Channel Avatar

secappdev.org @UCSii2fuiLLlGqaR6sR_y0rA@youtube.com

3.1K subscribers - no pronouns :c

We use this channel to publish recordings of our courses on


54:02
Between Testing and Formal Verification - Jan Tobias Muehlberg
01:22:05
AuthN/Z for REST service - Johan Peeters
01:23:02
Towards a Secure IoT Landscape - Danny De Cock
01:35:08
The Rise and Fall of Client-Side Web Security Technologies - Philippe De Ryck
01:34:45
Blockchain: Distributed Trust - Bart Preneel
01:23:46
New Security Control Enhancements Java 8 and 9 - Jim Manico
01:24:04
OAuth 2.0 Security Introduction - Jim Manico
02:59:54
Data Mining for Security - Konrad Rieck
01:39:24
Addressing Privacy in Cloud Service Development - Seda Gürses
01:33:41
Building Secure Angular Application - Philippe De Ryck
01:44:52
A day in the life of a malware analyst - Didier Stevens
01:30:25
Privacy Research Paradigms - Seda Gürses
01:32:06
The Web's Security Model in 2017 - Philippe De Ryck
01:19:50
Practical Android Security - Dario Incalza
01:34:06
Secure Development Lifecycles (SDLC): Introduction and Process Models - Bart De Win
01:24:29
The OWASP Top Ten Proactive Controls - Jim Manico
01:27:40
Android Security - Dan Wallach
01:19:34
Hardening Mobile Apps - Ken van Wyk
01:27:24
Efficient Tamper-Evident Data Structures for Untrusted Servers - Dan Wallach
01:22:46
Access Control - Maarten Decat
01:31:25
Recent Advances in System Software Security - Frank Piessens
01:32:01
SSL/TLS Deployment Best Practices - Ivan Ristić
01:27:12
Tales of a Bug Bounty Hunter - Arne Swinnen
01:33:58
Cryptography in a post-Snowden era - Bart Preneel
01:32:22
Authorization with OAuth 2.0 - Stijn Van den Enden & Jan Van den Bergh
01:37:24
Cryptographic and Information Security in the Post-Snowden Era - Bart Preneel
01:22:29
XSS Defense - Jim Manico
01:03:07
Using SLL/TLS: a hands-on session - Thomas Herlea
01:32:09
Access control - Frank Piessens
59:14
Why code reviews and pen-tests are not enough - Jim DelGrosso
00:57
SecAppDev Trailer
01:16:09
OWASP top ten proactive defenses - Jim Manico
01:14:44
Secure Payment Architecture - Steven Murdoch
01:26:10
Securing Single Page Applications - Philippe De Ryck
01:20:36
Applying static analysis - Matias Madou and Daan Raman
01:31:05
Recent web security technologies, 2015 update - Lieven Desmet
01:27:22
Real-Time Communication with WebRTC - Lieven Desmet
01:28:29
Selective disclosure for identity management - George Danezis
01:37:39
Access Control, update 2015 - George Danezis
01:26:10
Software protection - Bart De Win and Nessim Kisserli
01:27:33
Modern Privacy Friendly Computing 2015 - George Danezis
01:34:29
Trusted computing - Aurélien Francillon
48:11
Watching the attackers with a web honeypot - Aurélien Francillon
01:31:37
Cryptographic Algorithms - Bart Preneel
01:08:35
Engineering Privacy Friendly Computations - George Danezis
01:29:31
Architecture Analysis - Jim DelGrosso
01:35:16
Access Control - George Danezis
01:14:01
Principles of Computer Security - George Danezis
01:32:16
Modern Privacy Friendly Computing - George Danezis
01:28:19
Recent Web Security Technology - Lieven Desmet
58:53
Threat Modeling - Jim DelGrosso
01:20:19
The Web's Security Model - Philippe De Ryck
01:31:34
Low-Level Software Security: Attacks and Countermeasures - Frank Piessens
01:41:26
Online Crypto Currencies - George Danezis
01:19:50
Online Banking Security - Steven Murdoch
01:35:00
Entity Authentication and Symmetric Key Establishment - Bart Preneel
01:30:35
Post Snowden Cryptography or Who Holds Your Keys? - Bart Preneel
01:26:24
JavaScript Security - Tom van Cutsem
01:34:24
Authorization with OAuth 2.0 - Stijn Van den Enden & Jan Van den Bergh
01:26:40
Introduction to Security APIs - Graham Steel