搜索
为您找到约
34
个磁力链接/BT种子,耗时 1 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
[ DevCourseWeb.com ] Udemy - Secure Coding Based On OWASP Top 10 with Practical Examples
~Get Your Files Here !/4 - Secure Coding - A032021 Injections/1 -Injections Explained.mp4
102.5 MB
~Get Your Files Here !/5 - Secure Coding - A042021 Insecure Design/1 -Insecure Design Explained (Design Principles, Frameworks, Key Practices).mp4
73.3 MB
~Get Your Files Here !/3 - Secure Coding - A022021 Cryptographic Failures/5 -Cryptographic Failures Prevention Guide.mp4
61.8 MB
~Get Your Files Here !/8 - Secure Coding - A072021 Identification and Authentication Failures/2 -Ident. and Auth. Failures Example 1 (Login Brute Force, Sensitive Data in GET ).mp4
54.2 MB
~Get Your Files Here !/4 - Secure Coding - A032021 Injections/4 -Vulnerable Code vs Secure Code Example 3 (XML Injection, File Upload, LDAP Inj.).mp4
53.2 MB
~Get Your Files Here !/8 - Secure Coding - A072021 Identification and Authentication Failures/4 -Identification and Authentication Failures Prevention Guide.mp4
49.4 MB
~Get Your Files Here !/6 - Secure Coding - A052021 Security Misconfiguration/1 -Security Misconfigurations (Security Hardenings, Error Handlings, Secure Config).mp4
48.8 MB
~Get Your Files Here !/4 - Secure Coding - A032021 Injections/3 -Vulnerable Code vs Secure Code Example 2 (Command Injection).mp4
46.4 MB
~Get Your Files Here !/8 - Secure Coding - A072021 Identification and Authentication Failures/1 -Identification and Authentication Failures Explained.mp4
40.0 MB
~Get Your Files Here !/4 - Secure Coding - A032021 Injections/2 -Vulnerable Code vs Secure Code Example 1 (SQL Injection).mp4
38.5 MB
~Get Your Files Here !/2 - Secure Coding - A012021 Broken Access Control/2 -Broken Access Control - Practical Example on a Vulnerable Web Application.mp4
37.3 MB
~Get Your Files Here !/10 - Secure Coding - A092021 Security Logging and Monitoring Failures/1 -Security Logging and Monitoring Failures Explained.mp4
36.4 MB
~Get Your Files Here !/8 - Secure Coding - A072021 Identification and Authentication Failures/3 -Identification and Authentication Failures Example 2.mp4
34.7 MB
~Get Your Files Here !/11 - Secure Coding - A102021 Server-Side Request Forgery/1 -Server-Side Request Forgery All in One.mp4
33.7 MB
~Get Your Files Here !/9 - Secure Coding - A082021 Software and Data Integrity Failures/1 -Software and Data Integrity Failures.mp4
29.3 MB
~Get Your Files Here !/4 - Secure Coding - A032021 Injections/5 -Injection Prevention Guide.mp4
27.7 MB
~Get Your Files Here !/7 - Secure Coding - A062021 Vulnerable and Outdated Components/1 -Vulnerable and Outdated Components All In One.mp4
27.0 MB
~Get Your Files Here !/2 - Secure Coding - A012021 Broken Access Control/6 -Broken Access Controls Prevention Guide.mp4
23.4 MB
~Get Your Files Here !/3 - Secure Coding - A022021 Cryptographic Failures/1 -Cryptographic Failures Explained.mp4
21.9 MB
~Get Your Files Here !/1 - Giriş/1 -Introduction.mp4
15.8 MB
[磁力链接]
添加时间:
2024-12-01
大小:
941.1 MB
最近下载:
2025-01-02
热度:
147
Top 10 vulnerabilidades Owasp.rar
Top 10 vulnerabilidades Owasp.rar
308.7 MB
[磁力链接]
添加时间:
2024-11-13
大小:
308.7 MB
最近下载:
2025-01-03
热度:
38
[ FreeCourseWeb.com ] OWASP Top 10 API Security Risks - 2023
~Get Your Files Here !/2 - Fundamental Principles of Application Security/2 -RBAC and ABAC.mp4
165.9 MB
~Get Your Files Here !/15 - Summary and Best Practices/1 -API Security Best Practices.mp4
143.7 MB
~Get Your Files Here !/13 - API92023/1 -API92023 - Improper Inventory Management.mp4
92.0 MB
~Get Your Files Here !/14 - API102023/1 -API102023 - Unsafe Consumption of APIs.mp4
87.1 MB
~Get Your Files Here !/14 - API102023/2 -Real-World Impact.mp4
76.9 MB
~Get Your Files Here !/5 - API12023 - Broken Object Level Authorization/1 -API12023 - Broken Object Level Authorization.mp4
74.4 MB
~Get Your Files Here !/8 - API42023/1 -API42023 - Unrestricted Resource Consumption.mp4
72.8 MB
~Get Your Files Here !/3 - OWASP/1 -Introduction to OWASP.mp4
71.9 MB
~Get Your Files Here !/12 - API82023/1 -API82023 - Security Misconfiguration.mp4
70.6 MB
~Get Your Files Here !/2 - Fundamental Principles of Application Security/1 -CIA, AA.mp4
69.8 MB
~Get Your Files Here !/10 - API62023/2 -Real-World Impact.mp4
64.2 MB
~Get Your Files Here !/6 - API22023/1 -API22023 - Broken Authentication.mp4
64.2 MB
~Get Your Files Here !/12 - API82023/3 -Mitigation Strategies.mp4
