[ DevCourseWeb.com ] Udemy - Learn Web Application Security For Beginners- OWASP Top 10
File List
- ~Get Your Files Here !/2. Blue vs Read Team (Optional)/3. Cyber Defense strategies(Blue Team).mp4 94.3 MB
- ~Get Your Files Here !/4. Penetration Testing/3. DVWA Setup.mp4 74.1 MB
- ~Get Your Files Here !/3. OWASP Top 10/3. A1 - Broken Access Control.mp4 74.1 MB
- ~Get Your Files Here !/3. OWASP Top 10/4. A2 - Cryptographic Failures.mp4 56.6 MB
- ~Get Your Files Here !/1. Introduction/3. Introduction to Penetration Testing.mp4 48.5 MB
- ~Get Your Files Here !/2. Blue vs Read Team (Optional)/1. Blue vs Red team Strategy.mp4 48.5 MB
- ~Get Your Files Here !/3. OWASP Top 10/11. A9 - Security Logging and Monitoring Failures.mp4 48.1 MB
- ~Get Your Files Here !/2. Blue vs Read Team (Optional)/2. Cyber attack Strategies(Red Team).mp4 46.8 MB
- ~Get Your Files Here !/3. OWASP Top 10/7. A5 - Security Misconfiguration.mp4 45.0 MB
- ~Get Your Files Here !/1. Introduction/2. Introduction to Application Security.mp4 43.3 MB
- ~Get Your Files Here !/4. Penetration Testing/4. SQL Injection.mp4 43.2 MB
- ~Get Your Files Here !/3. OWASP Top 10/10. A8 - Software and Data Integrity Failures.mp4 42.4 MB
- ~Get Your Files Here !/3. OWASP Top 10/9. A7 - Identification and Authentication Failures.mp4 41.7 MB
- ~Get Your Files Here !/4. Penetration Testing/6. Brute Force.mp4 41.2 MB
- ~Get Your Files Here !/3. OWASP Top 10/12. A10 - Server-Side Request Forgery.mp4 36.7 MB
- ~Get Your Files Here !/3. OWASP Top 10/8. A6 - Vulnerable and Outdated Components.mp4 32.7 MB
- ~Get Your Files Here !/3. OWASP Top 10/5. A3 - Injection.mp4 30.4 MB
- ~Get Your Files Here !/3. OWASP Top 10/2. The vulnerabilities in the The OWASP Top 10.mp4 29.6 MB
- ~Get Your Files Here !/3. OWASP Top 10/6. A4 - Insecure Design.mp4 28.9 MB
- ~Get Your Files Here !/4. Penetration Testing/5. SQL Injection (Medium).mp4 28.5 MB
- ~Get Your Files Here !/4. Penetration Testing/7. CSRF (Cross-site request forgery).mp4 19.6 MB
- ~Get Your Files Here !/4. Penetration Testing/2. Introduction To DVWA.mp4 13.5 MB
- ~Get Your Files Here !/4. Penetration Testing/1. Introduction To Virtual Machines.mp4 13.1 MB
- ~Get Your Files Here !/3. OWASP Top 10/1. What is the OWASP.mp4 10.9 MB
- ~Get Your Files Here !/1. Introduction/1. Introduction.mp4 10.5 MB
- ~Get Your Files Here !/4. Penetration Testing/3. DVWA Setup.srt 14.8 KB
- ~Get Your Files Here !/2. Blue vs Read Team (Optional)/3. Cyber Defense strategies(Blue Team).srt 14.0 KB
- ~Get Your Files Here !/4. Penetration Testing/6. Brute Force.srt 13.3 KB
- ~Get Your Files Here !/4. Penetration Testing/4. SQL Injection.srt 10.8 KB
- ~Get Your Files Here !/2. Blue vs Read Team (Optional)/2. Cyber attack Strategies(Red Team).srt 9.6 KB
- ~Get Your Files Here !/2. Blue vs Read Team (Optional)/1. Blue vs Red team Strategy.srt 8.8 KB
- ~Get Your Files Here !/3. OWASP Top 10/3. A1 - Broken Access Control.srt 7.9 KB
- ~Get Your Files Here !/4. Penetration Testing/7. CSRF (Cross-site request forgery).srt 7.5 KB
- ~Get Your Files Here !/4. Penetration Testing/5. SQL Injection (Medium).srt 6.9 KB
- ~Get Your Files Here !/1. Introduction/2. Introduction to Application Security.srt 5.8 KB
- ~Get Your Files Here !/3. OWASP Top 10/4. A2 - Cryptographic Failures.srt 5.7 KB
- ~Get Your Files Here !/1. Introduction/3. Introduction to Penetration Testing.srt 5.2 KB
- ~Get Your Files Here !/3. OWASP Top 10/11. A9 - Security Logging and Monitoring Failures.srt 5.1 KB
- ~Get Your Files Here !/3. OWASP Top 10/7. A5 - Security Misconfiguration.srt 5.0 KB
- ~Get Your Files Here !/3. OWASP Top 10/9. A7 - Identification and Authentication Failures.srt 4.6 KB
- ~Get Your Files Here !/3. OWASP Top 10/10. A8 - Software and Data Integrity Failures.srt 4.4 KB
- ~Get Your Files Here !/3. OWASP Top 10/12. A10 - Server-Side Request Forgery.srt 4.2 KB
- ~Get Your Files Here !/4. Penetration Testing/1. Introduction To Virtual Machines.srt 3.9 KB
- ~Get Your Files Here !/4. Penetration Testing/2. Introduction To DVWA.srt 3.8 KB
- ~Get Your Files Here !/3. OWASP Top 10/8. A6 - Vulnerable and Outdated Components.srt 3.4 KB
- ~Get Your Files Here !/3. OWASP Top 10/2. The vulnerabilities in the The OWASP Top 10.srt 3.4 KB
- ~Get Your Files Here !/3. OWASP Top 10/6. A4 - Insecure Design.srt 3.0 KB
- ~Get Your Files Here !/3. OWASP Top 10/5. A3 - Injection.srt 3.0 KB
- ~Get Your Files Here !/1. Introduction/1. Introduction.srt 1.8 KB
- ~Get Your Files Here !/3. OWASP Top 10/1. What is the OWASP.srt 1.1 KB
- ~Get Your Files Here !/Bonus Resources.txt 386 bytes
- ~Get Your Files Here !/3. OWASP Top 10/13. What is your experience with security risks mentioned in OWASP Top 10.html 212 bytes
- Get Bonus Downloads Here.url 182 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.