搜索
为您找到约
68
个磁力链接/BT种子,耗时 0 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
[ FreeCourseWeb.com ] PluralSight - Automate Web Application Scans with OWASP ZAP and Python.zip
[ FreeCourseWeb.com ] PluralSight - Automate Web Application Scans with OWASP ZAP and Python.zip
141.8 MB
[磁力链接]
添加时间:
2022-02-27
大小:
141.8 MB
最近下载:
2025-02-27
热度:
1883
[ DevCourseWeb.com ] Udemy - Learn Web Application Security For Beginners- OWASP Top 10
~Get Your Files Here !/2. Blue vs Read Team (Optional)/3. Cyber Defense strategies(Blue Team).mp4
98.8 MB
~Get Your Files Here !/4. Penetration Testing/3. DVWA Setup.mp4
77.7 MB
~Get Your Files Here !/3. OWASP Top 10/3. A1 - Broken Access Control.mp4
77.7 MB
~Get Your Files Here !/3. OWASP Top 10/4. A2 - Cryptographic Failures.mp4
59.4 MB
~Get Your Files Here !/1. Introduction/3. Introduction to Penetration Testing.mp4
50.8 MB
~Get Your Files Here !/2. Blue vs Read Team (Optional)/1. Blue vs Red team Strategy.mp4
50.8 MB
~Get Your Files Here !/3. OWASP Top 10/11. A9 - Security Logging and Monitoring Failures.mp4
50.5 MB
~Get Your Files Here !/2. Blue vs Read Team (Optional)/2. Cyber attack Strategies(Red Team).mp4
49.1 MB
~Get Your Files Here !/3. OWASP Top 10/7. A5 - Security Misconfiguration.mp4
47.1 MB
~Get Your Files Here !/1. Introduction/2. Introduction to Application Security.mp4
45.4 MB
~Get Your Files Here !/4. Penetration Testing/4. SQL Injection.mp4
45.3 MB
~Get Your Files Here !/3. OWASP Top 10/10. A8 - Software and Data Integrity Failures.mp4
44.5 MB
~Get Your Files Here !/3. OWASP Top 10/9. A7 - Identification and Authentication Failures.mp4
43.8 MB
~Get Your Files Here !/4. Penetration Testing/6. Brute Force.mp4
43.2 MB
~Get Your Files Here !/3. OWASP Top 10/12. A10 - Server-Side Request Forgery.mp4
38.5 MB
~Get Your Files Here !/3. OWASP Top 10/8. A6 - Vulnerable and Outdated Components.mp4
34.2 MB
~Get Your Files Here !/3. OWASP Top 10/5. A3 - Injection.mp4
31.9 MB
~Get Your Files Here !/3. OWASP Top 10/2. The vulnerabilities in the The OWASP Top 10.mp4
31.0 MB
~Get Your Files Here !/3. OWASP Top 10/6. A4 - Insecure Design.mp4
30.3 MB
~Get Your Files Here !/4. Penetration Testing/5. SQL Injection (Medium).mp4
29.9 MB
[磁力链接]
添加时间:
2022-03-04
大小:
1.1 GB
最近下载:
2025-02-27
热度:
926
[ FreeCourseWeb.com ] Cybrary - OWASP Top 10 - A1 - 2017 - Injection
~Get Your Files Here !/Module 1 Introduction/16 Hands-on Demo Owasp Top 10 Modules 1-2.mp4
83.5 MB
~Get Your Files Here !/Module 2 A12017-Injection/24 SQL Injections Demo Owasp Top 10 Modules 1-2.mp4
82.6 MB
~Get Your Files Here !/Module 2 A12017-Injection/22 Command Injection-SQL Injection Owasp Top 10 Modules 1-2.mp4
64.0 MB
~Get Your Files Here !/Module 2 A12017-Injection/23 Owasp Top 10 Modules 1-2.mp4
57.5 MB
~Get Your Files Here !/Module 1 Introduction/15 Using Intercepting Proxies in Web Application Security Testing Owasp Top 10 Modules 1-2.mp4
50.9 MB
~Get Your Files Here !/Module 1 Introduction/11 Introduction Owasp Top 10 Modules 1-2.mp4
45.1 MB
~Get Your Files Here !/Module 1 Introduction/13 The OWASP Top 10 Owasp Top 10 Modules 1-2.mp4
44.0 MB
~Get Your Files Here !/Module 2 A12017-Injection/21 Injection Flaws Owasp Top 10 Modules 1-2.mp4
40.9 MB
~Get Your Files Here !/Module 1 Introduction/12 An Introduction to OWASP Owasp Top 10 Modules 1-2.mp4
31.2 MB
~Get Your Files Here !/Module 1 Introduction/14 OWASP Web Security Testing Guide (WSTG) Owasp Top 10 Modules 1-2.mp4
28.0 MB
~Get Your Files Here !/Bonus Resources.txt
357 Bytes
Get Bonus Downloads Here.url
183 Bytes
[磁力链接]
添加时间:
2022-04-29
大小:
527.6 MB
最近下载:
2025-03-02
热度:
800
Secure Coding with OWASP in C# 10
02. Introduction to Secure Coding/7. Demo- OWASP Website.mp4
26.2 MB
03. Broken Access Control/5. Demo- Implementing ASP.NET Core Identity.mp4
23.3 MB
02. Introduction to Secure Coding/4. Building Secure Software.mp4
21.3 MB
10. Security Logging and Monitoring Failures/2. Demo- Security Logging and Monitoring Failures.mp4
20.6 MB
05. Injection/2. Demo- Injection Examples.mp4
18.0 MB
10. Security Logging and Monitoring Failures/1. Security Logging and Monitoring Failures.mp4
17.4 MB
02. Introduction to Secure Coding/5. The Open Web Application Security Project.mp4
16.6 MB