64.0 MB
~Get Your Files Here !/13 - API92023/2 -Real-World Impact.mp4
63.8 MB
~Get Your Files Here !/14 - API102023/3 -Mitigation Strategies.mp4
63.5 MB
~Get Your Files Here !/7 - API32023/1 -API32023 - Broken Object Property Level Authorization.mp4
63.0 MB
~Get Your Files Here !/11 - API72023/2 -Real-World Impact.mp4
59.4 MB
~Get Your Files Here !/10 - API62023/3 -Mitigation Strategies.mp4
59.3 MB
~Get Your Files Here !/5 - API12023 - Broken Object Level Authorization/3 -Mitigation Strategies.mp4
53.9 MB
~Get Your Files Here !/13 - API92023/3 -Mitigation Strategies.mp4
49.0 MB
[磁力链接]
添加时间:
2024-10-28
大小:
2.3 GB
最近下载:
2025-01-02
热度:
722
API Security with the OWASP API Security Top 10
owasp-api-security-top-10.zip
25.5 MB
07. Broken Function Level Authorization/02. Demo- Exploiting Broken Function Level Authorization.mp4
11.4 MB
04. Broken Authentication/04. Demo- Common JWT Attacks.mp4
11.2 MB
10. Security Misconfiguration/04. Misconfiguration in the API and Response Chain.mp4
11.2 MB
03. Broken Object Level Authorization/03. Demo- Broken Object Level Attacks.mp4
11.0 MB
02. Understanding the OWASP API Security Top 10/01. Using the OWASP API Security Top 10.mp4
10.9 MB
04. Broken Authentication/02. Password Based Attacks and Defenses.mp4
10.2 MB
11. Improper Inventory Management/03. Attacks and Defenses.mp4
9.6 MB
12. Unsafe Consumption of APIs/03. API Consumption Defenses.mp4
9.0 MB
04. Broken Authentication/03. Other Attacks and Defenses.mp4
8.3 MB
02. Understanding the OWASP API Security Top 10/02. Metrics behind the Top 10 Risks.mp4
7.8 MB
08. Unrestricted Access to Sensitive Business Flows/01. Sensitive Business Flows and Potential Attacks.mp4
6.9 MB
10. Security Misconfiguration/03. Server Environment Misconfigurations.mp4
6.8 MB
05. Broken Object Property Level Authorization/03. Demo- Exploiting Object Properties.mp4
6.7 MB
09. Server-side Request Forgery/01. Understanding Server-side Request Forgery.mp4
6.7 MB
06. Unrestricted Resource Consumption/01. Unrestricted Resource Consumption Attacks.mp4
6.7 MB
08. Unrestricted Access to Sensitive Business Flows/03. Business Flow Defenses.mp4
6.4 MB
11. Improper Inventory Management/01. Understanding Improper Inventory Management.mp4
6.3 MB
07. Broken Function Level Authorization/03. Defenses.mp4
6.1 MB
08. Unrestricted Access to Sensitive Business Flows/02. Demo- Attacking an Unrestricted Business Flow.mp4
6.1 MB
[磁力链接]
添加时间:
2024-05-02
大小:
254.6 MB
最近下载:
2025-01-03
热度:
1506
[ DevCourseWeb.com ] Udemy - Owasp Api Security Top 10 2021 With Java Examples
~Get Your Files Here !/3 - A012021Broken Access Control/4 - Broken Access Control.mp4
325.9 MB
~Get Your Files Here !/9 - A072021Identification and Authentication Failures/16 - Identification & Authentication Failures.mp4
212.7 MB
~Get Your Files Here !/7 - A052021Security Misconfiguration/14 - Security Misconfiguration Hardening Zero Trust Defense in Depth Practice.mp4
201.9 MB
~Get Your Files Here !/8 - A062021Vulnerable and Outdated Components/15 - Vulnerable & Outdated Components.mp4
187.5 MB
~Get Your Files Here !/4 - A022021Cryptographic Failures/7 - Cryptography Failures Examples Password Encryption Hashing Salting.mp4
161.8 MB
~Get Your Files Here !/4 - A022021Cryptographic Failures/6 - Cryptography Failures Practical Examples SQL Injections TLSSSL HTTPS.mp4
144.3 MB
~Get Your Files Here !/11 - A092021Security Logging and Monitoring Failures/18 - Security Logging & Monitoring Failures.mp4
141.6 MB
~Get Your Files Here !/6 - A042021Insecure Design/12 - Insecure Design Secure Design Process Security Controls Metrics Examples.mp4
135.4 MB
~Get Your Files Here !/5 - A032021Injection/9 - Injection Cross Site Scripting Types of XSS SQL JPA NoSQL Injections.mp4
132.7 MB
~Get Your Files Here !/12 - A102021ServerSide Request Forgery/19 - ServerSide Request Forgery SSRF.mp4
128.9 MB
~Get Your Files Here !/2 - OWASP Top 10/3 - OWASP Top 10 Overview.mp4
125.0 MB
~Get Your Files Here !/5 - A032021Injection/8 - Injection Overview Fuzzing CWEs Impact Injection Types Command Injection.mp4
117.2 MB
~Get Your Files Here !/10 - A082021Software and Data Integrity Failures/17 - Software & Data Integrity Failures.mp4
109.3 MB
~Get Your Files Here !/6 - A042021Insecure Design/11 - Insecure Design Overivew CWEs Shift Left Security Threat Modeling Manifesto.mp4
107.1 MB
