Completed
Integrated Authentication
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 About Ryan Elkins
- 3 How can security be simple
- 4 Security is like a puzzle
- 5 You dont need bottomless pockets
- 6 Security requires passionate people
- 7 Building a program
- 8 Zero day
- 9 Common attack vector
- 10 Curiosity
- 11 Set
- 12 Metaphor Module
- 13 What to Protect Against
- 14 User Awareness
- 15 Make Security the Trend
- 16 Quick Game
- 17 Attack Dogs
- 18 Users Cant Always Protect
- 19 Endpoint System Protection
- 20 Centralized Management
- 21 Network Protection
- 22 Application Security
- 23 Application sprawl
- 24 Review all applications
- 25 Training developers
- 26 I dont know code
- 27 Checklist
- 28 Application Risks
- 29 Review Checklist
- 30 Review Categories
- 31 Passwords
- 32 Cookies
- 33 Databases
- 34 Input Validation
- 35 Output Encoding
- 36 Transport Layer
- 37 Web Config
- 38 Encryption
- 39 ThirdParty Applications
- 40 ThirdParty Code
- 41 Search Strings
- 42 Application Reviews
- 43 Database Security
- 44 Integrated Authentication
- 45 Vulnerability Management
- 46 Cloud Storage
- 47 Centralization
- 48 Baselines
- 49 Risk Acceptance Model
- 50 Time to Build
- 51 Closing Thoughts