03. Broken Access Control/3. OWASP Recommendations.mp4
16.2 MB
11. Server-side Request Forgery (SSRF)/2. Demo- Two SSRF Attacks.mp4
16.0 MB
02. Introduction to Secure Coding/6. Application Security Verification Standard.mp4
15.9 MB
08. Vulnerable and Outdated Components/2. Demo- Component Management.mp4
12.8 MB
04. Cryptographic Failures/4. Secure HTTP Headers.mp4
12.1 MB
09. Identification and Authentication Failures/2. Demo- Brute-force Attack.mp4
10.3 MB
04. Cryptographic Failures/1. Cryptographic Failures.mp4
9.1 MB
05. Injection/3. Injection Flaws Remediation.mp4
9.1 MB
04. Cryptographic Failures/3. Cryptographic Failure Remediation.mp4
9.1 MB
03. Broken Access Control/4. ASP.NET Core Identity Implementation.mp4
8.5 MB
07. Security Misconfiguration/6. Demo- XML External Entities.mp4
7.6 MB
c-sharp-10-
owasp
-secure-coding.zip
7.6 MB
05. Injection/1. Injections.mp4
7.2 MB
[磁力链接]
添加时间:
2023-12-20
大小:
414.2 MB
最近下载:
2025-03-01
热度:
4049
OWASP top 10 Web Application Security for beginners
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/02 - Finalised top 10 in 2017/003 Insufficient logging and monitoring - OWASP A102017.mp4
24.9 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/007 Security Misconfiguration.mp4
23.3 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/04 - Extra tips!/001 Defense in depth.mp4
17.5 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/011 Using Components with Known Vulnerabilities.mp4
15.3 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/001 Introduction OWASP top 10 (2017).mp4
14.9 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/003 Injection.mp4
14.5 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/04 - Extra tips!/003 Secure development processes.mp4
14.1 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/008 Sensitive Data Exposure.mp4
13.5 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/010 Cross-Site Request Forgery (CSRF).mp4
11.6 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/012 Underprotected APIs.mp4
10.9 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/004 Broken Authentication and Session management.mp4
10.8 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/03 - New in 2021/003 Software and Data Integrity Failures - OWASP A082021.mp4
10.3 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/02 - Finalised top 10 in 2017/001 XML external entities - OWASP A42017.mp4
9.5 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/02 - Finalised top 10 in 2017/002 Insecure deserialization - OWASP A82017.mp4
8.9 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/006 Broken Access Control.mp4
8.6 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/005 Cross-Site Scripting (XSS).mp4
8.5 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/04 - Extra tips!/001 NCCIC-ICS-CERT-Defense-in-Depth-2016-S508C.pdf
7.6 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/03 - New in 2021/002 Insecure Design - OWASP A042021.mp4
7.0 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/04 - Extra tips!/002 STRIDE.mp4
6.7 MB
[TutsNode.net] - OWASP top 10 Web Application Security for beginners/01 - OWASP Top 10 Most Critical Web Application Security Risks/007 Holistic-Web-Application-Security-Visualization-for-Multi-Project-and-Multi-Phase-Dynamic-Application-Security-Test-Results.pdf
6.4 MB
[磁力链接]
添加时间:
2023-12-21
大小:
308.9 MB
最近下载:
2025-03-02
热度:
4717
[ FreeCourseWeb.com ] Lynda - OWASP Top 10- #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring.zip
[ FreeCourseWeb.com ] Lynda - OWASP Top 10- #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring.zip
209.1 MB
[磁力链接]
添加时间:
2023-12-26
大小:
209.1 MB
最近下载:
2025-02-22
热度:
699
[ CourseWikia.com ] PluralSight - Secure Coding with OWASP in React 18
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/2. Reflected Cross-site Scripting.mp4
14.2 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/03. Cross-site Request Forgery.mp4
11.6 MB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/3. Stored Cross-site Scripting.mp4
10.3 MB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/1. Intro.mp4
9.4 MB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/5. Credit Card Theft.mp4