~Get Your Files Here !/7 - A052021Security Misconfiguration/13 - Security Misconfiguration Overview CWEs Types Reallife attacks.mp4
103.3 MB
~Get Your Files Here !/4 - A022021Cryptographic Failures/5 - Cryptography Failures Theory Sensitive Data Data Breach Types of Failures.mp4
98.2 MB
~Get Your Files Here !/5 - A032021Injection/10 - Injection XPath Injection Log Injection Input Validation.mp4
93.1 MB
~Get Your Files Here !/1 - Introduction/1 - Communication plan.mp4
51.5 MB
~Get Your Files Here !/1 - Introduction/2 - Unlimited access to Learn IT application for students.mp4
46.7 MB
~Get Your Files Here !/13 - Bonus Section/20 - Bonus Lesson.mp4
38.9 MB
[磁力链接]
添加时间:
2024-04-12
大小:
2.7 GB
最近下载:
2025-01-03
热度:
1035
[ FreeCourseWeb.com ] PluralSight - API Security with the OWASP API Security Top 10
~Get Your Files Here !/7. Broken Function Level Authorization/2. Demo - Exploiting Broken Function Level Authorization.mp4
11.4 MB
~Get Your Files Here !/4. Broken Authentication/4. Demo - Common JWT Attacks.mp4
11.2 MB
~Get Your Files Here !/10. Security Misconfiguration/4. Misconfiguration in the API and Response Chain.mp4
11.2 MB
~Get Your Files Here !/3. Broken Object Level Authorization/3. Demo - Broken Object Level Attacks.mp4
11.0 MB
~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/1. Using the OWASP API Security Top 10.mp4
10.9 MB
~Get Your Files Here !/4. Broken Authentication/2. Password Based Attacks and Defenses.mp4
10.2 MB
~Get Your Files Here !/11. Improper Inventory Management/3. Attacks and Defenses.mp4
9.6 MB
~Get Your Files Here !/12. Unsafe Consumption of APIs/3. API Consumption Defenses.mp4
9.0 MB
~Get Your Files Here !/4. Broken Authentication/3. Other Attacks and Defenses.mp4
8.3 MB
~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/2. Metrics behind the Top 10 Risks.mp4
7.8 MB
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/1. Sensitive Business Flows and Potential Attacks.mp4
6.9 MB
~Get Your Files Here !/10. Security Misconfiguration/3. Server Environment Misconfigurations.mp4
6.8 MB
~Get Your Files Here !/5. Broken Object Property Level Authorization/3. Demo - Exploiting Object Properties.mp4
6.7 MB
~Get Your Files Here !/9. Server-side Request Forgery/1. Understanding Server-side Request Forgery.mp4
6.7 MB
~Get Your Files Here !/6. Unrestricted Resource Consumption/1. Unrestricted Resource Consumption Attacks.mp4
6.7 MB
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/3. Business Flow Defenses.mp4
6.4 MB
~Get Your Files Here !/11. Improper Inventory Management/1. Understanding Improper Inventory Management.mp4
6.3 MB
~Get Your Files Here !/7. Broken Function Level Authorization/3. Defenses.mp4
6.1 MB
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/2. Demo - Attacking an Unrestricted Business Flow.mp4
6.1 MB
~Get Your Files Here !/6. Unrestricted Resource Consumption/2. Defenses for Resource Consumption.mp4
5.8 MB
[磁力链接]
添加时间:
2024-03-10
大小:
229.1 MB
最近下载:
2024-12-31
热度:
1828
OWASP Top 10 Web Application Security Exploit for beginners
01 - OWASP Top 10 Web Application Security Exploit/002 Components of Web Application.mp4
214.6 MB
01 - OWASP Top 10 Web Application Security Exploit/013 Advantages of WAF (Web Application Firewall).mp4
156.0 MB
01 - OWASP Top 10 Web Application Security Exploit/010 Broken Authentication Attack.mp4
125.7 MB
01 - OWASP Top 10 Web Application Security Exploit/009 Security Misconfiguration Attack.mp4
118.3 MB
01 - OWASP Top 10 Web Application Security Exploit/005 Cross Site Scripting Attack.mp4
118.2 MB
01 - OWASP Top 10 Web Application Security Exploit/001 SQL Injection Attack.mp4
109.5 MB
01 - OWASP Top 10 Web Application Security Exploit/007 Hidden Field Manipulation Attack.mp4
88.4 MB
01 - OWASP Top 10 Web Application Security Exploit/003 Parameter Tampering Attack.mp4
74.9 MB
01 - OWASP Top 10 Web Application Security Exploit/004 Sensitive Data Exposure Attack.mp4
66.0 MB
01 - OWASP Top 10 Web Application Security Exploit/012 Insufficient Logging & Monitoring Vulnerability.mp4
59.1 MB
01 - OWASP Top 10 Web Application Security Exploit/011 Buffer Overflow Attack.mp4
55.1 MB
01 - OWASP Top 10 Web Application Security Exploit/008 Cookie Poisoning Hijacking Attack.mp4
52.1 MB
01 - OWASP Top 10 Web Application Security Exploit/006 Forceful Browsing Attack.mp4
39.9 MB
01 - OWASP Top 10 Web Application Security Exploit/002 Components of Web Application_en.srt
34.9 kB
