A Beginners Guide to Code Review

Поделиться
HTML-код
  • Опубликовано: 8 июн 2024
  • If you want to see what vulnerabilities are hiding in your code, sign up for Snyk for free using the code snyk.co/thecybermentor
    00:00 Introduction to Code Review
    00:33 Snyk Sponsor Message
    01:34 What is Code Review?
    02:34 Get started with Code Review
    04:13 Code Review Labs
    11:00 How to Practice Code Review
    12:16 Where to Find Code to Review
    13:08 Outro
    Sponsor a Video: www.tcm.rocks/Sponsors
    Pentests & Security Consulting: tcm-sec.com
    Get Trained: academy.tcm-sec.com
    Get Certified: certifications.tcm-sec.com
    Merch: merch.tcm-sec.com
    📱Social Media📱
    ___________________________________________
    Twitter: / thecybermentor
    Twitch: / thecybermentor
    Instagram: / thecybermentor
    LinkedIn: / heathadams
    TikTok: / thecybermentor
    Discord: / discord
    💸Donate💸
    ___________________________________________
    Like the channel? Please consider supporting me on Patreon:
    / thecybermentor
    Support the stream (one-time): streamlabs.com/thecybermentor
    Hacker Books:
    Penetration Testing: A Hands-On Introduction to Hacking: amzn.to/31GN7iX
    The Hacker Playbook 3: amzn.to/34XkIY2
    Hacking: The Art of Exploitation: amzn.to/2VchDyL
    The Web Application Hacker's Handbook: amzn.to/30Fj21S
    Real-World Bug Hunting: A Field Guide to Web Hacking: amzn.to/2V9srOe
    Social Engineering: The Science of Human Hacking: amzn.to/31HAmVx
    Linux Basics for Hackers: amzn.to/34WvcXP
    Python Crash Course, 2nd Edition: amzn.to/30gINu0
    Violent Python: amzn.to/2QoGoJn
    Black Hat Python: amzn.to/2V9GpQk
    My Build:
    lg 32gk850g-b 32" Gaming Monitor:amzn.to/30C0qzV
    darkFlash Phantom Black ATX Mid-Tower Case: amzn.to/30d1UW1
    EVGA 2080TI: amzn.to/30d2lj7
    MSI Z390 MotherBoard: amzn.to/30eu5TL
    Intel 9700K: amzn.to/2M7hM2p
    G.SKILL 32GB DDR4 RAM: amzn.to/2M638Zb
    Razer Nommo Chroma Speakers: amzn.to/30bWjiK
    Razer BlackWidow Chroma Keyboard: amzn.to/2V7A0or
    CORSAIR Pro RBG Gaming Mouse: amzn.to/30hvg4P
    Sennheiser RS 175 RF Wireless Headphones: amzn.to/31MOgpu
    My Recording Equipment:
    Panasonic G85 4K Camera: amzn.to/2Mk9vsf
    Logitech C922x Pro Webcam: amzn.to/2LIRxAp
    Aston Origin Microphone: amzn.to/2LFtNNE
    Rode VideoMicro: amzn.to/309yLKH
    Mackie PROFX8V2 Mixer: amzn.to/31HKOMB
    Elgato Cam Link 4K: amzn.to/2QlicYx
    Elgate Stream Deck: amzn.to/2OlchA5
    *We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.
  • НаукаНаука

Комментарии • 10

  • @0xbitbybit
    @0xbitbybit 3 месяца назад +4

    Just a small suggestion, maybe make the presenters head not take up half the screen, just make him small down the bottom right corner so we can see the complete code he's referring to for the code review 👍

  • @kodeish
    @kodeish 3 месяца назад

    thanks ALex for , If possible please make more video on this topic also the Exp Dev

  • @antonyjose2231
    @antonyjose2231 3 месяца назад +1

    Missed you alex

  • @xelerated
    @xelerated 3 месяца назад +1

    So just javascript? Does sync do real code review like.....applications (NOT WEB)?

  • @unknownmanos
    @unknownmanos 3 месяца назад +2

    Alex ❤

  • @sanjaycool4737
    @sanjaycool4737 3 месяца назад +1

    Sir, kindly plz do the soc analyst course
    Beginner road map for the soc
    Technical skills to have soc
    How to use all the importance
    Plzzz sir,

    • @himansh0715
      @himansh0715 3 месяца назад

      Becoming a Security Operations Center (SOC) analyst requires a combination of education, training, and experience in cybersecurity. Here's a detailed path you can follow to become a SOC analyst:
      1. **Educational Background**:
      - Obtain a bachelor's degree in computer science, information technology, cybersecurity, or a related field. While a degree is not always mandatory, it significantly enhances your prospects in the field.
      - Consider pursuing relevant certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or GIAC Security Essentials (GSEC).
      2. **Gain Technical Skills**:
      - Develop a strong understanding of networking concepts, protocols, and infrastructure.
      - Familiarize yourself with operating systems such as Windows, Linux, and Unix.
      - Learn about cybersecurity tools, including intrusion detection systems (IDS), intrusion prevention systems (IPS), security information and event management (SIEM) solutions, and endpoint protection platforms (EPP).
      3. **Gain Practical Experience**:
      - Participate in cybersecurity competitions like Capture The Flag (CTF) events, which provide hands-on experience in identifying and mitigating security threats.
      - Seek internships or entry-level positions in IT or cybersecurity roles to gain practical experience in handling security incidents and analyzing threats.
      4. **Develop Analytical Skills**:
      - Enhance your critical thinking and problem-solving abilities, as SOC analysts are required to analyze large volumes of data to identify security incidents.
      - Familiarize yourself with cybersecurity frameworks and best practices such as the NIST Cybersecurity Framework and MITRE ATT&CK Framework.
      5. **Specialize in Threat Detection and Incident Response**:
      - Focus on threat detection techniques, including signature-based detection, anomaly detection, and behavioral analysis.
      - Learn about incident response procedures, including how to triage incidents, contain threats, eradicate malware, and recover systems.
      6. **Stay Updated**:
      - Keep abreast of the latest cybersecurity trends, threat actors, and attack techniques by attending conferences, webinars, and workshops.
      - Join online communities and forums where cybersecurity professionals share knowledge and discuss emerging threats.
      7. **Networking and Professional Development**:
      - Build a professional network by attending industry events, joining professional organizations like ISACA or (ISC)², and connecting with peers and mentors in the cybersecurity field.
      - Consider pursuing advanced certifications or specialized training in areas such as digital forensics, incident response, or threat intelligence to further enhance your skills and credibility as a SOC analyst.
      8. **Gain Experience and Progression**:
      - Start your career as a junior SOC analyst and gradually gain experience by handling various security incidents and refining your skills.
      - As you gain experience, you may progress to senior SOC analyst roles, team lead positions, or specialize in specific areas such as threat hunting or security architecture.
      By following this path and continuously updating your skills and knowledge, you can work towards becoming a proficient SOC analyst in the field of cybersecurity.

  • @omarmostafa543
    @omarmostafa543 3 месяца назад

    اليكس عمي وعمي عيالي ابوس النونه ❤️🫶