:Search:

Udemy Secure Coding Based On OWASP Top 10 with Practical Exampl

Torrent:
Info Hash: 95B213515FD99E05A277BBA1D3A36FB446413F1C
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Downloads: 280
Type: Tutorials
Language: English
Category: Other
Size: 897.5 MB
Added: Oct. 24, 2024, 4:52 p.m.
Peers: Seeders: 8, Leechers: 1 (Last updated: 11 months, 2 weeks ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 2 0 1
udp://exodus.desync.com:6969/announce 3 0 4
udp://tracker.cyberia.is:6969/announce 2 0 1
udp://tracker.opentrackr.org:1337/announce 2 0 244
udp://tracker.torrent.eu.org:451/announce 2 0 29
udp://explodie.org:6969/announce 2 0 0
udp://tracker.birkenwald.de:6969/announce 0 1 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce 0 0 1
udp://tracker.therarbg.to:6969/announce 0 0 0
Files:
  1. Get Bonus Downloads Here.url 182 bytes
  2. 1 -Introduction.mp4 15.0 MB
  3. 1 -Security Logging and Monitoring Failures Explained.mp4 34.7 MB
  4. 1 -Server-Side Request Forgery All in One.mp4 32.1 MB
  5. 1 -Broken Access Control Explained.mp4 10.0 MB
  6. 2 -Broken Access Control - Practical Example on a Vulnerable Web Application.mp4 35.6 MB
  7. 3 -Vulnerable Code vs Secure Code - Example 1 (Broken Access Control).mp4 11.1 MB
  8. 4 -Vulnerable Code vs Secure Code - Example 2 (IDOR).mp4 12.5 MB
  9. 5 -Vulnerable Code vs Secure Code - Example (Rate Limiting).mp4 11.2 MB
  10. 6 -Broken Access Controls Prevention Guide.mp4 22.3 MB
  11. 1 -Cryptographic Failures Explained.mp4 20.9 MB
  12. 2 -Vulnerable Code vs Secure Code - Example 1 (Encryption, Weak Cipher Usage).mp4 11.8 MB
  13. 3 -Vulnerable Code vs Secure Code - Example 2 (Hard Coded Keys, StrongWeak Keys).mp4 13.3 MB
  14. 4 -Vulnerable Code vs Secure Code - Example 3 (Secure Hashing Algorithms).mp4 11.9 MB
  15. 5 -Cryptographic Failures Prevention Guide.mp4 58.9 MB
  16. 1 -Injections Explained.mp4 97.7 MB
  17. 2 -Vulnerable Code vs Secure Code Example 1 (SQL Injection).mp4 36.7 MB
  18. 3 -Vulnerable Code vs Secure Code Example 2 (Command Injection).mp4 44.2 MB
  19. 4 -Vulnerable Code vs Secure Code Example 3 (XML Injection, File Upload, LDAP Inj.).mp4 50.7 MB
  20. 5 -Injection Prevention Guide.mp4 26.4 MB
  21. 1 -Insecure Design Explained (Design Principles, Frameworks, Key Practices).mp4 69.9 MB
  22. 1 -Security Misconfigurations (Security Hardenings, Error Handlings, Secure Config).mp4 46.5 MB
  23. 1 -Vulnerable and Outdated Components All In One.mp4 25.8 MB
  24. 1 -Identification and Authentication Failures Explained.mp4 38.2 MB
  25. 2 -Ident. and Auth. Failures Example 1 (Login Brute Force, Sensitive Data in GET ).mp4 51.7 MB
  26. 3 -Identification and Authentication Failures Example 2.mp4 33.1 MB
  27. 4 -Identification and Authentication Failures Prevention Guide.mp4 47.1 MB
  28. 1 -Software and Data Integrity Failures.mp4 28.0 MB
  29. Bonus Resources.txt 386 bytes

Discussion