01 - OWASP Top 10 Web Application Security Exploit/013 Advantages of WAF (Web Application Firewall)_en.srt
28.6 kB
01 - OWASP Top 10 Web Application Security Exploit/010 Broken Authentication Attack_en.srt
21.9 kB
01 - OWASP Top 10 Web Application Security Exploit/005 Cross Site Scripting Attack_en.srt
18.5 kB
01 - OWASP Top 10 Web Application Security Exploit/009 Security Misconfiguration Attack_en.srt
17.8 kB
01 - OWASP Top 10 Web Application Security Exploit/001 SQL Injection Attack_en.srt
16.4 kB
01 - OWASP Top 10 Web Application Security Exploit/007 Hidden Field Manipulation Attack_en.srt
14.1 kB
[磁力链接]
添加时间:
2024-02-07
大小:
1.3 GB
最近下载:
2024-12-24
热度:
299
[ DevCourseWeb.com ] Udemy - Demystifying OWASP Top 10 Large Language Models
~Get Your Files Here !/3. Prompt Injection & Insecure Output Handling.mp4
30.5 MB
~Get Your Files Here !/2. Miscellaneous Topics.mp4
29.6 MB
~Get Your Files Here !/4. Training Data Poisoning & Model Denial Of Service.mp4
22.2 MB
~Get Your Files Here !/5. Supply Chain Vulnerabilities & Sensitive Information Disclosure.mp4
19.0 MB
~Get Your Files Here !/7. Over Reliance & Model Theft.mp4
18.1 MB
~Get Your Files Here !/6. Insecure Plugin Design & Excessive Agency.mp4
17.3 MB
~Get Your Files Here !/1. Introduction.mp4
5.6 MB
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
Get Bonus Downloads Here.url
182 Bytes
[磁力链接]
添加时间:
2024-02-03
大小:
142.2 MB
最近下载:
2025-01-02
热度:
681
[ DevCourseWeb.com ] Udemy - Owasp Top 10 - Access Control Vulnerabilities ~2023
~Get Your Files Here !/2 - Access Control/6 - Lab 5.mp4
142.9 MB
~Get Your Files Here !/2 - Access Control/4 - Lab 3.mp4
111.8 MB
~Get Your Files Here !/2 - Access Control/2 - Lab 1.mp4
107.6 MB
~Get Your Files Here !/2 - Access Control/8 - Lab 8.mp4
105.6 MB
~Get Your Files Here !/3 - Tools/12 - Burp Suite.mp4
78.7 MB
~Get Your Files Here !/2 - Access Control/10 - Lab 10.mp4
71.0 MB
~Get Your Files Here !/2 - Access Control/5 - Lab 4.mp4
67.4 MB
~Get Your Files Here !/2 - Access Control/9 - Lab 9.mp4
64.5 MB
~Get Your Files Here !/2 - Access Control/3 - Lab 2.mp4
60.9 MB
~Get Your Files Here !/2 - Access Control/11 - Lab 11.mp4
49.7 MB
~Get Your Files Here !/2 - Access Control/7 - Lab 7.mp4
43.1 MB
~Get Your Files Here !/4 - What the next/13 - Its me.mp4
30.4 MB
~Get Your Files Here !/1 - Introduction/1 - Introduction.html
3.2 kB
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
Get Bonus Downloads Here.url
182 Bytes
[磁力链接]
添加时间:
2024-01-02
大小:
933.5 MB
最近下载:
2024-12-30
热度:
1619
[ CourseMega.com ] Linkedin - OWASP Top 10 - #1 Broken Access Control and #2 Cryptographic Failures
~Get Your Files Here !/03 - 2. Cryptographic Failure/04 - Prevention techniques Data classification.mp4
9.3 MB
~Get Your Files Here !/01 - Introduction/01 - OWASP Top 10.mp4
8.6 MB
~Get Your Files Here !/02 - 1. Broken Access Control/04 - Prevention techniques Least privilege.mp4
8.5 MB
~Get Your Files Here !/03 - 2. Cryptographic Failure/06 - Prevention techniques Secure protocols.mp4
8.3 MB
~Get Your Files Here !/02 - 1. Broken Access Control/06 - Prevention techniques Functional access control testing.mp4
8.3 MB
~Get Your Files Here !/03 - 2. Cryptographic Failure/03 - Example 2 Using a broken or risky cryptographic algorithm.mp4
7.0 MB
~Get Your Files Here !/02 - 1. Broken Access Control/01 - What is broken access control.mp4
6.7 MB
~Get Your Files Here !/03 - 2. Cryptographic Failure/05 - Prevention techniques Proper key management.mp4
6.5 MB
~Get Your Files Here !/02 - 1. Broken Access Control/02 - Example 1 2021 Facebook broken access control vulnerability.mp4
6.5 MB
~Get Your Files Here !/02 - 1. Broken Access Control/05 - Prevention techniques Record ownership and logging.mp4
6.5 MB
~Get Your Files Here !/04 - Conclusion/01 - OWASP Top 10 keep learning.mp4
5.0 MB
~Get Your Files Here !/03 - 2. Cryptographic Failure/02 - Example 1 2021 GoDaddy plaintext passwords.mp4
4.9 MB
~Get Your Files Here !/03 - 2. Cryptographic Failure/01 - What is cryptographic failure.mp4
4.3 MB
~Get Your Files Here !/02 - 1. Broken Access Control/03 - Example 2 2021 personal data travel breach.mp4
3.2 MB
~Get Your Files Here !/03 - 2. Cryptographic Failure/04 - Prevention techniques Data classification.srt
6.3 kB
~Get Your Files Here !/02 - 1. Broken Access Control/04 - Prevention techniques Least privilege.srt
4.9 kB
~Get Your Files Here !/02 - 1. Broken Access Control/05 - Prevention techniques Record ownership and logging.srt
