589689.xyz

[ ] Udemy - Learn Web Application Security For Beginners- OWASP Top 10

  • 收录时间:2022-03-05 21:29:54
  • 文件大小:1002MB
  • 下载次数:1
  • 最近下载:2022-03-05 21:29:54
  • 磁力链接:

文件列表

  1. ~Get Your Files Here !/2. Blue vs Read Team (Optional)/3. Cyber Defense strategies(Blue Team).mp4 94MB
  2. ~Get Your Files Here !/4. Penetration Testing/3. DVWA Setup.mp4 74MB
  3. ~Get Your Files Here !/3. OWASP Top 10/3. A1 - Broken Access Control.mp4 74MB
  4. ~Get Your Files Here !/3. OWASP Top 10/4. A2 - Cryptographic Failures.mp4 57MB
  5. ~Get Your Files Here !/1. Introduction/3. Introduction to Penetration Testing.mp4 48MB
  6. ~Get Your Files Here !/2. Blue vs Read Team (Optional)/1. Blue vs Red team Strategy.mp4 48MB
  7. ~Get Your Files Here !/3. OWASP Top 10/11. A9 - Security Logging and Monitoring Failures.mp4 48MB
  8. ~Get Your Files Here !/2. Blue vs Read Team (Optional)/2. Cyber attack Strategies(Red Team).mp4 47MB
  9. ~Get Your Files Here !/3. OWASP Top 10/7. A5 - Security Misconfiguration.mp4 45MB
  10. ~Get Your Files Here !/1. Introduction/2. Introduction to Application Security.mp4 43MB
  11. ~Get Your Files Here !/4. Penetration Testing/4. SQL Injection.mp4 43MB
  12. ~Get Your Files Here !/3. OWASP Top 10/10. A8 - Software and Data Integrity Failures.mp4 42MB
  13. ~Get Your Files Here !/3. OWASP Top 10/9. A7 - Identification and Authentication Failures.mp4 42MB
  14. ~Get Your Files Here !/4. Penetration Testing/6. Brute Force.mp4 41MB
  15. ~Get Your Files Here !/3. OWASP Top 10/12. A10 - Server-Side Request Forgery.mp4 37MB
  16. ~Get Your Files Here !/3. OWASP Top 10/8. A6 - Vulnerable and Outdated Components.mp4 33MB
  17. ~Get Your Files Here !/3. OWASP Top 10/5. A3 - Injection.mp4 30MB
  18. ~Get Your Files Here !/3. OWASP Top 10/2. The vulnerabilities in the The OWASP Top 10.mp4 30MB
  19. ~Get Your Files Here !/3. OWASP Top 10/6. A4 - Insecure Design.mp4 29MB
  20. ~Get Your Files Here !/4. Penetration Testing/5. SQL Injection (Medium).mp4 28MB
  21. ~Get Your Files Here !/4. Penetration Testing/7. CSRF (Cross-site request forgery).mp4 20MB
  22. ~Get Your Files Here !/4. Penetration Testing/2. Introduction To DVWA.mp4 14MB
  23. ~Get Your Files Here !/4. Penetration Testing/1. Introduction To Virtual Machines.mp4 13MB
  24. ~Get Your Files Here !/3. OWASP Top 10/1. What is the OWASP.mp4 11MB
  25. ~Get Your Files Here !/1. Introduction/1. Introduction.mp4 11MB
  26. ~Get Your Files Here !/4. Penetration Testing/3. DVWA Setup.srt 15KB
  27. ~Get Your Files Here !/2. Blue vs Read Team (Optional)/3. Cyber Defense strategies(Blue Team).srt 14KB
  28. ~Get Your Files Here !/4. Penetration Testing/6. Brute Force.srt 13KB
  29. ~Get Your Files Here !/4. Penetration Testing/4. SQL Injection.srt 11KB
  30. ~Get Your Files Here !/2. Blue vs Read Team (Optional)/2. Cyber attack Strategies(Red Team).srt 10KB
  31. ~Get Your Files Here !/2. Blue vs Read Team (Optional)/1. Blue vs Red team Strategy.srt 9KB
  32. ~Get Your Files Here !/3. OWASP Top 10/3. A1 - Broken Access Control.srt 8KB
  33. ~Get Your Files Here !/4. Penetration Testing/7. CSRF (Cross-site request forgery).srt 7KB
  34. ~Get Your Files Here !/4. Penetration Testing/5. SQL Injection (Medium).srt 7KB
  35. ~Get Your Files Here !/1. Introduction/2. Introduction to Application Security.srt 6KB
  36. ~Get Your Files Here !/3. OWASP Top 10/4. A2 - Cryptographic Failures.srt 6KB
  37. ~Get Your Files Here !/1. Introduction/3. Introduction to Penetration Testing.srt 5KB
  38. ~Get Your Files Here !/3. OWASP Top 10/11. A9 - Security Logging and Monitoring Failures.srt 5KB
  39. ~Get Your Files Here !/3. OWASP Top 10/7. A5 - Security Misconfiguration.srt 5KB
  40. ~Get Your Files Here !/3. OWASP Top 10/9. A7 - Identification and Authentication Failures.srt 5KB
  41. ~Get Your Files Here !/3. OWASP Top 10/10. A8 - Software and Data Integrity Failures.srt 4KB
  42. ~Get Your Files Here !/3. OWASP Top 10/12. A10 - Server-Side Request Forgery.srt 4KB
  43. ~Get Your Files Here !/4. Penetration Testing/1. Introduction To Virtual Machines.srt 4KB
  44. ~Get Your Files Here !/4. Penetration Testing/2. Introduction To DVWA.srt 4KB
  45. ~Get Your Files Here !/3. OWASP Top 10/8. A6 - Vulnerable and Outdated Components.srt 3KB
  46. ~Get Your Files Here !/3. OWASP Top 10/2. The vulnerabilities in the The OWASP Top 10.srt 3KB
  47. ~Get Your Files Here !/3. OWASP Top 10/6. A4 - Insecure Design.srt 3KB
  48. ~Get Your Files Here !/3. OWASP Top 10/5. A3 - Injection.srt 3KB
  49. ~Get Your Files Here !/1. Introduction/1. Introduction.srt 2KB
  50. ~Get Your Files Here !/3. OWASP Top 10/1. What is the OWASP.srt 1KB
  51. ~Get Your Files Here !/Bonus Resources.txt 386B
  52. ~Get Your Files Here !/3. OWASP Top 10/13. What is your experience with security risks mentioned in OWASP Top 10.html 212B
  53. Get Bonus Downloads Here.url 182B