364Results for "secure coding"
-
Programming Foundations: Secure Coding (2018)2h 36m
Programming Foundations: Secure Coding (2018)
By: Frank P Moley III
Course
-
Introduction to secure coding1m
Introduction to secure coding
From: Developing Secure Software
Video
-
Secure Development, Programming, and Coding with Veracode1h 41m
Secure Development, Programming, and Coding with Veracode
By: Cybrary
Course
-
Programming Foundations: Secure Coding2h 1m
Programming Foundations: Secure Coding
By: Frank P Moley III
Course
-
What are secure coding, CERT and other standards?1m
What are secure coding, CERT and other standards?
From: Secure Coding in Python
Video
-
Secure coding methodologies5m
Secure coding methodologies
From: Cloud Data, Platform, and Applications Security by Pearson
Video
-
Secure coding practices4m
Secure coding practices
From: Advanced Practices in Application Security
Video
-
Secure coding, continuous build, integration, and testing3m
Secure coding, continuous build, integration, and testing
From: Certificate of Cloud Security Knowledge (CCSK) Cert Prep
Video
-
Manual security code review process8m
Manual security code review process
From: Application Security Testing and Debugging
Video
-
Secure coding principles5m
Secure coding principles
From: Complete Guide to Application Security
Video
-
The need for secure coding10m
The need for secure coding
From: Writing Secure Code in iOS by Infosec
Video
-
Other secure coding leading practices2m
Other secure coding leading practices
From: Developing Secure Software
Video
-
Introduction to AI validation: Why it matters for production code3m
Introduction to AI validation: Why it matters for production code
From: Responsible AI Development with GitHub Copilot
Video
-
Defining security as code3m
Defining security as code
From: Securing Azure Infrastructure with Bicep
Video
-
The need for secure coding9m
The need for secure coding
From: Writing Secure Code for Android by Infosec
Video
-
The goals of secure coding3m
The goals of secure coding
From: Programming Foundations: Secure Coding
Video
-
Layered security, secure coding, and configuration4m
Layered security, secure coding, and configuration
From: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Video
-
Application security and secure development1h 29m
Application security and secure development
From: CompTIA Cybersecurity Analyst (CySA+) (CS0-003) Cert Prep
Video
-
Vibe coding limitations: Data privacy and security7m
Vibe coding limitations: Data privacy and security
From: Vibe Coding with Lovable: From Idea to Prototype in Under an Hour (No Code Required)
Video
-
Percentage of code scanned for security4m
Percentage of code scanned for security
From: DevSecOps Metrics and Continuous Improvement
Video
-
Managing code with Secure Source Manager4m
Managing code with Secure Source Manager
From: Google Cloud Platform Essential Training for Developers: Cloud-Native Development with Gemini
Video
-
Security considerations in AI-generated web code2m
Security considerations in AI-generated web code
From: Vibe Coding Common Web Patterns into Tailwind CSS
Video
-
Vibe coding limitations: Data privacy and security5m
Vibe coding limitations: Data privacy and security
From: Vibe Coding with Bolt.new
Video
-
Discover why validating AI-generated code is essential for quality and security1m
Discover why validating AI-generated code is essential for quality and security
From: GitHub Copilot Cert Prep by Microsoft Press
Video
-
Learn about code quality and security4m
Learn about code quality and security
From: Microsoft Azure DevOps Engineer Expert (AZ-400) Cert Prep by Microsoft Press
Video
-
Designing and testing secure contracts4m
Designing and testing secure contracts
From: Cryptocurrencies and Blockchain Security Fundamentals: Build a Secure Foundation in Crypto and Blockchain
Video
-
Challenges with securing code4m
Challenges with securing code
From: Application Security Posture Management: Security from the Supply Chain to Cloud Runtime
Video
-
Common vulnerabilities and exposures checks3m
Common vulnerabilities and exposures checks
From: Secure Coding in Python
Video
-
Cloud security automation and infrastructure as code (IaC) security5m
Cloud security automation and infrastructure as code (IaC) security
From: Advanced Practices in Application Security
Video
-
Identifying security vulnerabilities in AI-generated code5m
Identifying security vulnerabilities in AI-generated code
From: Responsible AI Development with GitHub Copilot
Video
-
Security concepts and code of ethics17m
Security concepts and code of ethics
From: ISC2 Systems Security Certified Practitioner (SSCP) Cert Prep
Video
-
Types of datasets in LLM for security: Code-based, text-based, and combined7m
Types of datasets in LLM for security: Code-based, text-based, and combined
From: AI Agents for Cybersecurity
Video
-
Using code for extra security2m
Using code for extra security
From: WordPress Essential Training
Video
-
Guidelines for secure coding14m
Guidelines for secure coding
From: CertNexus Cyber Secure Coder (CSC-110) Cert Prep
Video
-
Securing code, applications, and building DevSecOps pipelines7m
Securing code, applications, and building DevSecOps pipelines
From: Certified Ethical Hacker (CEH)
Video
-
Secure software development life cycle6m
Secure software development life cycle
From: Modern Cloud Security: Shift-Left, Observability, and Automated Defense
Video
-
Set up Copilot for security tasks and secure coding best practices13m
Set up Copilot for security tasks and secure coding best practices
From: GitHub Copilot for Cybersecurity Specialists by Microsoft Press
Video
-
Emphasize secure coding principles2m
Emphasize secure coding principles
From: Complete Guide to GitHub Copilot for Developers by Microsoft Press
Video
-
Welcome to secure coding in iOS1m
Welcome to secure coding in iOS
From: Writing Secure Code in iOS by Infosec
Video
-
The goal of secure coding3m
The goal of secure coding
From: Programming Foundations: Secure Coding (2018)
Video
-
Technical: Infra, LLM, and code countermeasures1m
Technical: Infra, LLM, and code countermeasures
From: LLM Security: How to Protect Your Generative AI Investments
Video