4.5 kB
~Get Your Files Here !/03 - 2. Cryptographic Failure/06 - Prevention techniques Secure protocols.srt
4.4 kB
~Get Your Files Here !/02 - 1. Broken Access Control/06 - Prevention techniques Functional access control testing.srt
4.3 kB
~Get Your Files Here !/03 - 2. Cryptographic Failure/05 - Prevention techniques Proper key management.srt
4.2 kB
[磁力链接]
添加时间:
2024-01-02
大小:
93.7 MB
最近下载:
2024-12-30
热度:
1138
[ DevCourseWeb.com ] Udemy - OWASP Mobile Top 10 - Vulnerabilities to Avoid
~Get Your Files Here !/2. Foundation Security Concepts/2. Addressing Risk.mp4
75.8 MB
~Get Your Files Here !/3. Insecure Authentication Authorization/4. Detection and Prevention.mp4
56.4 MB
~Get Your Files Here !/11. Insecure Data Storage/4. Detection and Prevention.mp4
56.3 MB
~Get Your Files Here !/2. Foundation Security Concepts/4. Encryption 101.mp4
51.7 MB
~Get Your Files Here !/9. Security Misconfiguration/4. Detection and Prevention.mp4
44.9 MB
~Get Your Files Here !/6. Inadequate Privacy Controls/4. Detection and Prevention.mp4
44.6 MB
~Get Your Files Here !/4. Insecure Communication/2. Describing the Vulnerability.mp4
44.4 MB
~Get Your Files Here !/8. Insufficient Input Output Validation/4. Detection and Prevention.mp4
44.1 MB
~Get Your Files Here !/10. Insufficient Cryptography/4. Detection and Prevention.mp4
42.4 MB
~Get Your Files Here !/6. Inadequate Privacy Controls/2. Describing the Vulnerability.mp4
41.8 MB
~Get Your Files Here !/9. Security Misconfiguration/2. Describing the Vulnerability.mp4
41.5 MB
~Get Your Files Here !/12. Insufficient Binary Protections/4. Detection and Prevention.mp4
40.3 MB
~Get Your Files Here !/7. Improper Credential Usage/2. Describing the Vulnerability.mp4
38.9 MB
~Get Your Files Here !/6. Inadequate Privacy Controls/3. Threat Modeling.mp4
37.8 MB
~Get Your Files Here !/7. Improper Credential Usage/4. Detection and Prevention.mp4
36.5 MB
~Get Your Files Here !/8. Insufficient Input Output Validation/2. Describing the Vulnerability.mp4
36.3 MB
~Get Your Files Here !/12. Insufficient Binary Protections/3. Threat Modeling.mp4
34.5 MB
~Get Your Files Here !/4. Insecure Communication/4. Detection and Prevention.mp4
34.0 MB
~Get Your Files Here !/5. Inadequate Supply Chain Security/4. Detection and Prevention.mp4
33.5 MB
~Get Your Files Here !/5. Inadequate Supply Chain Security/2. Describing the Vulnerability.mp4
31.5 MB
[磁力链接]
添加时间:
2023-12-31
大小:
1.4 GB
最近下载:
2025-01-02
热度:
1532
[ DevCourseWeb.com ] Owasp Api Security Top 10 - With Nodejs Code Samples
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/11 - Broken Object Property Level Authorization Identify Fix handson.mp4
202.1 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/9 - Broken Authentication Identify Fix handson.mp4
186.6 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/7 - Broken Object Level Authorization Identify Fix handson.mp4
181.4 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/21 - Security Misconfiguration Identify Fix hands on.mp4
130.3 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/5 - JSON Web Token Authentication Flow.mp4
129.8 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/17 - Unrestricted Access to Sensitive Business Flows Identify Fix handson.mp4
71.7 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/15 - Broken Function Level Authorization Identify Fix handson.mp4
56.7 MB
~Get Your Files Here !/1 - Introduction/2 - About OWASP.mp4
49.8 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/25 - Unsafe Consumption of APIs Identify Fix hands on.mp4
43.6 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/19 - Server Side Request Forgery SSRF Identify Fix hands on.mp4
41.4 MB
~Get Your Files Here !/1 - Introduction/3 - Sample handson Application Overview.mp4
32.3 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/23 - Improper Inventory Managment Identify Fix hands on.mp4
31.9 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/18 - Server Side Request Forgery SSRF Intro.mp4
16.2 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/20 - Security Misconfiguration Intro.mp4
16.0 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/14 - Broken Function Level Authorization Intro.mp4
14.7 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/24 - Unsafe Consumption of APIs Intro.mp4
