-source application vulnerability management tool. Discover its features for streamlining security testing workflows and enhancing vulnerability tracking and remediation processes.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
OWASP Foundation
Automating Security Test Cases Based on ASVS
0
rewiews
Learn to automate security test cases using ASVS, enhancing your application's vulnerability assessment and overall security posture.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
NashKnolX
DevSecOps: Dynamic Application Security Testing for Identifying Vulnerabilities
0
rewiews
Explore security practices in DevSecOps and learn DAST testing to identify vulnerabilities in deployed applications.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
DevSecCon
7 Must-Know Steps to Making Modern Web Apps Ultra-Secure
0
rewiews
Learn 7 essential steps to enhance web app security. Master prevention of vulnerabilities, implement secure authorization, add security layers, logging, and testing for robust protection.
Add to list
10
Lesons
23 minutes
On-Demand
Free-Video
DevSecCon
AI for DevSecOps Engineers - Enhancing Security Culture and Education
0
rewiews
Explore AI technologies to enhance security testing, analysis, and education for DevSecOps engineers. Learn to automate processes, identify threats, and improve software quality in CI/CD environments.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
DevSecCon
DevSecOps Unveiled: Integrating Security in the Development Lifecycle
0
rewiews
Explore DevSecOps principles and practices for seamlessly integrating security into the development lifecycle. Learn to foster collaboration, automation, and shared responsibility for proactive vulnerability management.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
DevSecCon
Building Your First DevSecOps Pipeline
0
rewiews
Demystify DevSecOps and build a functional pipeline with cutting-edge security testing, including SCA, SAST, and DAST tooling. Supercharge software security and achieve true "Shift Left" success.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
DevSecCon
Securing Applications in the Software Development Life Cycle (SDLC) - Beginner
0
rewiews
Aprenda prácticas de codificación segura para mitigar riesgos de seguridad y proteger datos en el desarrollo de software moderno.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
DevSecCon
Defense in Depth: Refocusing on Defensive Security Techniques
0
rewiews
Explore defensive product security techniques, emphasizing defense-in-depth and supply chain security. Learn key aspects to consider in your application security strategy.
Add to list
9
Lesons
19 minutes
On-Demand
Free-Video
ChariotSolutions
QA for AI: Testing Machine Learning Applications - The Reality of Developing an Artificial World
0
rewiews
Explore challenges and strategies for testing AI applications, focusing on machine learning algorithms, ethical considerations, and ensuring quality in diverse, innovative technologies.
Add to list
19
Lesons
54 minutes
On-Demand
Free-Video
DEFCONConference
Speed Bumps and Speed Hacks - Adventures in Car Manufacturing Security
0
rewiews
Dive into critical security vulnerabilities affecting major car manufacturers' web applications, exploring real-world attacks, impact chains, and the importance of responsible disclosure policies.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
DEFCONConference
LLMs at the Forefront - Pioneering the Future of Fuzz Testing
0
rewiews
Explore how Large Language Models revolutionize fuzz testing in cybersecurity, featuring FuzzForest tool demonstrations and practical applications for automated security assessments.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
Symfony Security - Authentication, Register Users, Passwords, Access Control
0
rewiews
Comprehensive guide to Symfony security: authentication, user registration, password management, access control, and advanced features like voters and testing authorization.
Add to list
8
Lesons
1 hour 44 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Test Driven Security in Continuous Integration
0
rewiews
Discover how Mozilla integrates Test Driven Security into DevOps pipelines, accelerating security issue detection and mitigation while maintaining rapid innovation for Firefox services.
Add to list
8
Lesons
20 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Getting More Confident with Security Helper Libraries Using Go Fuzzing
0
rewiews
Explore Go Fuzzing to enhance security helper libraries, detect vulnerabilities, and improve test coverage. Learn from real-world examples and gain confidence in your code's robustness.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
OWASP Foundation
Project Monterey: Automating Security Testing in Cloud Deployments
0
rewiews
Explore automated security testing for cloud deployments with Project Monterey. Learn how Netflix scales traditional tools and integrates custom solutions for continuous security in a dynamic environment.
Add to list
14
Lesons
49 minutes
On-Demand
Free-Video
OWASP Foundation
Continuous Cloud Security Automation
0
rewiews
Distributed framework for scalable security automation in cloud environments. Easily integrates tools, minimizes false positives, and supports continuous software delivery across teams.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
OWASP Foundation
Headless Browser Hide and Seek - Offensive Uses and Countermeasures
0
rewiews
Explore offensive and defensive uses of headless browsers in web security. Learn techniques for detecting malicious activity, collecting threat forensics, and securing your own tools against potential vulnerabilities.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
OWASP Foundation
ZAP Heads Up Display - Introduction and Demo
0
rewiews
Explore OWASP ZAP's new Heads Up Display feature for automated web application security testing. Learn about its capabilities, demo, hidden fields, attack modes, and integration with browser APIs.
