Completed
Regular Deployments
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Can We Automate Security?
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 What is CICD
- 3 Ransomware
- 4 Michael Hayden
- 5 Security Practices
- 6 Red Team Guidelines
- 7 Capture the Flag
- 8 Vulnerability Discovery
- 9 Credentials
- 10 Antivirus
- 11 Phishing
- 12 Second Biggest Vulnerability
- 13 Open Source Software
- 14 Equifax
- 15 WhiteSource
- 16 Limitations
- 17 Isolation
- 18 Regular Deployments
- 19 Static Code Scanning