14.2 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/12 - Unrestricted Resource Consumption Intro.mp4
13.9 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/16 - Unrestricted Access to Sensitive Business Flows Intro.mp4
13.4 MB
~Get Your Files Here !/1 - Introduction/1 - Welcome.mp4
12.2 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/8 - Broken Authentication.mp4
9.6 MB
[磁力链接]
添加时间:
2023-12-28
大小:
1.3 GB
最近下载:
2025-01-03
热度:
2343
[ DevCourseWeb.com ] Udemy - OWASP Top 10 - Protecting Against Threats and Vulnerabilities
~Get Your Files Here !/1. Introduction to Web Application Security/2. The Role of OWASP in Web Application Security.mp4
39.3 MB
~Get Your Files Here !/3. Secure Coding and Development/1. Principles of Secure Coding.mp4
38.6 MB
~Get Your Files Here !/3. Secure Coding and Development/2. OWASP Secure Coding Guidelines.mp4
36.3 MB
~Get Your Files Here !/1. Introduction to Web Application Security/1. Understanding the Importance of Web Application Security.mp4
31.5 MB
~Get Your Files Here !/8. Security in the SDLC/1. Integrating Security in the Software Development Lifecycle (SDLC).mp4
31.0 MB
~Get Your Files Here !/4. OWASP Tools and Resources/5. OWASP Resources and Documentation.mp4
30.6 MB
~Get Your Files Here !/7. Web Application Security Assessment/4. Reporting Security Findings.mp4
30.1 MB
~Get Your Files Here !/2. OWASP Top Ten/10. A9 Using Components with Known Vulnerabilities.mp4
30.1 MB
~Get Your Files Here !/7. Web Application Security Assessment/1. Introduction to Security Assessment.mp4
30.0 MB
~Get Your Files Here !/4. OWASP Tools and Resources/3. OWASP Application Security Verification Standard.mp4
29.9 MB
~Get Your Files Here !/5. Securing APIs and Web Services/1. API Security Challenges.mp4
28.9 MB
~Get Your Files Here !/2. OWASP Top Ten/1. Introduction to the OWASP Top Ten.mp4
28.8 MB
~Get Your Files Here !/6. Client-Side Security/2. OWASP Secure Coding Practices for JavaScript.mp4
28.3 MB
~Get Your Files Here !/7. Web Application Security Assessment/3. Manual and Automated Testing Techniques.mp4
28.2 MB
~Get Your Files Here !/2. OWASP Top Ten/7. A6 Security Misconfiguration.mp4
27.8 MB
~Get Your Files Here !/2. OWASP Top Ten/11. A10 Insufficient Logging and Monitoring.mp4
27.8 MB
~Get Your Files Here !/4. OWASP Tools and Resources/2. OWASP Web Security Testing Guide.mp4
27.7 MB
~Get Your Files Here !/5. Securing APIs and Web Services/4. Data Validation and Input Sanitization for APIs.mp4
27.6 MB
~Get Your Files Here !/3. Secure Coding and Development/4. Authentication and Session Management.mp4
26.8 MB
~Get Your Files Here !/5. Securing APIs and Web Services/3. Authentication and Authorization in APIs.mp4
26.7 MB
[磁力链接]
添加时间:
2023-12-27
大小:
1.1 GB
最近下载:
2025-01-02
热度:
1748
[ FreeCourseWeb.com ] Lynda - OWASP Top 10- #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring.zip
[ FreeCourseWeb.com ] Lynda - OWASP Top 10- #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring.zip
209.1 MB
[磁力链接]
添加时间:
2023-12-26
大小:
209.1 MB
最近下载:
2025-01-02
热度:
676
OWASP top 10 Web Application Security for beginners
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/02 - Finalised top 10 in 2017/003 Insufficient logging and monitoring - OWASP A102017.mp4
24.9 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/007 Security Misconfiguration.mp4
23.3 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/04 - Extra tips!/001 Defense in depth.mp4
17.5 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/011 Using Components with Known Vulnerabilities.mp4
15.3 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/001 Introduction OWASP top 10 (2017).mp4
14.9 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/003 Injection.mp4
14.5 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/04 - Extra tips!/003 Secure development processes.mp4
14.1 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/008 Sensitive Data Exposure.mp4
13.5 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/010 Cross-Site Request Forgery (CSRF).mp4
11.6 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/012 Underprotected APIs.mp4
10.9 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/004 Broken Authentication and Session management.mp4
10.8 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/03 - New in 2021/003 Software and Data Integrity Failures - OWASP A082021.mp4
