Все публикации

Building an App Sec Program - Module 102 - Get an App Sec Job with a masters in cybersecurity

Building an Application Security Program - Module 103 - App Sec Activities

Building an Application Security Program - Module 101 - Why App Sec? Part 2

Building an Application Security Program - Module 101 - Why App Sec? Part 1

Building an Application Security Program - Module 000 - Course Overview

Automating Squarespace Admin Tasks With Selenium and C# - Part 1 - Introduction to Automation

Automating Squarespace Admin Tasks With Selenium and C# - Part 5 Product Image Upload

Automating Squarespace Admin Tasks With Selenium and C# - Part 2 - Logging in to Squarespace

Automating Squarespace Admin Tasks With Selenium and C# - Part 3 - Digital Product Data Structures

Automating Squarespace Admin Tasks With Selenium and C# - Part 4 Product Upload

Security Unit Testing Automation with Selenium & C# - Part 2

Security Unit Testing Automation with Selenium & C# - Part 1

Splunk Security Datasets Project - Bonus Part 5

Investigating a Hack with Splunk and the Cyber Kill Chain Part 4

Investigating a Hack with Splunk and the Cyber Kill Chain Part 3

Investigating a Hack with Splunk and the Cyber Kill Chain Part 2

Investigating a Hack with Splunk and the Cyber Kill Chain Part 1

OWASP Top 10 Threats 2017 in .Net C#: 8.2 Insecure Deserialization Part 3

OWASP Top 10 Threats 2017 in .Net C#: 8.2 Insecure Deserialization Part 2 (Short version)

OWASP Top 10 Threats 2017 in .Net C#: 8.2 Insecure Deserialization Part 2 (Full Version)

OWASP Top 10 Threats 2017 in .Net C#: 8.1 Insecure Deserialization Part 1

Sending Files Securely from a Windows Computer (Encryption and Signing)

Building a HTTP Response Headers security control in C# Part 3

Building a HTTP Response Headers security control in C# Part 2