589689.xyz

OWASP Top 10- API Security Playbook

  • 收录时间:2021-06-06 13:21:55
  • 文件大小:200MB
  • 下载次数:1
  • 最近下载:2021-06-06 13:21:55
  • 磁力链接:

文件列表

  1. 08. Security Misconfiguration/02. Common Security Misconfigurations.mp4 10MB
  2. 09. Injection/03. Injection Defenses.mp4 10MB
  3. 10. Improper Assets Management/01. Attacks on Improper Asset Management.mp4 9MB
  4. 01. Using the OWASP API Top 10/00. Goals of the API Top 10.mp4 8MB
  5. 08. Security Misconfiguration/01. Understanding a Vulnerable CORS Implementation.mp4 8MB
  6. 08. Security Misconfiguration/00. Overview.mp4 8MB
  7. 09. Injection/01. Attacking Injection Vulnerabilities.mp4 8MB
  8. 03. Broken User Authentication/00. Understanding Broken Authorization.mp4 7MB
  9. 06. Broken Function Level Authorization/01. Attacks on Function Level Authorization.mp4 7MB
  10. 02. Broken Object Level Authorization/01. Attacking Broken Object Level Authorization.mp4 7MB
  11. 05. Lack of Resource and Rate Limiting/03. Rate Limiting Defenses.mp4 6MB
  12. 10. Improper Assets Management/02. Defending Your Assets.mp4 6MB
  13. 05. Lack of Resource and Rate Limiting/01. Attacks on Rate Limiting Vulnerabilities.mp4 6MB
  14. 01. Using the OWASP API Top 10/01. Vulnerability Risk Factors.mp4 6MB
  15. 04. Excessive Data Exposure/00. Overview.mp4 6MB
  16. 03. Broken User Authentication/03. Common JWT Failures.mp4 5MB
  17. 11. Insufficient Logging and Monitoring/02. Logging and Monitoring for Defense.mp4 5MB
  18. 09. Injection/02. Injection Risks.mp4 5MB
  19. 04. Excessive Data Exposure/01. Attacking Excessive Data Exposure.mp4 5MB
  20. 07. Mass Assignment/01. Attacking Mass Assignment Vulnerabilities.mp4 5MB
  21. 11. Insufficient Logging and Monitoring/00. Overview.mp4 5MB
  22. 03. Broken User Authentication/04. Using API Keys.mp4 5MB
  23. 07. Mass Assignment/00. Overview.mp4 5MB
  24. 02. Broken Object Level Authorization/02. Defending Against Broken Object Level Authorization.mp4 4MB
  25. 03. Broken User Authentication/01. Storing Passwords Securely.mp4 4MB
  26. 10. Improper Assets Management/00. Overview.mp4 4MB
  27. 09. Injection/00. Overview.mp4 4MB
  28. 06. Broken Function Level Authorization/02. Function Level Authorization Defenses.mp4 4MB
  29. 05. Lack of Resource and Rate Limiting/00. Overview.mp4 4MB
  30. 11. Insufficient Logging and Monitoring/01. Effects of Insufficient Logging and Monitoring.mp4 3MB
  31. 00. Course Overview/00. Course Overview.mp4 3MB
  32. 07. Mass Assignment/02. Mass Assignment Defenses.mp4 3MB
  33. 03. Broken User Authentication/02. Credential Stuffing.mp4 3MB
  34. 04. Excessive Data Exposure/02. Defending Against Excessive Data Exposure.mp4 3MB
  35. 05. Lack of Resource and Rate Limiting/02. Rate Limiting Risks.mp4 3MB
  36. 06. Broken Function Level Authorization/00. Overview.mp4 3MB
  37. 02. Broken Object Level Authorization/00. Overview.mp4 3MB
  38. 08. Security Misconfiguration/02. Common Security Misconfigurations.srt 10KB
  39. 09. Injection/03. Injection Defenses.srt 10KB
  40. 08. Security Misconfiguration/00. Overview.srt 9KB
  41. 08. Security Misconfiguration/01. Understanding a Vulnerable CORS Implementation.srt 8KB
  42. 10. Improper Assets Management/01. Attacks on Improper Asset Management.srt 8KB
  43. 02. Broken Object Level Authorization/01. Attacking Broken Object Level Authorization.srt 8KB
  44. 01. Using the OWASP API Top 10/00. Goals of the API Top 10.srt 8KB
  45. 09. Injection/01. Attacking Injection Vulnerabilities.srt 8KB
  46. 03. Broken User Authentication/00. Understanding Broken Authorization.srt 8KB
  47. 06. Broken Function Level Authorization/01. Attacks on Function Level Authorization.srt 7KB
  48. 01. Using the OWASP API Top 10/01. Vulnerability Risk Factors.srt 6KB
  49. 05. Lack of Resource and Rate Limiting/03. Rate Limiting Defenses.srt 6KB
  50. 05. Lack of Resource and Rate Limiting/01. Attacks on Rate Limiting Vulnerabilities.srt 6KB
  51. 04. Excessive Data Exposure/00. Overview.srt 6KB
  52. 10. Improper Assets Management/02. Defending Your Assets.srt 6KB
  53. 03. Broken User Authentication/03. Common JWT Failures.srt 5KB
  54. 11. Insufficient Logging and Monitoring/02. Logging and Monitoring for Defense.srt 5KB
  55. 11. Insufficient Logging and Monitoring/00. Overview.srt 5KB
  56. 03. Broken User Authentication/04. Using API Keys.srt 5KB
  57. 03. Broken User Authentication/01. Storing Passwords Securely.srt 5KB
  58. 04. Excessive Data Exposure/01. Attacking Excessive Data Exposure.srt 5KB
  59. 02. Broken Object Level Authorization/02. Defending Against Broken Object Level Authorization.srt 5KB
  60. 07. Mass Assignment/01. Attacking Mass Assignment Vulnerabilities.srt 5KB
  61. 07. Mass Assignment/00. Overview.srt 5KB
  62. 10. Improper Assets Management/00. Overview.srt 4KB
  63. 09. Injection/02. Injection Risks.srt 4KB
  64. 05. Lack of Resource and Rate Limiting/00. Overview.srt 4KB
  65. 09. Injection/00. Overview.srt 4KB
  66. 06. Broken Function Level Authorization/02. Function Level Authorization Defenses.srt 4KB
  67. 04. Excessive Data Exposure/02. Defending Against Excessive Data Exposure.srt 4KB
  68. 07. Mass Assignment/02. Mass Assignment Defenses.srt 4KB
  69. 02. Broken Object Level Authorization/00. Overview.srt 3KB
  70. 05. Lack of Resource and Rate Limiting/02. Rate Limiting Risks.srt 3KB
  71. 06. Broken Function Level Authorization/00. Overview.srt 3KB
  72. 11. Insufficient Logging and Monitoring/01. Effects of Insufficient Logging and Monitoring.srt 3KB
  73. 03. Broken User Authentication/02. Credential Stuffing.srt 3KB
  74. 00. Course Overview/00. Course Overview.srt 2KB
  75. 01. Using the OWASP API Top 10/6 Simple Memory Techniques.html 98B
  76. 02. Broken Object Level Authorization/USB Rubber Ducky Deluxe.html 84B
  77. 03. Broken User Authentication/Yubico - YubiKey 5 NFC.html 84B
  78. 06. Broken Function Level Authorization/Linux Tails Operating System.html 84B
  79. 11. Insufficient Logging and Monitoring/LIFX 1100-Lumen.html 84B
  80. 11. Insufficient Logging and Monitoring/Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html 84B