10.3 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/02 - Finalised top 10 in 2017/001 XML external entities - OWASP A42017.mp4
9.5 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/02 - Finalised top 10 in 2017/002 Insecure deserialization - OWASP A82017.mp4
8.9 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/006 Broken Access Control.mp4
8.6 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/005 Cross-Site Scripting (XSS).mp4
8.5 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/04 - Extra tips!/001 NCCIC-ICS-CERT-Defense-in-Depth-2016-S508C.pdf
7.6 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/03 - New in 2021/002 Insecure Design - OWASP A042021.mp4
7.0 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/04 - Extra tips!/002 STRIDE.mp4
6.7 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/007 Holistic-Web-Application-Security-Visualization-for-Multi-Project-and-Multi-Phase-Dynamic-Application-Security-Test-Results.pdf
6.4 MB
[磁力链接]
添加时间:
2023-12-21
大小:
308.9 MB
最近下载:
2025-01-02
热度:
4386
[ FreeCourseWeb.com ] Cybrary - OWASP Top 10 - A1 - 2017 - Injection
~Get Your Files Here !/Module 1 Introduction/16 Hands-on Demo Owasp Top 10 Modules 1-2.mp4
83.5 MB
~Get Your Files Here !/Module 2 A12017-Injection/24 SQL Injections Demo Owasp Top 10 Modules 1-2.mp4
82.6 MB
~Get Your Files Here !/Module 2 A12017-Injection/22 Command Injection-SQL Injection Owasp Top 10 Modules 1-2.mp4
64.0 MB
~Get Your Files Here !/Module 2 A12017-Injection/23 Owasp Top 10 Modules 1-2.mp4
57.5 MB
~Get Your Files Here !/Module 1 Introduction/15 Using Intercepting Proxies in Web Application Security Testing Owasp Top 10 Modules 1-2.mp4
50.9 MB
~Get Your Files Here !/Module 1 Introduction/11 Introduction Owasp Top 10 Modules 1-2.mp4
45.1 MB
~Get Your Files Here !/Module 1 Introduction/13 The OWASP Top 10 Owasp Top 10 Modules 1-2.mp4
44.0 MB
~Get Your Files Here !/Module 2 A12017-Injection/21 Injection Flaws Owasp Top 10 Modules 1-2.mp4
40.9 MB
~Get Your Files Here !/Module 1 Introduction/12 An Introduction to OWASP Owasp Top 10 Modules 1-2.mp4
31.2 MB
~Get Your Files Here !/Module 1 Introduction/14 OWASP Web Security Testing Guide (WSTG) Owasp Top 10 Modules 1-2.mp4
28.0 MB
~Get Your Files Here !/Bonus Resources.txt
357 Bytes
Get Bonus Downloads Here.url
183 Bytes
[磁力链接]
添加时间:
2022-04-29
大小:
527.6 MB
最近下载:
2025-01-01
热度:
736
[ DevCourseWeb.com ] Udemy - Learn Web Application Security For Beginners- OWASP Top 10
~Get Your Files Here !/2. Blue vs Read Team (Optional)/3. Cyber Defense strategies(Blue Team).mp4
98.8 MB
~Get Your Files Here !/4. Penetration Testing/3. DVWA Setup.mp4
77.7 MB
~Get Your Files Here !/3. OWASP Top 10/3. A1 - Broken Access Control.mp4
77.7 MB
~Get Your Files Here !/3. OWASP Top 10/4. A2 - Cryptographic Failures.mp4
59.4 MB
~Get Your Files Here !/1. Introduction/3. Introduction to Penetration Testing.mp4
50.8 MB
~Get Your Files Here !/2. Blue vs Read Team (Optional)/1. Blue vs Red team Strategy.mp4
50.8 MB
~Get Your Files Here !/3. OWASP Top 10/11. A9 - Security Logging and Monitoring Failures.mp4
50.5 MB
~Get Your Files Here !/2. Blue vs Read Team (Optional)/2. Cyber attack Strategies(Red Team).mp4
49.1 MB
~Get Your Files Here !/3. OWASP Top 10/7. A5 - Security Misconfiguration.mp4
47.1 MB
~Get Your Files Here !/1. Introduction/2. Introduction to Application Security.mp4
45.4 MB
~Get Your Files Here !/4. Penetration Testing/4. SQL Injection.mp4
45.3 MB
~Get Your Files Here !/3. OWASP Top 10/10. A8 - Software and Data Integrity Failures.mp4
44.5 MB
~Get Your Files Here !/3. OWASP Top 10/9. A7 - Identification and Authentication Failures.mp4
43.8 MB
~Get Your Files Here !/4. Penetration Testing/6. Brute Force.mp4
43.2 MB
~Get Your Files Here !/3. OWASP Top 10/12. A10 - Server-Side Request Forgery.mp4
38.5 MB
~Get Your Files Here !/3. OWASP Top 10/8. A6 - Vulnerable and Outdated Components.mp4
34.2 MB
~Get Your Files Here !/3. OWASP Top 10/5. A3 - Injection.mp4
31.9 MB
~Get Your Files Here !/3. OWASP Top 10/2. The vulnerabilities in the The OWASP Top 10.mp4
31.0 MB
~Get Your Files Here !/3. OWASP Top 10/6. A4 - Insecure Design.mp4
30.3 MB
~Get Your Files Here !/4. Penetration Testing/5. SQL Injection (Medium).mp4
29.9 MB
[磁力链接]
添加时间:
2022-03-04
大小:
1.1 GB
最近下载:
2025-01-01
热度:
914
[ TutGator.com ] Cybrary - OWASP Top 10 - A10 - 2021-Server-Side Request Forgery (SSRF)
~Get Your Files Here !/6. Hands-on Demo Owasp Top 10 Modules 1-2.mp4
83.5 MB
