[ ] EC-Council - OWASP Top 10 Security Fundamentals
- 收录时间:2021-12-05 02:47:32
- 文件大小:3GB
- 下载次数:1
- 最近下载:2021-12-05 02:47:32
- 磁力链接:
-
文件列表
- ~Get Your Files Here !/Chapter 4 Sensitive Data Exposure/12. Mitigation .mp4 155MB
- ~Get Your Files Here !/Chapter 9 Insecure Deserialization/26. Exploitation .mp4 152MB
- ~Get Your Files Here !/Chapter 7 Security Misconfiguration/21. Mitigation .mp4 144MB
- ~Get Your Files Here !/Chapter 6 Broken Access Control/18. Mitigation .mp4 129MB
- ~Get Your Files Here !/Chapter 10 Using Components with Known Vulnerabilities/30. Mitigation .mp4 128MB
- ~Get Your Files Here !/Chapter 2 Injection Flaws/5. Exploitation .mp4 122MB
- ~Get Your Files Here !/Chapter 10 Using Components with Known Vulnerabilities/29. Exploitation .mp4 121MB
- ~Get Your Files Here !/Chapter 4 Sensitive Data Exposure/11. Exploitation .mp4 119MB
- ~Get Your Files Here !/Chapter 3 Broken Authentication/9. Mitigation .mp4 119MB
- ~Get Your Files Here !/Chapter 8 Cross-Site Scripting (XSS)/23. Exploitation .mp4 113MB
- ~Get Your Files Here !/Chapter 7 Security Misconfiguration/20. Exploitation .mp4 110MB
- ~Get Your Files Here !/Chapter 1 World Wide Web Fundamentals/3. How the World Wide Web Works- .mp4 108MB
- ~Get Your Files Here !/Chapter 6 Broken Access Control/17. Exploitation .mp4 107MB
- ~Get Your Files Here !/Chapter 11 Insufficient Logging & Monitoring/33. Mitigation .mp4 104MB
- ~Get Your Files Here !/Chapter 11 Insufficient Logging & Monitoring/32. Exploitation .mp4 101MB
- ~Get Your Files Here !/Chapter 8 Cross-Site Scripting (XSS)/24. Mitigation .mp4 89MB
- ~Get Your Files Here !/Chapter 8 Cross-Site Scripting (XSS)/22. Threat Analysis .mp4 88MB
- ~Get Your Files Here !/Chapter 2 Injection Flaws/4. Threat Analysis .mp4 88MB
- ~Get Your Files Here !/Chapter 5 XML External Entities (XXE)/15. Mitigation .mp4 86MB
- ~Get Your Files Here !/Chapter 2 Injection Flaws/6. Mitigation .mp4 81MB
- ~Get Your Files Here !/Chapter 1 World Wide Web Fundamentals/2. Introduction to the OWASP Top 10 .mp4 78MB
- ~Get Your Files Here !/Chapter 3 Broken Authentication/8. Exploitation .mp4 64MB
- ~Get Your Files Here !/Chapter 5 XML External Entities (XXE)/14. Exploitation .mp4 61MB
- ~Get Your Files Here !/Chapter 9 Insecure Deserialization/27. Mitigation .mp4 61MB
- ~Get Your Files Here !/Chapter 5 XML External Entities (XXE)/13. Threat Analysis .mp4 56MB
- ~Get Your Files Here !/Chapter 1 World Wide Web Fundamentals/1. Course Overview .mp4 56MB
- ~Get Your Files Here !/Chapter 9 Insecure Deserialization/25. Threat Analysis .mp4 53MB
- ~Get Your Files Here !/Chapter 4 Sensitive Data Exposure/10. Threat Analysis .mp4 51MB
- ~Get Your Files Here !/Chapter 6 Broken Access Control/16. Threat Analysis .mp4 50MB
- ~Get Your Files Here !/Chapter 3 Broken Authentication/7. Threat Analysis .mp4 45MB
- ~Get Your Files Here !/Chapter 10 Using Components with Known Vulnerabilities/28. Threat Analysis .mp4 40MB
- ~Get Your Files Here !/Chapter 7 Security Misconfiguration/19. Threat Analysis .mp4 35MB
- ~Get Your Files Here !/Chapter 11 Insufficient Logging & Monitoring/31. Threat Analysis .mp4 30MB
- ~Get Your Files Here !/Bonus Resources.txt 357B
- Get Bonus Downloads Here.url 183B