Udemy - Learn Web Application Security For Beginners- OWASP Top 10

Photo unavailable
Category:
Date:
02/14/22 at 8:42pm GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
1002 MB in 52 files

Torrent Status:
  This torrent has been verified.

Infohash:
83681bccaf64629f4fc951dae99d05b69788d03c


File list

  • Udemy - Learn Web Application Security For Beginners- OWASP Top 10
  • icon ~Get Your Files Here !/1. Introduction/1. Introduction.mp4 10.5 MB
    icon ~Get Your Files Here !/1. Introduction/1. Introduction.srt 1.8 KB
    icon ~Get Your Files Here !/1. Introduction/2. Introduction to Application Security.mp4 43.3 MB
    icon ~Get Your Files Here !/1. Introduction/2. Introduction to Application Security.srt 5.8 KB
    icon ~Get Your Files Here !/1. Introduction/3. Introduction to Penetration Testing.mp4 48.5 MB
    icon ~Get Your Files Here !/1. Introduction/3. Introduction to Penetration Testing.srt 5.2 KB
    icon ~Get Your Files Here !/2. Blue vs Read Team (Optional)/1. Blue vs Red team Strategy.mp4 48.5 MB
    icon ~Get Your Files Here !/2. Blue vs Read Team (Optional)/1. Blue vs Red team Strategy.srt 8.8 KB
    icon ~Get Your Files Here !/2. Blue vs Read Team (Optional)/2. Cyber attack Strategies(Red Team).mp4 46.8 MB
    icon ~Get Your Files Here !/2. Blue vs Read Team (Optional)/2. Cyber attack Strategies(Red Team).srt 9.6 KB
    icon ~Get Your Files Here !/2. Blue vs Read Team (Optional)/3. Cyber Defense strategies(Blue Team).mp4 94.3 MB
    icon ~Get Your Files Here !/2. Blue vs Read Team (Optional)/3. Cyber Defense strategies(Blue Team).srt 14 KB
    icon ~Get Your Files Here !/3. OWASP Top 10/1. What is the OWASP.mp4 10.9 MB
    icon ~Get Your Files Here !/3. OWASP Top 10/1. What is the OWASP.srt 1.1 KB
    icon ~Get Your Files Here !/3. OWASP Top 10/10. A8 - Software and Data Integrity Failures.mp4 42.4 MB
    icon ~Get Your Files Here !/3. OWASP Top 10/10. A8 - Software and Data Integrity Failures.srt 4.4 KB
    icon ~Get Your Files Here !/3. OWASP Top 10/11. A9 - Security Logging and Monitoring Failures.mp4 48.1 MB
    icon ~Get Your Files Here !/3. OWASP Top 10/11. A9 - Security Logging and Monitoring Failures.srt 5.1 KB
    icon ~Get Your Files Here !/3. OWASP Top 10/12. A10 - Server-Side Request Forgery.mp4 36.7 MB
    icon ~Get Your Files Here !/3. OWASP Top 10/12. A10 - Server-Side Request Forgery.srt 4.2 KB
    icon ~Get Your Files Here !/3. OWASP Top 10/13. What is your experience with security risks mentioned in OWASP Top 10.html 212 B
    icon ~Get Your Files Here !/3. OWASP Top 10/2. The vulnerabilities in the The OWASP Top 10.mp4 29.6 MB
    icon ~Get Your Files Here !/3. OWASP Top 10/2. The vulnerabilities in the The OWASP Top 10.srt 3.4 KB
    icon ~Get Your Files Here !/3. OWASP Top 10/3. A1 - Broken Access Control.mp4 74.1 MB
    icon ~Get Your Files Here !/3. OWASP Top 10/3. A1 - Broken Access Control.srt 7.9 KB
    icon ~Get Your Files Here !/3. OWASP Top 10/4. A2 - Cryptographic Failures.mp4 56.6 MB
    icon ~Get Your Files Here !/3. OWASP Top 10/4. A2 - Cryptographic Failures.srt 5.7 KB
    icon ~Get Your Files Here !/3. OWASP Top 10/5. A3 - Injection.mp4 30.4 MB
    icon ~Get Your Files Here !/3. OWASP Top 10/5. A3 - Injection.srt 3 KB
    icon ~Get Your Files Here !/3. OWASP Top 10/6. A4 - Insecure Design.mp4 28.9 MB
    icon ~Get Your Files Here !/3. OWASP Top 10/6. A4 - Insecure Design.srt 3 KB
    icon ~Get Your Files Here !/3. OWASP Top 10/7. A5 - Security Misconfiguration.mp4 45 MB
    icon ~Get Your Files Here !/3. OWASP Top 10/7. A5 - Security Misconfiguration.srt 5 KB
    icon ~Get Your Files Here !/3. OWASP Top 10/8. A6 - Vulnerable and Outdated Components.mp4 32.7 MB
    icon ~Get Your Files Here !/3. OWASP Top 10/8. A6 - Vulnerable and Outdated Components.srt 3.4 KB
    icon ~Get Your Files Here !/3. OWASP Top 10/9. A7 - Identification and Authentication Failures.mp4 41.7 MB
    icon ~Get Your Files Here !/3. OWASP Top 10/9. A7 - Identification and Authentication Failures.srt 4.6 KB
    icon ~Get Your Files Here !/4. Penetration Testing/1. Introduction To Virtual Machines.mp4 13.1 MB
    icon ~Get Your Files Here !/4. Penetration Testing/1. Introduction To Virtual Machines.srt 3.9 KB
    icon ~Get Your Files Here !/4. Penetration Testing/2. Introduction To DVWA.mp4 13.5 MB
    icon ~Get Your Files Here !/4. Penetration Testing/2. Introduction To DVWA.srt 3.8 KB
    icon ~Get Your Files Here !/4. Penetration Testing/3. DVWA Setup.mp4 74.1 MB
    icon ~Get Your Files Here !/4. Penetration Testing/3. DVWA Setup.srt 14.8 KB
    icon ~Get Your Files Here !/4. Penetration Testing/4. SQL Injection.mp4 43.2 MB
    icon ~Get Your Files Here !/4. Penetration Testing/4. SQL Injection.srt 10.8 KB
    icon ~Get Your Files Here !/4. Penetration Testing/5. SQL Injection (Medium).mp4 28.5 MB
    icon ~Get Your Files Here !/4. Penetration Testing/5. SQL Injection (Medium).srt 6.9 KB
    icon ~Get Your Files Here !/4. Penetration Testing/6. Brute Force.mp4 41.2 MB
    icon ~Get Your Files Here !/4. Penetration Testing/6. Brute Force.srt 13.3 KB
    icon ~Get Your Files Here !/4. Penetration Testing/7. CSRF (Cross-site request forgery).mp4 19.6 MB
    icon ~Get Your Files Here !/4. Penetration Testing/7. CSRF (Cross-site request forgery).srt 7.5 KB
    icon ~Get Your Files Here !/Bonus Resources.txt 386 B

Similar Torrents