Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
10,686,471 results
pentesterlab
secure code warrior assessment answers
checkmarx tutorial
source code review in hindi
source code movie review
If you want to see what vulnerabilities are hiding in your code, sign up for Snyk for free using the code ...
13,635 views
1 year ago
TIMESTAMPS ⏰ ▭▭▭▭▭▭ 00:07:35 Vickie starts her presentation ▭▭▭▭▭▭ ABSTRACT & BIO ▭▭▭▭▭▭ Writing ...
71,118 views
Streamed 4 years ago
Performing a source code review is one of the best ways to find security issues and vulnerabilities in an application. But how do ...
10,191 views
4 years ago
Calling all AppSec enthusiasts! In today's video, we present an essential guide on "How to Get Started with Code Review.
1,568 views
2 years ago
يعني ايه Code Review؟ هي مرحلة من مراحل تطوير الكود و اللي فيها المطور بيطلب من زملاؤه مراجعة التغيير اللي ناوي يعمله, و يقدموا أي نقد ...
16,406 views
5 years ago
ABSTRACT & BIO ▭▭▭▭▭▭ Code analysis is the process of analyzing the code of a program to find security vulnerabilities.
7,306 views
Burp Suite Deep Dive course: https://bit.ly/burpforpros. In this video I'm show you how to use SecureCodeWarrior, a platform to ...
9,849 views
6 years ago
Let's face it, performing a manual review of someone else's source code is hard. It takes time, effort, expertise, and grit to actually ...
4,468 views
In this video, Ken Johnson (@cktricky on twitter) demonstrates the Absolute AppSec Methodology for Secure-Code Review on an ...
4,129 views
3 years ago
Our guest for this episode of the OWASP DevSlop Show is Paul Ionescu; Paul is a Security Architect and OWASP Chapter Leader ...
14,766 views
Speaker: Michael Lynch Are code reviews a source of tension on your team? Do they lead to conflict, bikeshedding, or wasted ...
50,042 views
7 years ago
Purchase my Bug Bounty Course here bugbounty.nahamsec.training #NahamCon2022 is a virtual offensive security.
7,748 views
SHOW SPONSOR ✨ ▭▭▭▭▭▭ As a special offer for the OWASP DevSlop audience, sign up for a free 2-week Datadog trial ...
31,129 views
Streamed 3 years ago
Bug bounties have become an established process in organisations with a mature security posture. Over the last five years, I have ...
8,402 views
Don't miss out on my latest videos ▭ Hit the SUBSCRIBE button to learn about infosec! Episode 1: Dive into the essentials of ...
10,707 views
Hi! I'm a pentester and a bug bounty hunter who's learning every day and sharing useful resources as I move along. Subscribe to ...
29,551 views
Learn about 10 security vulnerabilities every JavaScript developer should know. First try to find the vulnerabilities in the different ...
93,017 views
Static and dynamic code analysis are both essential to building secure software, but each comes with its strengths and blind spots ...
149 views
4 months ago
Based on the top 10 security mistakes web developers make. Video by: Iman Louis Voices: Mike D'Antonio, Iman Louis.
15,716 views
15 years ago
Lecture by Gynvael Coldwind entitled “Security-reviewing AI generated code” as part of Cyber Advent 2025. © [2025] Not The ...
576 views
2 weeks ago
Imagine the day where you get an email from your CEO: "Our site has been hacked! Millions of user records have been leaked!
686 views
11 years ago
Fri Aug 20, 2021 8pm (EDT) ▭▭▭▭▭▭ ABSTRACT & BIO ▭▭▭▭▭▭ In this session, we will explore how source code ...
36,676 views
Subscribe to BBRE Premium: https://bbre.dev/premium ✉️ Sign up for the mailing list: https://bbre.dev/nl Follow me on Twitter: ...
12,941 views
Searching for the best AI Code Review tools in 2025? In this video, we test and compare 4 leading AI-powered code review ...
2,860 views
3 months ago
Secure code review is a very critical but complex process. Not many have experience on how to get started with reviewing the ...
13,846 views
T I M E S T A M P S ⏰ ▭▭▭▭▭▭ 10:11 Dr. Michaela Greiler starts her presentation ▭▭▭▭▭▭ Abstract & Bio ...
22,644 views
Want to secure your applications before hackers find the flaws? In this video, I'll walk you through three free source code review ...
222 views