35:55 DevSecOps with OWASP DevSlop NANCY GARICHÉ & TANYA JANCA OWASP Foundation 1.2K views - 6 years ago
1:16:38 Finding Security Vulnerabilities through Code Review - The OWASP way OWASP DevSlop 22.8K views - 5 years ago
1:46:16 Secure-er Code Reviews with Seth & Ken! - OWASP DevSlop OWASP DevSlop 3.4K views - 5 years ago
5:34 Don’t Study CYBERSECURITY – Just F**king Hack and Make Money! HackersArsenal 334.1K views - 9 months ago
2:13:35 GRC Analyst Masterclass : Build Policies, Manage Risks, and Ensure Compliance Prabh Nair 117K views - 1 year ago
16:21 Secure Coding Best Practices | OWASP Top 10 Proactive Control Telusko 23.6K views - 4 years ago
49:59 re:Invent, OWASP CICD Top Ten, Aqua Layoffs, Aptakube LIVE - V2.18 C9K wired_in 94 views - 3 years ago
5:35 OSINT 2025: How to Gather All the Info You’ll Ever Need on Anyone. CyberFlow 601.1K views - 1 year ago
20:20 Web Application Vulnerability Scanning with OWASP ZAP | TryHackMe Motasem Hamdan 46K views - 4 years ago
2:45:44 Advanced Network Security—Complete FREE Course in Just 2 Hours (2025) WsCube Cyber Security 81.9K views - 9 months ago
44:25 OWASP Based Threat Modelling: Creating A Feedback Model In An Agile Environment - Chaitanya Bhatt OWASP Foundation 21.2K views - 6 years ago
6:04 Authentication Explained: When to Use Basic, Bearer, OAuth2, JWT & SSO Hayk Simonyan 358.7K views - 7 months ago