Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Can We Automate Security?
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 What is CICD
- 3 Ransomware
- 4 Michael Hayden
- 5 Security Practices
- 6 Red Team Guidelines
- 7 Capture the Flag
- 8 Vulnerability Discovery
- 9 Credentials
- 10 Antivirus
- 11 Phishing
- 12 Second Biggest Vulnerability
- 13 Open Source Software
- 14 Equifax
- 15 WhiteSource
- 16 Limitations
- 17 Isolation
- 18 Regular Deployments
- 19 Static Code Scanning