~Get Your Files Here !/5. Using Intercepting Proxies in Web Application Security Testing Owasp Top 10 Modules 1-2.mp4
50.9 MB
~Get Your Files Here !/3. The OWASP Top 10 OWASP Top 10 2021 Update.mp4
50.6 MB
~Get Your Files Here !/9. Understanding and Testing for SSRF OWASP 2021.mp4
40.1 MB
~Get Your Files Here !/1. Introduction OWASP Top 10 2021 Update.mp4
38.5 MB
~Get Your Files Here !/2. An Introduction to OWASP Owasp Top 10 Modules 1-2.mp4
31.2 MB
~Get Your Files Here !/10. SSRF Demo OWASP 2021.mp4
30.9 MB
~Get Your Files Here !/4. OWASP Web Security Testing Guide (WSTG) Owasp Top 10 Modules 1-2.mp4
28.0 MB
~Get Your Files Here !/8. Server-Side Request Forgery OWASP 2021.mp4
18.9 MB
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
Get Bonus Downloads Here.url
178 Bytes
[磁力链接]
添加时间:
2022-02-10
大小:
372.4 MB
最近下载:
2025-01-01
热度:
1107
OWASP Top 10- API Security Playbook
08. Security Misconfiguration/02. Common Security Misconfigurations.mp4
10.4 MB
09. Injection/03. Injection Defenses.mp4
10.4 MB
10. Improper Assets Management/01. Attacks on Improper Asset Management.mp4
9.6 MB
01. Using the OWASP API Top 10/00. Goals of the API Top 10.mp4
8.4 MB
08. Security Misconfiguration/01. Understanding a Vulnerable CORS Implementation.mp4
8.3 MB
08. Security Misconfiguration/00. Overview.mp4
8.0 MB
09. Injection/01. Attacking Injection Vulnerabilities.mp4
8.0 MB
03. Broken User Authentication/00. Understanding Broken Authorization.mp4
7.6 MB
06. Broken Function Level Authorization/01. Attacks on Function Level Authorization.mp4
7.6 MB
02. Broken Object Level Authorization/01. Attacking Broken Object Level Authorization.mp4
7.6 MB
05. Lack of Resource and Rate Limiting/03. Rate Limiting Defenses.mp4
6.4 MB
10. Improper Assets Management/02. Defending Your Assets.mp4
6.0 MB
05. Lack of Resource and Rate Limiting/01. Attacks on Rate Limiting Vulnerabilities.mp4
6.0 MB
01. Using the OWASP API Top 10/01. Vulnerability Risk Factors.mp4
5.9 MB
04. Excessive Data Exposure/00. Overview.mp4
5.8 MB
03. Broken User Authentication/03. Common JWT Failures.mp4
5.5 MB
11. Insufficient Logging and Monitoring/02. Logging and Monitoring for Defense.mp4
5.2 MB
09. Injection/02. Injection Risks.mp4
5.1 MB
04. Excessive Data Exposure/01. Attacking Excessive Data Exposure.mp4
5.1 MB
07. Mass Assignment/01. Attacking Mass Assignment Vulnerabilities.mp4
5.0 MB
[磁力链接]
添加时间:
2022-02-04
大小:
210.1 MB
最近下载:
2024-12-28
热度:
1646
[ FreeCourseWeb.com ] EC-Council - OWASP Top 10 Security Fundamentals
~Get Your Files Here !/Chapter 4 Sensitive Data Exposure/12. Mitigation .mp4
162.0 MB
~Get Your Files Here !/Chapter 9 Insecure Deserialization/26. Exploitation .mp4
159.6 MB
~Get Your Files Here !/Chapter 7 Security Misconfiguration/21. Mitigation .mp4
151.5 MB
~Get Your Files Here !/Chapter 6 Broken Access Control/18. Mitigation .mp4
135.5 MB
~Get Your Files Here !/Chapter 10 Using Components with Known Vulnerabilities/30. Mitigation .mp4
134.0 MB
~Get Your Files Here !/Chapter 2 Injection Flaws/5. Exploitation .mp4
128.3 MB
~Get Your Files Here !/Chapter 10 Using Components with Known Vulnerabilities/29. Exploitation .mp4
126.8 MB
~Get Your Files Here !/Chapter 4 Sensitive Data Exposure/11. Exploitation .mp4
125.1 MB
~Get Your Files Here !/Chapter 3 Broken Authentication/9. Mitigation .mp4
125.0 MB
~Get Your Files Here !/Chapter 8 Cross-Site Scripting (XSS)/23. Exploitation .mp4
118.9 MB
~Get Your Files Here !/Chapter 7 Security Misconfiguration/20. Exploitation .mp4
115.3 MB
~Get Your Files Here !/Chapter 1 World Wide Web Fundamentals/3. How the World Wide Web Works- .mp4
113.1 MB
~Get Your Files Here !/Chapter 6 Broken Access Control/17. Exploitation .mp4
111.8 MB
~Get Your Files Here !/Chapter 11 Insufficient Logging & Monitoring/33. Mitigation .mp4
109.4 MB
~Get Your Files Here !/Chapter 11 Insufficient Logging & Monitoring/32. Exploitation .mp4
105.4 MB
~Get Your Files Here !/Chapter 8 Cross-Site Scripting (XSS)/24. Mitigation .mp4
93.5 MB
~Get Your Files Here !/Chapter 8 Cross-Site Scripting (XSS)/22. Threat Analysis .mp4
92.6 MB
~Get Your Files Here !/Chapter 2 Injection Flaws/4. Threat Analysis .mp4
92.5 MB
~Get Your Files Here !/Chapter 5 XML External Entities (XXE)/15. Mitigation .mp4
90.0 MB
~Get Your Files Here !/Chapter 2 Injection Flaws/6. Mitigation .mp4
85.3 MB
[磁力链接]
添加时间:
2022-02-01
大小:
3.1 GB
最近下载:
2025-01-01
热度:
1922
共2页
上一页
1
2
下一页