Completed
understanding the cyber attack chain
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Beyond the Basics: Securing JavaScript Applications
Automatically move to the next video in the Classroom when playback concludes
- 1 intro
- 2 preamble
- 3 about joshua
- 4 reality
- 5 understanding the cyber attack chain
- 6 code review
- 7 why use js for machine learning?
- 8 security considerations
- 9 how to secure the librairies and frameworks?
- 10 automated vulnerability management
- 11 network isolation
- 12 how about iam privilege escalation?
- 13 restrictive iam permissions
- 14 how about denial of wallet attacks?
- 15 recap
- 16 thanks