589689.xyz

Web Security and the OWASP Top 10 The Big Picture

  • 收录时间:2018-03-24 17:07:23
  • 文件大小:290MB
  • 下载次数:161
  • 最近下载:2020-10-30 08:39:54
  • 磁力链接:

文件列表

  1. 1. Introduction/1 - Introduction.mp4 18MB
  2. 4. Cross-Site Scripting (XSS)/4 - The risk in Practice.mp4 12MB
  3. 5. Insecure Direct Object References/3 - Defences.mp4 12MB
  4. 4. Cross-Site Scripting (XSS)/1 - Overview.mp4 11MB
  5. 3. Broken Authentication and Session Management/3 - Defences.mp4 11MB
  6. 2. Injection/3 - Defences.mp4 10MB
  7. 8. Missing Function Level Access Control/3 - Defences.mp4 10MB
  8. 3. Broken Authentication and Session Management/2 - Mounting an Attack.mp4 9MB
  9. 11. Unvalidated Redirects and Forwards/4 - The risk in Practice.mp4 9MB
  10. 7. Sensitive Data Exposure/2 - Mounting an Attack.mp4 9MB
  11. 9. Cross-Site Request Forgery (CSRF)/3 - Defences.mp4 8MB
  12. 2. Injection/1 - Overview.mp4 8MB
  13. 8. Missing Function Level Access Control/2 - Mounting an Attack.mp4 7MB
  14. 7. Sensitive Data Exposure/3 - Defences.mp4 7MB
  15. 6. Security Misconfiguration/2 - Mounting an Attack.mp4 7MB
  16. 6. Security Misconfiguration/3 - Defences.mp4 7MB
  17. 8. Missing Function Level Access Control/4 - The risk in Practice.mp4 7MB
  18. 9. Cross-Site Request Forgery (CSRF)/4 - The risk in Practice.mp4 7MB
  19. 10. Using Components with Known Vulnerabilities/3 - Defences.mp4 6MB
  20. 9. Cross-Site Request Forgery (CSRF)/1 - Overview.mp4 6MB
  21. 8. Missing Function Level Access Control/1 - Overview.mp4 6MB
  22. 4. Cross-Site Scripting (XSS)/3 - Defences.mp4 6MB
  23. 7. Sensitive Data Exposure/4 - The risk in Practice.mp4 6MB
  24. 2. Injection/4 - The risk in Practice.mp4 6MB
  25. 10. Using Components with Known Vulnerabilities/1 - Overview.mp4 6MB
  26. 3. Broken Authentication and Session Management/1 - Overview.mp4 5MB
  27. 10. Using Components with Known Vulnerabilities/4 - The risk in Practice.mp4 5MB
  28. 6. Security Misconfiguration/4 - The risk in Practice.mp4 5MB
  29. 5. Insecure Direct Object References/1 - Overview.mp4 5MB
  30. 9. Cross-Site Request Forgery (CSRF)/2 - Mounting an Attack.mp4 5MB
  31. 11. Unvalidated Redirects and Forwards/2 - Mounting an Attack.mp4 5MB
  32. 11. Unvalidated Redirects and Forwards/3 - Defences.mp4 5MB
  33. 11. Unvalidated Redirects and Forwards/1 - Overview.mp4 5MB
  34. 10. Using Components with Known Vulnerabilities/2 - Mounting an Attack.mp4 5MB
  35. 2. Injection/2 - Mounting an Attack.mp4 5MB
  36. 7. Sensitive Data Exposure/1 - Overview.mp4 5MB
  37. 5. Insecure Direct Object References/2 - Mounting an Attack.mp4 4MB
  38. 5. Insecure Direct Object References/4 - The risk in Practice.mp4 4MB
  39. Excercise Files.zip 4MB
  40. 3. Broken Authentication and Session Management/4 - The risk in Practive.mp4 4MB
  41. 4. Cross-Site Scripting (XSS)/2 -Mounting an Attack.mp4 4MB
  42. 6. Security Misconfiguration/1 - Overview.mp4 4MB