8.9 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/02. View Source.mp4
8.1 MB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/4. Cookie Theft Cross-site Scripting.mp4
8.1 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/07. Lazy Loading.mp4
7.3 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/05. Insecure Client-side Logging.mp4
6.4 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/04. Handling Raw Data.mp4
5.8 MB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/6. Site Defacement.mp4
5.3 MB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/7. Form Action Overriding.mp4
5.2 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/10. Summary.mp4
5.0 MB
~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4
4.9 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/01. Intro.mp4
4.8 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/08. Server-side Rendering.mp4
4.8 MB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/8. Summary.mp4
4.6 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/11. Course Summary.mp4
4.5 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/09. The Zip Slip Attack.mp4
4.0 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/06. Insecure Native Dom Access.mp4
2.0 MB
[磁力链接]
添加时间:
2023-12-27
大小:
135.3 MB
最近下载:
2025-02-21
热度:
708
[ DevCourseWeb.com ] Udemy - OWASP Top 10 - Protecting Against Threats and Vulnerabilities
~Get Your Files Here !/1. Introduction to Web Application Security/2. The Role of OWASP in Web Application Security.mp4
39.3 MB
~Get Your Files Here !/3. Secure Coding and Development/1. Principles of Secure Coding.mp4
38.6 MB
~Get Your Files Here !/3. Secure Coding and Development/2. OWASP Secure Coding Guidelines.mp4
36.3 MB
~Get Your Files Here !/1. Introduction to Web Application Security/1. Understanding the Importance of Web Application Security.mp4
31.5 MB
~Get Your Files Here !/8. Security in the SDLC/1. Integrating Security in the Software Development Lifecycle (SDLC).mp4
31.0 MB
~Get Your Files Here !/4. OWASP Tools and Resources/5. OWASP Resources and Documentation.mp4
30.6 MB
~Get Your Files Here !/7. Web Application Security Assessment/4. Reporting Security Findings.mp4
30.1 MB
~Get Your Files Here !/2. OWASP Top Ten/10. A9 Using Components with Known Vulnerabilities.mp4
30.1 MB
~Get Your Files Here !/7. Web Application Security Assessment/1. Introduction to Security Assessment.mp4
30.0 MB
~Get Your Files Here !/4. OWASP Tools and Resources/3. OWASP Application Security Verification Standard.mp4
29.9 MB
~Get Your Files Here !/5. Securing APIs and Web Services/1. API Security Challenges.mp4
28.9 MB
~Get Your Files Here !/2. OWASP Top Ten/1. Introduction to the OWASP Top Ten.mp4
28.8 MB
~Get Your Files Here !/6. Client-Side Security/2. OWASP Secure Coding Practices for JavaScript.mp4
28.3 MB
~Get Your Files Here !/7. Web Application Security Assessment/3. Manual and Automated Testing Techniques.mp4
28.2 MB
~Get Your Files Here !/2. OWASP Top Ten/7. A6 Security Misconfiguration.mp4
27.8 MB
~Get Your Files Here !/2. OWASP Top Ten/11. A10 Insufficient Logging and Monitoring.mp4
27.8 MB
~Get Your Files Here !/4. OWASP Tools and Resources/2. OWASP Web Security Testing Guide.mp4
27.7 MB
~Get Your Files Here !/5. Securing APIs and Web Services/4. Data Validation and Input Sanitization for APIs.mp4
27.6 MB
~Get Your Files Here !/3. Secure Coding and Development/4. Authentication and Session Management.mp4
26.8 MB
~Get Your Files Here !/5. Securing APIs and Web Services/3. Authentication and Authorization in APIs.mp4
26.7 MB
[磁力链接]
添加时间:
2023-12-27
大小:
1.1 GB
最近下载:
2025-02-21
热度:
1794
[ DevCourseWeb.com ] Owasp Api Security Top 10 - With Nodejs Code Samples
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/11 - Broken Object Property Level Authorization Identify Fix handson.mp4
202.1 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/9 - Broken Authentication Identify Fix handson.mp4
186.6 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/7 - Broken Object Level Authorization Identify Fix handson.mp4
181.4 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/21 - Security Misconfiguration Identify Fix hands on.mp4
