ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

113 results

NetGuardians
🔥Day 78 - Secure Coding Principles Explained | Building Secure Login Systems from Scratch

Welcome to Day 78 of the NetGuardians Certified Basic of Cyber Security. 6 Month journey to become confident in Cybersecurity!

9:14
🔥Day 78 - Secure Coding Principles Explained | Building Secure Login Systems from Scratch

4 views

3 days ago

Jared Harris
MP4   AppSec in 2026 Security at Machine Speed — or Not at All

In a world where AI writes, tests, and fixes code — and criminals use AI to break it — what exactly is the mission of AppSec?

56:28
MP4 AppSec in 2026 Security at Machine Speed — or Not at All

6 views

4 days ago

QuickTechie Official
Module 9: GH-300 Mastery – Implementing Custom Copilot Instructions | GH-300 Certification

Welcome to Module 9 of the GitHub Copilot GH-300 Certification Training Course, where you'll learn how to implement and ...

14:42
Module 9: GH-300 Mastery – Implementing Custom Copilot Instructions | GH-300 Certification

0 views

1 hour ago

Salesforce Trailhead Answers
AgentExchange Security Review | Devise Your Security Strategy

In this video, I complete the lesson “Devise Your Security Strategy” from the “AgentExchange Security Review” module.

6:11
AgentExchange Security Review | Devise Your Security Strategy

1 view

3 days ago

SP Learning Labs
Python Security Fundamentals Explained | Vulnerabilities, Auth, Crypto & Safe Coding

Python Security Fundamentals Explained | Vulnerabilities, Auth, Crypto & Safe Coding Security is not something you add at the ...

7:44
Python Security Fundamentals Explained | Vulnerabilities, Auth, Crypto & Safe Coding

18 views

4 days ago

DTF Cyber Podcast
Token Bloat is the New AI Waste Problem | #DTF044

Are you caught between a bedrock and a hard place with your organization's cloud budget? In Episode 44 of the DTF Cyber ...

59:37
Token Bloat is the New AI Waste Problem | #DTF044

133 views

3 days ago

NIDevConf
Application Security in the Age of Vibe Coding - Ciaran Conliffe - Hall 1B - NIDC 2025

Like it or not, the way software is being created is changing. Some developers are using AI assistants to help build their code, ...

31:00
Application Security in the Age of Vibe Coding - Ciaran Conliffe - Hall 1B - NIDC 2025

11 views

6 days ago

WalkingCat
PDC 2005 - Security Symposium, Part 1 - Steve Lipner, Michael Howard - 2005/09

Event: Professional Developers Conference 2005 Title: Security Symposium, Part 1 Speakers: Steve Lipner, Michael Howard ...

1:33:20
PDC 2005 - Security Symposium, Part 1 - Steve Lipner, Michael Howard - 2005/09

14 views

6 days ago

Cycubix LTD
LLM01: Prompt Injection Explained — OWASP Top 10 for LLMs | AI Security Course

What happens when a hacker tricks an AI into ignoring its own rules? That's Prompt Injection — and it's the #1 risk in the OWASP ...

7:01
LLM01: Prompt Injection Explained — OWASP Top 10 for LLMs | AI Security Course

52 views

7 days ago

QuickTechie Official
Module 5: Validate & Operate AI Tools – The Need to Validate AI Output | GH-300 Certification

Welcome to Module 5 of the GitHub Copilot GH-300 Certification Training Course, where you'll learn why validating AI-generated ...

14:26
Module 5: Validate & Operate AI Tools – The Need to Validate AI Output | GH-300 Certification

0 views

2 hours ago

Symbiotic Security
Secure Vibe Coding: Winning Prompts, Hidden Risks & MCP Supply Chain Attacks

Vibe coding is fast. It's also shipping insecure code by default. At Clash of Prompts SF, Salah-Eddine Alabouch (Symbiotic ...

32:14
Secure Vibe Coding: Winning Prompts, Hidden Risks & MCP Supply Chain Attacks

31 views

3 days ago

RedMonk
Tanya Janca on AI Slop, Vibe Coding, & the Future of AppSec

Kate Holterhoff sits down with Tanya Janca, Secure Coding and AI Trainer at SheHacksPurple, to talk about what AI is doing to ...

56:33
Tanya Janca on AI Slop, Vibe Coding, & the Future of AppSec

35 views

2 days ago

Rapid7
Hacktics and Telemetry, E6: Cisco SD-WAN Zero-Days, Mythos AI Evaluations, and Pwn2Own Drama

Welcome to episode six of Hacktics and Telemetry, a Rapid7 produced podcast! Hosted by Douglas McKee (@fulmetalpackets) ...

54:51
Hacktics and Telemetry, E6: Cisco SD-WAN Zero-Days, Mythos AI Evaluations, and Pwn2Own Drama

220 views

1 day ago

Leadership By Design
What Every Business Leader Needs to Know About Cybersecurity Risk, & Building High-Performing Teams

The episode weaves two threads together throughout: technical mastery and human leadership. The conversation covers team ...

27:06
What Every Business Leader Needs to Know About Cybersecurity Risk, & Building High-Performing Teams

3 views

5 days ago

Breaking Into Cybersecurity
AI Security & Vibe Coding | Shan Kulkarni | BIC

Learn the intersection of AI security and vibe coding with industry expert Shan Kulkarni.\n\n- Discover emerging risks in AI-driven ...

0:25
AI Security & Vibe Coding | Shan Kulkarni | BIC

1 view

4 days ago

Cloud9 Learning
THE AI SECURITY NIGHTMARE

Artificial intelligence is no longer just helping defenders. It's now actively being used in real-world cyberattacks. In this video, I ...

6:21
THE AI SECURITY NIGHTMARE

8 views

7 days ago

Sonar
Sonar Malicious Package Detection | Block Supply Chain Attacks

Open-source dependencies have revolutionized modern software development, but they have also introduced critical supply ...

3:12
Sonar Malicious Package Detection | Block Supply Chain Attacks

10 views

3 days ago

Xebia
How to Secure the SDLC with GitHub Advanced Security

How can development teams secure modern software delivery without slowing innovation? As software development accelerates ...

1:05:52
How to Secure the SDLC with GitHub Advanced Security

23 views

2 days ago

QuickTechie Official
Module 14: GitHub Copilot in the IDE – Managing Content Exclusions | GH-300 Certification

Welcome to Module 14 of the GitHub Copilot GH-300 Certification Training Course, where you'll learn how to configure and ...

14:30
Module 14: GitHub Copilot in the IDE – Managing Content Exclusions | GH-300 Certification

3 views

1 hour ago

KryptoMindz Technologies
Secure SDLC for AI: Design, Test & Operate Safer Apps | Module 2.1

AI applications change the secure development lifecycle because risk is no longer limited to code, infrastructure, and data.

7:38
Secure SDLC for AI: Design, Test & Operate Safer Apps | Module 2.1

2 views

5 days ago