Udemy - Application Security Fundamentals - Including Hands On Demos

Photo unavailable
Category:
Date:
07/27/23 at 7:29am GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
1.9 GB in 39 files

Torrent Status:
  This torrent has been verified.

Infohash:
4de48b97a3a2153b5b5d5fe0b0ccce4024495e25


File list

  • Udemy - Application Security Fundamentals - Including Hands On Demos
  • icon ~Get Your Files Here !/1. Introduction and Agenda/1. Introduction And Course Agenda.mp4 20.5 MB
    icon ~Get Your Files Here !/2. Basics of Application Security/1. SDLC vs Secure SDLC.mp4 39.3 MB
    icon ~Get Your Files Here !/2. Basics of Application Security/10. Basic Security Terms in Application Security.mp4 15.7 MB
    icon ~Get Your Files Here !/2. Basics of Application Security/11. What is CWE & CVE & CVSS.mp4 84.2 MB
    icon ~Get Your Files Here !/2. Basics of Application Security/2. Security Activities at each phase in Secure SDLC.mp4 128.4 MB
    icon ~Get Your Files Here !/2. Basics of Application Security/3. Security Job Roles to perform security activities at each phase in Secure SDLC.mp4 105.1 MB
    icon ~Get Your Files Here !/2. Basics of Application Security/4. Find security jobs on job hunting platforms in application security.mp4 77.6 MB
    icon ~Get Your Files Here !/2. Basics of Application Security/5. Technical Requirements and Expertise for a job of Sr Security Engineer.mp4 26.5 MB
    icon ~Get Your Files Here !/2. Basics of Application Security/6. Technical Requirements and Expertise for a job of DevSecOps Engineer.mp4 115.1 MB
    icon ~Get Your Files Here !/2. Basics of Application Security/7. Technical Requirements and Expertise for a job of VAPT Engineer.mp4 19.9 MB
    icon ~Get Your Files Here !/2. Basics of Application Security/8. Technical Requirements and Expertise for a job of Pen Test Engineer.mp4 43.8 MB
    icon ~Get Your Files Here !/2. Basics of Application Security/9. Common Technical Requirements and Expertise for Security Job Roles.mp4 26.4 MB
    icon ~Get Your Files Here !/3. Lab Environment Setup for learning basic security requirements i.e. OWASP TOP 10/1. Hands On Install NodeJs for OWASP Juice Shop - First Step.mp4 27.9 MB
    icon ~Get Your Files Here !/3. Lab Environment Setup for learning basic security requirements i.e. OWASP TOP 10/2. Hands On Install OWASP Juice Shop on local System - Part 2.mp4 41.7 MB
    icon ~Get Your Files Here !/3. Lab Environment Setup for learning basic security requirements i.e. OWASP TOP 10/3. Hands On Install Burp Suite on Local System.mp4 16.4 MB
    icon ~Get Your Files Here !/3. Lab Environment Setup for learning basic security requirements i.e. OWASP TOP 10/4. Hands On Configure Burp Suite with Chrome Browser.mp4 50.4 MB
    icon ~Get Your Files Here !/4. Hands On with Basics Deep Dive in OWASP TOP 10/1. A012021-Broken Access Control.mp4 80.4 MB
    icon ~Get Your Files Here !/4. Hands On with Basics Deep Dive in OWASP TOP 10/10. A102021-Server-Side Request Forgery.mp4 68.8 MB
    icon ~Get Your Files Here !/4. Hands On with Basics Deep Dive in OWASP TOP 10/2. A022021-Cryptographic Failures.mp4 66.1 MB
    icon ~Get Your Files Here !/4. Hands On with Basics Deep Dive in OWASP TOP 10/3. A032021-Injection.mp4 47.4 MB
    icon ~Get Your Files Here !/4. Hands On with Basics Deep Dive in OWASP TOP 10/4. A042021-Insecure Design.mp4 48.7 MB
    icon ~Get Your Files Here !/4. Hands On with Basics Deep Dive in OWASP TOP 10/5. A052021-Security Misconfiguration.mp4 70.8 MB
    icon ~Get Your Files Here !/4. Hands On with Basics Deep Dive in OWASP TOP 10/6. A062021-Vulnerable and Outdated Components.mp4 91.5 MB
    icon ~Get Your Files Here !/4. Hands On with Basics Deep Dive in OWASP TOP 10/7. A072021-Identification and Authentication Failures.mp4 101.6 MB
    icon ~Get Your Files Here !/4. Hands On with Basics Deep Dive in OWASP TOP 10/8. A082021-Software and Data Integrity Failures.mp4 25.6 MB
    icon ~Get Your Files Here !/4. Hands On with Basics Deep Dive in OWASP TOP 10/9. A092021-Security Logging and Monitoring Failures.mp4 40.5 MB
    icon ~Get Your Files Here !/5. Learn Security Architecture and Review with Threat Modeling in App Security/1. What is Security Architecture & Design Review (SAR).mp4 61.8 MB
    icon ~Get Your Files Here !/5. Learn Security Architecture and Review with Threat Modeling in App Security/2. 4 Step Process to perform Security Architecture & Design Review in Real Life.mp4 50 MB
    icon ~Get Your Files Here !/5. Learn Security Architecture and Review with Threat Modeling in App Security/3. Hands On Create an account with IriusRisk.mp4 28.9 MB
    icon ~Get Your Files Here !/5. Learn Security Architecture and Review with Threat Modeling in App Security/4. Hands On Create a Data Flow Diagram with Irius Risk.mp4 47.7 MB
    icon ~Get Your Files Here !/5. Learn Security Architecture and Review with Threat Modeling in App Security/5. Hands On Perform Threat Modeling and Generate Reports using IriusRisk.mp4 71.7 MB
    icon ~Get Your Files Here !/6. Learn DevSecOps in Application Security with Example/1. What is DevSecOps.mp4 8.3 MB
    icon ~Get Your Files Here !/6. Learn DevSecOps in Application Security with Example/2. Tools used for DevSecOps Implementation in the market - Detailed discussion.mp4 21.5 MB
    icon ~Get Your Files Here !/6. Learn DevSecOps in Application Security with Example/3. Case Study Understanding Project Requirements before workflow implementation.mp4 12.1 MB
    icon ~Get Your Files Here !/6. Learn DevSecOps in Application Security with Example/4. Hands On Write code changes to integrate SAST, SCA & DAST in DevSecOps Pipeline.mp4 81.2 MB
    icon ~Get Your Files Here !/6. Learn DevSecOps in Application Security with Example/4.1 GitHub Repo for this lecture.html 138 B
    icon ~Get Your Files Here !/6. Learn DevSecOps in Application Security with Example/5. Hands On Execute End to End GitLab DevSecOps Pipeline and review logs.mp4 47.8 MB
    icon ~Get Your Files Here !/7. Next Steps/1. Bonus Lecture.html 4.4 KB
    icon ~Get Your Files Here !/Bonus Resources.txt 386 B

Similar Torrents