130.3 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/5 - JSON Web Token Authentication Flow.mp4
129.8 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/17 - Unrestricted Access to Sensitive Business Flows Identify Fix handson.mp4
71.7 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/15 - Broken Function Level Authorization Identify Fix handson.mp4
56.7 MB
~Get Your Files Here !/1 - Introduction/2 - About OWASP.mp4
49.8 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/25 - Unsafe Consumption of APIs Identify Fix hands on.mp4
43.6 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/19 - Server Side Request Forgery SSRF Identify Fix hands on.mp4
41.4 MB
~Get Your Files Here !/1 - Introduction/3 - Sample handson Application Overview.mp4
32.3 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/23 - Improper Inventory Managment Identify Fix hands on.mp4
31.9 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/18 - Server Side Request Forgery SSRF Intro.mp4
16.2 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/20 - Security Misconfiguration Intro.mp4
16.0 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/14 - Broken Function Level Authorization Intro.mp4
14.7 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/24 - Unsafe Consumption of APIs Intro.mp4
14.2 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/12 - Unrestricted Resource Consumption Intro.mp4
13.9 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/16 - Unrestricted Access to Sensitive Business Flows Intro.mp4
13.4 MB
~Get Your Files Here !/1 - Introduction/1 - Welcome.mp4
12.2 MB
~Get Your Files Here !/2 - OWASP API Security Top 10 Risks 2023/8 - Broken Authentication.mp4
9.6 MB
[磁力链接]
添加时间:
2023-12-28
大小:
1.3 GB
最近下载:
2025-03-01
热度:
2624
[ CourseWikia.com ] PluralSight - Secure Coding with OWASP in Angular
~Get Your Files Here !/3. Managing Authentication and Identity/4. Demo - Adding Authentication.mp4
17.2 MB
~Get Your Files Here !/2. Introduction to Secure Coding/4. Demo - OWASP Top Ten.mp4
15.4 MB
~Get Your Files Here !/2. Introduction to Secure Coding/5. Key OWASP Projects.mp4
14.6 MB
~Get Your Files Here !/4. Managing Sessions/6. Demo - XSRF Protection.mp4
14.1 MB
~Get Your Files Here !/6. Creating Dynamic Views/5. Demo - Bypassing Automatic Sanitization.mp4
13.0 MB
~Get Your Files Here !/6. Creating Dynamic Views/2. Sanitizing Displayed Values.mp4
12.2 MB
~Get Your Files Here !/7. Managing Conditional View Elements/3. Demo - Limit Access to Views.mp4
12.2 MB
~Get Your Files Here !/2. Introduction to Secure Coding/1. About This Course.mp4
12.0 MB
~Get Your Files Here !/8. Protecting Routes/4. Demo - Route Guards.mp4
11.5 MB
~Get Your Files Here !/4. Managing Sessions/3. Demo - Session Expiration.mp4
10.5 MB
~Get Your Files Here !/2. Introduction to Secure Coding/3. OWASP Top Ten.mp4
9.9 MB
~Get Your Files Here !/9. Calling APIs/4. Demo - Authorization Header Interceptor.mp4
9.2 MB
~Get Your Files Here !/5. Handling Inputs and Outputs/5. Demos - Custom Validators.mp4
9.2 MB
~Get Your Files Here !/6. Creating Dynamic Views/7. Demo - Explicit Sanitization.mp4
8.8 MB
~Get Your Files Here !/10. Managing Dependencies/2. Vulnerable and Outdated Components.mp4
8.2 MB
~Get Your Files Here !/6. Creating Dynamic Views/3. Demo - Property Binding and Safe Markup.mp4
8.1 MB
~Get Your Files Here !/9. Calling APIs/3. API Access and Interceptors.mp4
7.7 MB
~Get Your Files Here !/8. Protecting Routes/2. Route Architecture.mp4
7.7 MB
~Get Your Files Here !/4. Managing Sessions/4. Protecting Sessions.mp4
7.5 MB
~Get Your Files Here !/5. Handling Inputs and Outputs/3. Demo - Escaping Displayed Values.mp4
7.4 MB
[磁力链接]
添加时间:
2023-12-29
大小:
373.2 MB
最近下载:
2025-02-28
热度:
1745
OWASP
OWASP Local Chapters Highlights/OWASP Kerala Meet Sep 2014.mp4
170.0 MB
AppSecUSA 2018/OWASP Leaders Workshop - Part 2.mp4
150.8 MB
OWASP Online Meetups 2021/Into to ITRDC.ORG . - Behind the Scenes with BayCyber.mp4
150.0 MB
AppSec California 2017/Panel - Women in Security.mp4
137.9 MB
AppSec California 2017/David Caissy.mp4
135.2 MB
AppSec California 2017/Kevin Cardwell.mp4
134.9 MB
AppSec California 2016/Panel - Women in Security - Lisa Napier - Wei Lin - Emily Stark - Caroline Wong.mp4
129.6 MB