Add to list
10
Lesons
29 minutes
On-Demand
Free-Video
OWASP Foundation
Leveraging the ASVS in the Secure Software Development Lifecycle
0
rewiews
Integrating OWASP ASVS into the secure software development lifecycle to create uniform security requirements, prioritize tasks, and track adherence across applications using existing tools and processes.
Add to list
17
Lesons
38 minutes
On-Demand
Free-Video
OWASP Foundation
How Scripting in ZAP Can Bridge the Gap Between Dev Teams and Security
0
rewiews
Learn to bridge dev and security teams using ZAP scripting. Explore opportunities, overcome obstacles, and implement effective testing strategies for enhanced application security.
Add to list
30
Lesons
41 minutes
On-Demand
Free-Video
OWASP Foundation
Testing iOS Apps without Jailbreak - Penetration Testing Techniques
0
rewiews
Learn techniques for penetration testing iOS apps without jailbreaking, including live demos on accessing protected resources on the latest iOS version. Ideal for pentesters facing jailbreak limitations.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
OWASP Foundation
Turning Engineers into Extended Blue Team Members - Security Strategies
0
rewiews
Strategies for empowering engineers to become part of the security team, including threat modeling, incident-driven learning, and security testing integration into development processes.
Add to list
12
Lesons
28 minutes
On-Demand
Free-Video
OWASP Foundation
SUSTO: Systematic Universal Security Testing Orchestration
0
rewiews
Explore systematic universal security testing orchestration for efficient vulnerability detection and management in software development lifecycles.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
OWASP Foundation
Real World Static Analysis for Real Humans
0
rewiews
Explore practical static analysis techniques for software security, focusing on real-world applications and human-centric approaches to code analysis.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP ZAP: Introduction to Web Application Security Testing
0
rewiews
Explore OWASP ZAP's latest features, including automation, reporting, and out-of-band testing. Learn how this open-source tool enhances web application security through practical demonstrations and updates.
Add to list
12
Lesons
27 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP Web Security Testing Guide
0
rewiews
Comprehensive guide for web security testing, covering methodologies and best practices to identify vulnerabilities and enhance application security.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
OWASP Foundation
Attacking Microservice Systems: Methods and Practical Tips
0
rewiews
Discover methods and practical tips for attacking microservice systems, exploring new security architecture patterns and vulnerabilities specific to this increasingly popular design approach.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
OWASP Foundation
Testability Patterns for Web Applications - A New OWASP Project
0
rewiews
Explore testability patterns for web applications in this OWASP project presentation, focusing on enhancing security testing effectiveness and efficiency.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
OWASP Foundation
Mobile Application Security Testing - Journey to Version 2.0
0
rewiews
Explore the evolution of mobile app security standards and best practices in this insightful talk on the journey to OWASP Mobile Security Testing Guide v2.0.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
OWASP Foundation
Mobile Wanderlust - Our Journey to Version 2.0
0
rewiews
Explore the evolution of mobile security testing with insights on OWASP's latest advancements and best practices for protecting mobile applications.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
Security Testing for Smart Metering Infrastructure - BSidesLV 2014
0
rewiews
Explore security testing for smart metering infrastructure, covering AMI hacks, test scopes, standards, and strategies for effective implementation and risk mitigation.
Add to list
15
Lesons
47 minutes
On-Demand
Free-Video
BSidesLV
Fuzzing Frontiers - Exploring Unknown Vulnerabilities with Nuclei v3.2
0
rewiews
Explore Nuclei v3.2's advanced fuzzing capabilities for uncovering unknown vulnerabilities. Learn to craft custom templates and import HTTP traffic, enhancing your security testing workflow and threat mitigation strategies.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
media.ccc.de
Don't Panic: Common Blockchain Bugs and How to Find Them
0
rewiews
Explore common blockchain bugs, their impact, and testing techniques. Learn about a new fuzzer for Substrate-based chains and see live demonstrations of typical vulnerabilities.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
USENIX Enigma Conference
What Public Interest AI Auditors Can Learn from Security Testing - Legislative and Practical Wins
0
rewiews
Exploring legal and practical strategies for AI auditors to overcome barriers in testing algorithmic bias, drawing lessons from security testing practices and advocating for policy changes.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
From Security Testing to Deployment in a Single Pull Request
0
rewiews
Automating cloud native app development with integrated security testing, from building and scanning to packaging and deployment, all within a single pull request for consistency and efficiency.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP IoT Top 10 - Understanding Security Issues in Internet of Things
0
rewiews
Explore key security vulnerabilities in IoT technologies and learn strategies to build, deploy, and assess IoT systems more securely with insights from the OWASP Internet of Things Project.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
load more...