[ ] Udemy - Learn Web Application Security For Beginners- OWASP Top 10
- 收录时间:2022-03-05 21:29:54
- 文件大小:1002MB
- 下载次数:1
- 最近下载:2022-03-05 21:29:54
- 磁力链接:
-
文件列表
- ~Get Your Files Here !/2. Blue vs Read Team (Optional)/3. Cyber Defense strategies(Blue Team).mp4 94MB
- ~Get Your Files Here !/4. Penetration Testing/3. DVWA Setup.mp4 74MB
- ~Get Your Files Here !/3. OWASP Top 10/3. A1 - Broken Access Control.mp4 74MB
- ~Get Your Files Here !/3. OWASP Top 10/4. A2 - Cryptographic Failures.mp4 57MB
- ~Get Your Files Here !/1. Introduction/3. Introduction to Penetration Testing.mp4 48MB
- ~Get Your Files Here !/2. Blue vs Read Team (Optional)/1. Blue vs Red team Strategy.mp4 48MB
- ~Get Your Files Here !/3. OWASP Top 10/11. A9 - Security Logging and Monitoring Failures.mp4 48MB
- ~Get Your Files Here !/2. Blue vs Read Team (Optional)/2. Cyber attack Strategies(Red Team).mp4 47MB
- ~Get Your Files Here !/3. OWASP Top 10/7. A5 - Security Misconfiguration.mp4 45MB
- ~Get Your Files Here !/1. Introduction/2. Introduction to Application Security.mp4 43MB
- ~Get Your Files Here !/4. Penetration Testing/4. SQL Injection.mp4 43MB
- ~Get Your Files Here !/3. OWASP Top 10/10. A8 - Software and Data Integrity Failures.mp4 42MB
- ~Get Your Files Here !/3. OWASP Top 10/9. A7 - Identification and Authentication Failures.mp4 42MB
- ~Get Your Files Here !/4. Penetration Testing/6. Brute Force.mp4 41MB
- ~Get Your Files Here !/3. OWASP Top 10/12. A10 - Server-Side Request Forgery.mp4 37MB
- ~Get Your Files Here !/3. OWASP Top 10/8. A6 - Vulnerable and Outdated Components.mp4 33MB
- ~Get Your Files Here !/3. OWASP Top 10/5. A3 - Injection.mp4 30MB
- ~Get Your Files Here !/3. OWASP Top 10/2. The vulnerabilities in the The OWASP Top 10.mp4 30MB
- ~Get Your Files Here !/3. OWASP Top 10/6. A4 - Insecure Design.mp4 29MB
- ~Get Your Files Here !/4. Penetration Testing/5. SQL Injection (Medium).mp4 28MB
- ~Get Your Files Here !/4. Penetration Testing/7. CSRF (Cross-site request forgery).mp4 20MB
- ~Get Your Files Here !/4. Penetration Testing/2. Introduction To DVWA.mp4 14MB
- ~Get Your Files Here !/4. Penetration Testing/1. Introduction To Virtual Machines.mp4 13MB
- ~Get Your Files Here !/3. OWASP Top 10/1. What is the OWASP.mp4 11MB
- ~Get Your Files Here !/1. Introduction/1. Introduction.mp4 11MB
- ~Get Your Files Here !/4. Penetration Testing/3. DVWA Setup.srt 15KB
- ~Get Your Files Here !/2. Blue vs Read Team (Optional)/3. Cyber Defense strategies(Blue Team).srt 14KB
- ~Get Your Files Here !/4. Penetration Testing/6. Brute Force.srt 13KB
- ~Get Your Files Here !/4. Penetration Testing/4. SQL Injection.srt 11KB
- ~Get Your Files Here !/2. Blue vs Read Team (Optional)/2. Cyber attack Strategies(Red Team).srt 10KB
- ~Get Your Files Here !/2. Blue vs Read Team (Optional)/1. Blue vs Red team Strategy.srt 9KB
- ~Get Your Files Here !/3. OWASP Top 10/3. A1 - Broken Access Control.srt 8KB
- ~Get Your Files Here !/4. Penetration Testing/7. CSRF (Cross-site request forgery).srt 7KB
- ~Get Your Files Here !/4. Penetration Testing/5. SQL Injection (Medium).srt 7KB
- ~Get Your Files Here !/1. Introduction/2. Introduction to Application Security.srt 6KB
- ~Get Your Files Here !/3. OWASP Top 10/4. A2 - Cryptographic Failures.srt 6KB
- ~Get Your Files Here !/1. Introduction/3. Introduction to Penetration Testing.srt 5KB
- ~Get Your Files Here !/3. OWASP Top 10/11. A9 - Security Logging and Monitoring Failures.srt 5KB
- ~Get Your Files Here !/3. OWASP Top 10/7. A5 - Security Misconfiguration.srt 5KB
- ~Get Your Files Here !/3. OWASP Top 10/9. A7 - Identification and Authentication Failures.srt 5KB
- ~Get Your Files Here !/3. OWASP Top 10/10. A8 - Software and Data Integrity Failures.srt 4KB
- ~Get Your Files Here !/3. OWASP Top 10/12. A10 - Server-Side Request Forgery.srt 4KB
- ~Get Your Files Here !/4. Penetration Testing/1. Introduction To Virtual Machines.srt 4KB
- ~Get Your Files Here !/4. Penetration Testing/2. Introduction To DVWA.srt 4KB
- ~Get Your Files Here !/3. OWASP Top 10/8. A6 - Vulnerable and Outdated Components.srt 3KB
- ~Get Your Files Here !/3. OWASP Top 10/2. The vulnerabilities in the The OWASP Top 10.srt 3KB
- ~Get Your Files Here !/3. OWASP Top 10/6. A4 - Insecure Design.srt 3KB
- ~Get Your Files Here !/3. OWASP Top 10/5. A3 - Injection.srt 3KB
- ~Get Your Files Here !/1. Introduction/1. Introduction.srt 2KB
- ~Get Your Files Here !/3. OWASP Top 10/1. What is the OWASP.srt 1KB
- ~Get Your Files Here !/Bonus Resources.txt 386B
- ~Get Your Files Here !/3. OWASP Top 10/13. What is your experience with security risks mentioned in OWASP Top 10.html 212B
- Get Bonus Downloads Here.url 182B