OWASP AppSec Virtual 2020/Keynote Presentation - Software Defined Security Governance - John Steven.mp4
128.3 MB
AppSec California 2017/Marc Bütikofer.mp4
128.1 MB
AppSec California 2017/Justin Mayer.mp4
127.5 MB
AppSec California 2017/Jared Haight.mp4
125.1 MB
AppSec California 2017/Gary McGraw Ph.D.mp4
124.1 MB
AppSec California 2017/Chris Roberts.mp4
123.7 MB
AppSec California 2015/Threat Modeling for the Gaming Industry - Robert Wood.mp4
122.2 MB
AppSec California 2017/Pedro Fortuna.mp4
120.7 MB
AppSec California 2017/Yan.mp4
120.3 MB
AppSec California 2017/Matt Tesauro.mp4
119.3 MB
AppSec California 2017/Dan Cornell.mp4
119.0 MB
AppSec California 2017/Caroline Wong.mp4
118.0 MB
AppSecUSA 2014/Keynote - Gary McGraw - BSIMM - A Decade of Software Security.mp4
117.8 MB
[磁力链接]
添加时间:
2023-12-29
大小:
65.6 GB
最近下载:
2025-02-28
热度:
1699
[ DevCourseWeb.com ] Udemy - OWASP Mobile Top 10 - Vulnerabilities to Avoid
~Get Your Files Here !/2. Foundation Security Concepts/2. Addressing Risk.mp4
75.8 MB
~Get Your Files Here !/3. Insecure Authentication Authorization/4. Detection and Prevention.mp4
56.4 MB
~Get Your Files Here !/11. Insecure Data Storage/4. Detection and Prevention.mp4
56.3 MB
~Get Your Files Here !/2. Foundation Security Concepts/4. Encryption 101.mp4
51.7 MB
~Get Your Files Here !/9. Security Misconfiguration/4. Detection and Prevention.mp4
44.9 MB
~Get Your Files Here !/6. Inadequate Privacy Controls/4. Detection and Prevention.mp4
44.6 MB
~Get Your Files Here !/4. Insecure Communication/2. Describing the Vulnerability.mp4
44.4 MB
~Get Your Files Here !/8. Insufficient Input Output Validation/4. Detection and Prevention.mp4
44.1 MB
~Get Your Files Here !/10. Insufficient Cryptography/4. Detection and Prevention.mp4
42.4 MB
~Get Your Files Here !/6. Inadequate Privacy Controls/2. Describing the Vulnerability.mp4
41.8 MB
~Get Your Files Here !/9. Security Misconfiguration/2. Describing the Vulnerability.mp4
41.5 MB
~Get Your Files Here !/12. Insufficient Binary Protections/4. Detection and Prevention.mp4
40.3 MB
~Get Your Files Here !/7. Improper Credential Usage/2. Describing the Vulnerability.mp4
38.9 MB
~Get Your Files Here !/6. Inadequate Privacy Controls/3. Threat Modeling.mp4
37.8 MB
~Get Your Files Here !/7. Improper Credential Usage/4. Detection and Prevention.mp4
36.5 MB
~Get Your Files Here !/8. Insufficient Input Output Validation/2. Describing the Vulnerability.mp4
36.3 MB
~Get Your Files Here !/12. Insufficient Binary Protections/3. Threat Modeling.mp4
34.5 MB
~Get Your Files Here !/4. Insecure Communication/4. Detection and Prevention.mp4
34.0 MB
~Get Your Files Here !/5. Inadequate Supply Chain Security/4. Detection and Prevention.mp4
33.5 MB
~Get Your Files Here !/5. Inadequate Supply Chain Security/2. Describing the Vulnerability.mp4
31.5 MB
[磁力链接]
添加时间:
2023-12-31
大小:
1.4 GB
最近下载:
2025-02-28
热度:
1594
[ CourseMega.com ] Linkedin - OWASP Top 10 - #1 Broken Access Control and #2 Cryptographic Failures
~Get Your Files Here !/03 - 2. Cryptographic Failure/04 - Prevention techniques Data classification.mp4
9.3 MB
~Get Your Files Here !/01 - Introduction/01 - OWASP Top 10.mp4
8.6 MB
~Get Your Files Here !/02 - 1. Broken Access Control/04 - Prevention techniques Least privilege.mp4
8.5 MB
~Get Your Files Here !/03 - 2. Cryptographic Failure/06 - Prevention techniques Secure protocols.mp4
8.3 MB
~Get Your Files Here !/02 - 1. Broken Access Control/06 - Prevention techniques Functional access control testing.mp4
8.3 MB
~Get Your Files Here !/03 - 2. Cryptographic Failure/03 - Example 2 Using a broken or risky cryptographic algorithm.mp4
7.0 MB
~Get Your Files Here !/02 - 1. Broken Access Control/01 - What is broken access control.mp4
6.7 MB
~Get Your Files Here !/03 - 2. Cryptographic Failure/05 - Prevention techniques Proper key management.mp4
6.5 MB
~Get Your Files Here !/02 - 1. Broken Access Control/02 - Example 1 2021 Facebook broken access control vulnerability.mp4
6.5 MB
~Get Your Files Here !/02 - 1. Broken Access Control/05 - Prevention techniques Record ownership and logging.mp4
6.5 MB
~Get Your Files Here !/04 - Conclusion/01 - OWASP Top 10 keep learning.mp4
5.0 MB
