We are pleased to share that we were able to re-record the followed lessons so they are up-to-date and in alignment with current security best-practices. The lessons are:
โ
โ1. Input Validation
2. Injection
3. OWASP Top 10: Part 1
4. OWASP Top 10: Part 2
5. OWASP Top 10: Part 2
6. Authentication Theory
7. Authorization Theory
8. CWE Top 25 Part 1
9. CWE Top 25 Part 2
10. CWE Top 25 Part 3
11. CWE Top 25 Part 4
12. Logging and Exception Handling
13. Threat Modeling Basic
14. Threat Modeling Manifesto
15. Buffer Overflows
16. Software Supply Chain
17. Denial of Service
18. Thinking like a penetration tester for developers
19. SAS