Channel Avatar

AppSecEngineer @UCzeWGp3WdLetPN7Lhph6S6g@youtube.com

5.7K subscribers - no pronouns :c

Exclusive Full-Stack Security training from we45. Learn with


06:25
How to Trojanize Docker Image using Docker Scan | Container Security | Part 10
01:39
Why DevSecOps Programs Fail and How to Fix Them
08:41
How to Exploit Docker Containers with a Volume Mount Attack | Container Security | Part 9
04:29
How to secure Docker: Explore Attack Vectors and Mitigations | Container Security | Part 8
11:40
How to Pull, Run, and Manage Docker Images | Container Security | Part 7
03:30
Why Docker - Key Advantages Every Developer Should Know | Container Security | Part 6
03:03
Docker Basics: Must-Know Commands for Beginners | Container Security | Part 5
55:51
Webinar: Secure by Design - Across the stack
01:02
Docker Volume - Key Features and Benefits | Container Security | Part 4
03:58
4 Common Mistakes in Cloud Security and How to Fix Them
06:25
Where to Securely Store JWTs: Cookies, Local Storage, or Session Storage?
52:27
Webinar: Leveraging Semgrep and Static Analysis for Paved Roads and Secure Defaults
01:30
Image vs Container: Key Differences Explained | Container Security | Part 3
08:03
7 Steps to Developing Secure-by-Design Software
07:01
What Are Containers | Container Security Series | Part 2
03:20
DevSecOps Certification by AppSecEngineer
07:58
Introduction to Docker | Container Security Series | Part 1
14:58
Implementing Secure by Design Principles in AWS | AWS Security
46:08
Webinar: 2 Stories in Cloud Security - An Exploration of Attack Detect Defense on the Cloud
18:19
How to Detect Network Security Attacks with AWS VPC Mirroring | AWS Security
19:37
How to Catch Failed SSH Logins with AWS Cloudwatch | AWS Security
01:33
DevSecOps Masterclass 2024 Edition - BlackHat USA
01:14
Attacking & Defending AWS, Azure & GCP Cloud Applications - BlackHat USA 2024
01:39
Essential Tools for Effective Cloud Security Incident Response
03:21
Track Your Team's Training Progress on AppSecEngineer
01:11:21
Webinar: Rapid Threat Modeling with GenAI and LLMs
33:55
Attacking Azure Virtual Machines | Live Code
03:39
All About the Secure Coding Collection | AppSecEngineer
02:33
AWS Servers Can Be Compromised Using GitHub??
02:18
Open Source Libraries Can Kill Your Supply Chain Security
11:50
How to learn Cloud Security? | Cloud Security Expert breaks it down step-by-step
24:48
What is CSRF? How does it work on Ruby on Rails applications? | AppSec Expert discusses
42:41
WTF are Security Unit Tests? | Super-charge your AppSec with Security Unit Tests and TDD
15:09
What We Can Learn From the Biggest Cyberattacks of 2023
09:01
GitLab Security Alert: Critical Remote Account Takeover & Password Reset Vulnerability
01:03:14
Security Exploration - AWS Verified Permissions
16:27
AWS Lambda: Vulnerability assessment using Amazon Inspector | AWS Security | Hands-on Lab Demo
10:06
DevSecOps: Overcome 4 Key Challenges for Success
40:44
Secure Defaults with Semgrep | Friday Fireside
04:16
AI Opportunities for Security Professionals
07:40
Lazarus Group's Operation 'Dream Job' Explained
01:01
AI in Security: Your Next Big Opportunity!
11:18
The MGM Hack - What You Need to Know
01:01
Google Cloud Network Security: Exploring VPC - Part 2 #cloudsecurity #googlecloud
24:08
Amazon Cognito Live Code | Friday Fireside
09:53
Becoming a Cloud Security Architect: Step-by-Step Guide
24:53
Attacking Kubernetes Cluster: Demo using AppSecEngineer Hands-on Labs
05:15
7 Reasons You're Not Earning $100K in InfoSec | Security Career Worst Practices
01:40
IaaS, DBaaS, FaaS, SaaS | Cloud Service Models Explained
12:49
24 Hours Left to Register for Black Hat 2023 | Friday Fireside
26:45
Friday Fireside | Supply Chain Security - Live Demo
07:13
How to Build Security Champions Part 1: Recruiting!
04:00
Fortifying National Defense: Crucial Role of Cybersecurity Training in the US Department of Defense
07:02
Discover the Top DevSecOps Training Platforms in 2023!
05:17
11 things to look for in an InfoSec Training Platform
03:20
Securing Critical operations in Manufacturing | Cloud Security & DevSecOps
03:14
Building a Security Dream Team: Overcoming Skills Gap and Retention Challenges
13:33
The AppSec Divide | Application Security expert explains how it works and what you can do about it
07:20
How to Become a Cloud Security Engineer | AppSecEngineer
02:38
Manufacturing CTOs' Training Headaches