~Get Your Files Here !/03 - 2. Cryptographic Failure/02 - Example 1 2021 GoDaddy plaintext passwords.mp4
4.9 MB
~Get Your Files Here !/03 - 2. Cryptographic Failure/01 - What is cryptographic failure.mp4
4.3 MB
~Get Your Files Here !/02 - 1. Broken Access Control/03 - Example 2 2021 personal data travel breach.mp4
3.2 MB
~Get Your Files Here !/03 - 2. Cryptographic Failure/04 - Prevention techniques Data classification.srt
6.3 kB
~Get Your Files Here !/02 - 1. Broken Access Control/04 - Prevention techniques Least privilege.srt
4.9 kB
~Get Your Files Here !/02 - 1. Broken Access Control/05 - Prevention techniques Record ownership and logging.srt
4.5 kB
~Get Your Files Here !/03 - 2. Cryptographic Failure/06 - Prevention techniques Secure protocols.srt
4.4 kB
~Get Your Files Here !/02 - 1. Broken Access Control/06 - Prevention techniques Functional access control testing.srt
4.3 kB
~Get Your Files Here !/03 - 2. Cryptographic Failure/05 - Prevention techniques Proper key management.srt
4.2 kB
[磁力链接]
添加时间:
2024-01-02
大小:
93.7 MB
最近下载:
2025-03-01
热度:
1221
[ DevCourseWeb.com ] Udemy - Owasp Top 10 - Access Control Vulnerabilities ~2023
~Get Your Files Here !/2 - Access Control/6 - Lab 5.mp4
142.9 MB
~Get Your Files Here !/2 - Access Control/4 - Lab 3.mp4
111.8 MB
~Get Your Files Here !/2 - Access Control/2 - Lab 1.mp4
107.6 MB
~Get Your Files Here !/2 - Access Control/8 - Lab 8.mp4
105.6 MB
~Get Your Files Here !/3 - Tools/12 - Burp Suite.mp4
78.7 MB
~Get Your Files Here !/2 - Access Control/10 - Lab 10.mp4
71.0 MB
~Get Your Files Here !/2 - Access Control/5 - Lab 4.mp4
67.4 MB
~Get Your Files Here !/2 - Access Control/9 - Lab 9.mp4
64.5 MB
~Get Your Files Here !/2 - Access Control/3 - Lab 2.mp4
60.9 MB
~Get Your Files Here !/2 - Access Control/11 - Lab 11.mp4
49.7 MB
~Get Your Files Here !/2 - Access Control/7 - Lab 7.mp4
43.1 MB
~Get Your Files Here !/4 - What the next/13 - Its me.mp4
30.4 MB
~Get Your Files Here !/1 - Introduction/1 - Introduction.html
3.2 kB
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
Get Bonus Downloads Here.url
182 Bytes
[磁力链接]
添加时间:
2024-01-02
大小:
933.5 MB
最近下载:
2025-03-01
热度:
1677
[ DevCourseWeb.com ] Udemy - Demystifying OWASP Top 10 Large Language Models
~Get Your Files Here !/3. Prompt Injection & Insecure Output Handling.mp4
30.5 MB
~Get Your Files Here !/2. Miscellaneous Topics.mp4
29.6 MB
~Get Your Files Here !/4. Training Data Poisoning & Model Denial Of Service.mp4
22.2 MB
~Get Your Files Here !/5. Supply Chain Vulnerabilities & Sensitive Information Disclosure.mp4
19.0 MB
~Get Your Files Here !/7. Over Reliance & Model Theft.mp4
18.1 MB
~Get Your Files Here !/6. Insecure Plugin Design & Excessive Agency.mp4
17.3 MB
~Get Your Files Here !/1. Introduction.mp4
5.6 MB
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
Get Bonus Downloads Here.url
182 Bytes
[磁力链接]
添加时间:
2024-02-03
大小:
142.2 MB
最近下载:
2025-02-28
热度:
861
[ FreeCourseWeb.com ] PluralSight - Reconnaissance with OWASP Amass
~Get Your Files Here !/02. Enumerating Domains and IPs with OWASP Amass/03. Enumerating Domains with Amass.mp4
14.2 MB
~Get Your Files Here !/02. Enumerating Domains and IPs with OWASP Amass/02. Understanding Amass and Advanced Domain Enumeration.mp4
9.8 MB
~Get Your Files Here !/02. Enumerating Domains and IPs with OWASP Amass/04. Visualizing the Enumerated Data.mp4
4.6 MB
~Get Your Files Here !/01. Course Overview Tool Introduction/01. Course Overview.mp4
2.9 MB
~Get Your Files Here !/03. Resources/05. More Information.mp4
2.7 MB
~Get Your Files Here !/Exercise Files/02/enumerating-domains-and-ips-with-
owasp
-amass-slides.pdf
575.3 kB
~Get Your Files Here !/Exercise Files/03/resources-slides.pdf
575.3 kB
~Get Your Files Here !/Bonus Resources.txt
357 Bytes
Get Bonus Downloads Here.url
183 Bytes
[磁力链接]
添加时间:
2024-02-07
大小:
35.3 MB
最近下载:
2025-01-18
热度:
836
OWASP Top 10 Web Application Security Exploit for beginners
01 - OWASP Top 10 Web Application Security Exploit/002 Components of Web Application.mp4
214.6 MB
01 - OWASP Top 10 Web Application Security Exploit/013 Advantages of WAF (Web Application Firewall).mp4
156.0 MB
01 - OWASP Top 10 Web Application Security Exploit/010 Broken Authentication Attack.mp4
125.7 MB
01 - OWASP Top 10 Web Application Security Exploit/009 Security Misconfiguration Attack.mp4
118.3 MB
01 - OWASP Top 10 Web Application Security Exploit/005 Cross Site Scripting Attack.mp4
118.2 MB
01 - OWASP Top 10 Web Application Security Exploit/001 SQL Injection Attack.mp4
109.5 MB
01 - OWASP Top 10 Web Application Security Exploit/007 Hidden Field Manipulation Attack.mp4
88.4 MB
01 - OWASP Top 10 Web Application Security Exploit/003 Parameter Tampering Attack.mp4
74.9 MB
01 - OWASP Top 10 Web Application Security Exploit/004 Sensitive Data Exposure Attack.mp4
66.0 MB
01 - OWASP Top 10 Web Application Security Exploit/012 Insufficient Logging & Monitoring Vulnerability.mp4
59.1 MB
01 - OWASP Top 10 Web Application Security Exploit/011 Buffer Overflow Attack.mp4
55.1 MB
01 - OWASP Top 10 Web Application Security Exploit/008 Cookie Poisoning Hijacking Attack.mp4
52.1 MB
01 - OWASP Top 10 Web Application Security Exploit/006 Forceful Browsing Attack.mp4
39.9 MB
01 - OWASP Top 10 Web Application Security Exploit/002 Components of Web Application_en.srt
34.9 kB
01 - OWASP Top 10 Web Application Security Exploit/013 Advantages of WAF (Web Application Firewall)_en.srt
28.6 kB
01 - OWASP Top 10 Web Application Security Exploit/010 Broken Authentication Attack_en.srt
21.9 kB
01 - OWASP Top 10 Web Application Security Exploit/005 Cross Site Scripting Attack_en.srt
18.5 kB
01 - OWASP Top 10 Web Application Security Exploit/009 Security Misconfiguration Attack_en.srt
17.8 kB
01 - OWASP Top 10 Web Application Security Exploit/001 SQL Injection Attack_en.srt
16.4 kB
01 - OWASP Top 10 Web Application Security Exploit/007 Hidden Field Manipulation Attack_en.srt
14.1 kB
[磁力链接]
添加时间:
2024-02-07
大小:
1.3 GB
最近下载:
2025-02-18
热度:
312
[ FreeCourseWeb.com ] PluralSight - API Security with the OWASP API Security Top 10
~Get Your Files Here !/7. Broken Function Level Authorization/2. Demo - Exploiting Broken Function Level Authorization.mp4
11.4 MB
~Get Your Files Here !/4. Broken Authentication/4. Demo - Common JWT Attacks.mp4
11.2 MB
~Get Your Files Here !/10. Security Misconfiguration/4. Misconfiguration in the API and Response Chain.mp4
11.2 MB
~Get Your Files Here !/3. Broken Object Level Authorization/3. Demo - Broken Object Level Attacks.mp4
11.0 MB
~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/1. Using the OWASP API Security Top 10.mp4
10.9 MB
~Get Your Files Here !/4. Broken Authentication/2. Password Based Attacks and Defenses.mp4
10.2 MB
~Get Your Files Here !/11. Improper Inventory Management/3. Attacks and Defenses.mp4
9.6 MB
~Get Your Files Here !/12. Unsafe Consumption of APIs/3. API Consumption Defenses.mp4
9.0 MB
~Get Your Files Here !/4. Broken Authentication/3. Other Attacks and Defenses.mp4
8.3 MB
~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/2. Metrics behind the Top 10 Risks.mp4
7.8 MB
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/1. Sensitive Business Flows and Potential Attacks.mp4
6.9 MB
~Get Your Files Here !/10. Security Misconfiguration/3. Server Environment Misconfigurations.mp4
6.8 MB
~Get Your Files Here !/5. Broken Object Property Level Authorization/3. Demo - Exploiting Object Properties.mp4
6.7 MB
~Get Your Files Here !/9. Server-side Request Forgery/1. Understanding Server-side Request Forgery.mp4
6.7 MB
~Get Your Files Here !/6. Unrestricted Resource Consumption/1. Unrestricted Resource Consumption Attacks.mp4
6.7 MB
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/3. Business Flow Defenses.mp4
6.4 MB
~Get Your Files Here !/11. Improper Inventory Management/1. Understanding Improper Inventory Management.mp4
6.3 MB
~Get Your Files Here !/7. Broken Function Level Authorization/3. Defenses.mp4
6.1 MB
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/2. Demo - Attacking an Unrestricted Business Flow.mp4
6.1 MB
~Get Your Files Here !/6. Unrestricted Resource Consumption/2. Defenses for Resource Consumption.mp4
5.8 MB
[磁力链接]
添加时间:
2024-03-10
大小:
229.1 MB
最近下载:
2025-03-01
热度:
2049
[ DevCourseWeb.com ] Udemy - Owasp Api Security Top 10 2021 With Java Examples
~Get Your Files Here !/3 - A012021Broken Access Control/4 - Broken Access Control.mp4
325.9 MB
~Get Your Files Here !/9 - A072021Identification and Authentication Failures/16 - Identification & Authentication Failures.mp4
212.7 MB
~Get Your Files Here !/7 - A052021Security Misconfiguration/14 - Security Misconfiguration Hardening Zero Trust Defense in Depth Practice.mp4
201.9 MB
~Get Your Files Here !/8 - A062021Vulnerable and Outdated Components/15 - Vulnerable & Outdated Components.mp4
187.5 MB
~Get Your Files Here !/4 - A022021Cryptographic Failures/7 - Cryptography Failures Examples Password Encryption Hashing Salting.mp4
161.8 MB
~Get Your Files Here !/4 - A022021Cryptographic Failures/6 - Cryptography Failures Practical Examples SQL Injections TLSSSL HTTPS.mp4
144.3 MB
~Get Your Files Here !/11 - A092021Security Logging and Monitoring Failures/18 - Security Logging & Monitoring Failures.mp4
141.6 MB
~Get Your Files Here !/6 - A042021Insecure Design/12 - Insecure Design Secure Design Process Security Controls Metrics Examples.mp4
135.4 MB
~Get Your Files Here !/5 - A032021Injection/9 - Injection Cross Site Scripting Types of XSS SQL JPA NoSQL Injections.mp4
132.7 MB
~Get Your Files Here !/12 - A102021ServerSide Request Forgery/19 - ServerSide Request Forgery SSRF.mp4
128.9 MB
~Get Your Files Here !/2 - OWASP Top 10/3 - OWASP Top 10 Overview.mp4
125.0 MB
~Get Your Files Here !/5 - A032021Injection/8 - Injection Overview Fuzzing CWEs Impact Injection Types Command Injection.mp4
117.2 MB
~Get Your Files Here !/10 - A082021Software and Data Integrity Failures/17 - Software & Data Integrity Failures.mp4
109.3 MB
~Get Your Files Here !/6 - A042021Insecure Design/11 - Insecure Design Overivew CWEs Shift Left Security Threat Modeling Manifesto.mp4
107.1 MB
~Get Your Files Here !/7 - A052021Security Misconfiguration/13 - Security Misconfiguration Overview CWEs Types Reallife attacks.mp4
103.3 MB
~Get Your Files Here !/4 - A022021Cryptographic Failures/5 - Cryptography Failures Theory Sensitive Data Data Breach Types of Failures.mp4
98.2 MB
~Get Your Files Here !/5 - A032021Injection/10 - Injection XPath Injection Log Injection Input Validation.mp4
93.1 MB
~Get Your Files Here !/1 - Introduction/1 - Communication plan.mp4
51.5 MB
~Get Your Files Here !/1 - Introduction/2 - Unlimited access to Learn IT application for students.mp4
46.7 MB
~Get Your Files Here !/13 - Bonus Section/20 - Bonus Lesson.mp4
38.9 MB
[磁力链接]
添加时间:
2024-04-12
大小:
2.7 GB
最近下载:
2025-02-28
热度:
1135
API Security with the OWASP API Security Top 10
owasp
-api-security-top-10.zip
25.5 MB
07. Broken Function Level Authorization/02. Demo- Exploiting Broken Function Level Authorization.mp4
11.4 MB
04. Broken Authentication/04. Demo- Common JWT Attacks.mp4
11.2 MB
10. Security Misconfiguration/04. Misconfiguration in the API and Response Chain.mp4
11.2 MB
03. Broken Object Level Authorization/03. Demo- Broken Object Level Attacks.mp4
11.0 MB
02. Understanding the OWASP API Security Top 10/01. Using the OWASP API Security Top 10.mp4
10.9 MB
04. Broken Authentication/02. Password Based Attacks and Defenses.mp4
10.2 MB
11. Improper Inventory Management/03. Attacks and Defenses.mp4
9.6 MB
12. Unsafe Consumption of APIs/03. API Consumption Defenses.mp4
9.0 MB
04. Broken Authentication/03. Other Attacks and Defenses.mp4
8.3 MB
02. Understanding the OWASP API Security Top 10/02. Metrics behind the Top 10 Risks.mp4
7.8 MB
08. Unrestricted Access to Sensitive Business Flows/01. Sensitive Business Flows and Potential Attacks.mp4
6.9 MB
10. Security Misconfiguration/03. Server Environment Misconfigurations.mp4
6.8 MB
05. Broken Object Property Level Authorization/03. Demo- Exploiting Object Properties.mp4
6.7 MB
09. Server-side Request Forgery/01. Understanding Server-side Request Forgery.mp4
6.7 MB
06. Unrestricted Resource Consumption/01. Unrestricted Resource Consumption Attacks.mp4
6.7 MB
08. Unrestricted Access to Sensitive Business Flows/03. Business Flow Defenses.mp4
6.4 MB
11. Improper Inventory Management/01. Understanding Improper Inventory Management.mp4
6.3 MB
07. Broken Function Level Authorization/03. Defenses.mp4
6.1 MB
08. Unrestricted Access to Sensitive Business Flows/02. Demo- Attacking an Unrestricted Business Flow.mp4
6.1 MB
[磁力链接]
添加时间:
2024-05-02
大小:
254.6 MB
最近下载:
2025-03-01
热度:
1644
共4页
上一页
1
2
3
4
下一页