[ FreeCourseWeb.com ] PluralSight - API Security with the OWASP API Security Top 10 - TorrentBank

File Name:[ FreeCourseWeb.com ] PluralSight - API Security with the OWASP API Security Top 10

Create Tool:

Create Time:2023-09-01 19:45:21

File Size:218.51 MB

File Count:73

File Hash:eb1d498ef1af3995a22f3a08a1856b4f4d027998

Magnet Link:

Magnet Link:

Torrent File:

Get Bonus Downloads Here.url 183 B
~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4 4.03 MB
~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt 2.24 KB
~Get Your Files Here !/10. Security Misconfiguration/1. Misconfiguration and Patching.mp4 5.30 MB
~Get Your Files Here !/10. Security Misconfiguration/1. Misconfiguration and Patching.vtt 4.31 KB
~Get Your Files Here !/10. Security Misconfiguration/2. HTTP Request Chain Misconfigurations.mp4 3.40 MB
~Get Your Files Here !/10. Security Misconfiguration/2. HTTP Request Chain Misconfigurations.vtt 2.82 KB
~Get Your Files Here !/10. Security Misconfiguration/3. Server Environment Misconfigurations.mp4 6.50 MB
~Get Your Files Here !/10. Security Misconfiguration/3. Server Environment Misconfigurations.vtt 4.05 KB
~Get Your Files Here !/10. Security Misconfiguration/4. Misconfiguration in the API and Response Chain.mp4 10.70 MB
~Get Your Files Here !/10. Security Misconfiguration/4. Misconfiguration in the API and Response Chain.vtt 9.11 KB
~Get Your Files Here !/11. Improper Inventory Management/1. Understanding Improper Inventory Management.mp4 5.97 MB
~Get Your Files Here !/11. Improper Inventory Management/1. Understanding Improper Inventory Management.vtt 4.49 KB
~Get Your Files Here !/11. Improper Inventory Management/2. Demo - Deprecated Functionality.mp4 4.41 MB
~Get Your Files Here !/11. Improper Inventory Management/2. Demo - Deprecated Functionality.vtt 2.88 KB
~Get Your Files Here !/11. Improper Inventory Management/3. Attacks and Defenses.mp4 9.17 MB
~Get Your Files Here !/11. Improper Inventory Management/3. Attacks and Defenses.vtt 7.40 KB
~Get Your Files Here !/12. Unsafe Consumption of APIs/1. Understanding Unsafe Consumption of APIs.mp4 4.04 MB
~Get Your Files Here !/12. Unsafe Consumption of APIs/1. Understanding Unsafe Consumption of APIs.vtt 3.32 KB
~Get Your Files Here !/12. Unsafe Consumption of APIs/2. API Consumption Attacks.mp4 2.59 MB
~Get Your Files Here !/12. Unsafe Consumption of APIs/2. API Consumption Attacks.vtt 2.29 KB
~Get Your Files Here !/12. Unsafe Consumption of APIs/3. API Consumption Defenses.mp4 8.59 MB
~Get Your Files Here !/12. Unsafe Consumption of APIs/3. API Consumption Defenses.vtt 6.96 KB
~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/1. Using the OWASP API Security Top 10.mp4 10.37 MB
~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/1. Using the OWASP API Security Top 10.vtt 6.64 KB
~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/2. Metrics behind the Top 10 Risks.mp4 7.48 MB
~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/2. Metrics behind the Top 10 Risks.vtt 5.50 KB
~Get Your Files Here !/3. Broken Object Level Authorization/1. Understanding Broken Object Level Authorization.mp4 3.12 MB
~Get Your Files Here !/3. Broken Object Level Authorization/1. Understanding Broken Object Level Authorization.vtt 2.16 KB
~Get Your Files Here !/3. Broken Object Level Authorization/2. Object Level Attacks.mp4 4.77 MB
~Get Your Files Here !/3. Broken Object Level Authorization/2. Object Level Attacks.vtt 3.76 KB
~Get Your Files Here !/3. Broken Object Level Authorization/3. Demo - Broken Object Level Attacks.mp4 10.52 MB
~Get Your Files Here !/3. Broken Object Level Authorization/3. Demo - Broken Object Level Attacks.vtt 3.34 KB
~Get Your Files Here !/3. Broken Object Level Authorization/4. Examining Defenses.mp4 3.57 MB
~Get Your Files Here !/3. Broken Object Level Authorization/4. Examining Defenses.vtt 2.48 KB
~Get Your Files Here !/4. Broken Authentication/1. Understanding Broken Authentication.mp4 3.10 MB
~Get Your Files Here !/4. Broken Authentication/1. Understanding Broken Authentication.vtt 2.35 KB
~Get Your Files Here !/4. Broken Authentication/2. Password Based Attacks and Defenses.mp4 9.73 MB
~Get Your Files Here !/4. Broken Authentication/2. Password Based Attacks and Defenses.vtt 7.14 KB
~Get Your Files Here !/4. Broken Authentication/3. Other Attacks and Defenses.mp4 7.93 MB
~Get Your Files Here !/4. Broken Authentication/3. Other Attacks and Defenses.vtt 5.94 KB
~Get Your Files Here !/4. Broken Authentication/4. Demo - Common JWT Attacks.mp4 10.71 MB
~Get Your Files Here !/4. Broken Authentication/4. Demo - Common JWT Attacks.vtt 4.78 KB
~Get Your Files Here !/5. Broken Object Property Level Authorization/1. Understanding Broken Object Property Level Authorization.mp4 3.88 MB
~Get Your Files Here !/5. Broken Object Property Level Authorization/1. Understanding Broken Object Property Level Authorization.vtt 2.97 KB
~Get Your Files Here !/5. Broken Object Property Level Authorization/2. Object Property Attacks and Defenses.mp4 3.71 MB
~Get Your Files Here !/5. Broken Object Property Level Authorization/2. Object Property Attacks and Defenses.vtt 3.24 KB
~Get Your Files Here !/5. Broken Object Property Level Authorization/3. Demo - Exploiting Object Properties.mp4 6.43 MB
~Get Your Files Here !/5. Broken Object Property Level Authorization/3. Demo - Exploiting Object Properties.vtt 3.72 KB
~Get Your Files Here !/6. Unrestricted Resource Consumption/1. Unrestricted Resource Consumption Attacks.mp4 6.37 MB
~Get Your Files Here !/6. Unrestricted Resource Consumption/1. Unrestricted Resource Consumption Attacks.vtt 4.54 KB
~Get Your Files Here !/6. Unrestricted Resource Consumption/2. Defenses for Resource Consumption.mp4 5.50 MB
~Get Your Files Here !/6. Unrestricted Resource Consumption/2. Defenses for Resource Consumption.vtt 4.00 KB
~Get Your Files Here !/7. Broken Function Level Authorization/1. Attacking Broken Function Level Authorization.mp4 5.36 MB
~Get Your Files Here !/7. Broken Function Level Authorization/1. Attacking Broken Function Level Authorization.vtt 4.26 KB
~Get Your Files Here !/7. Broken Function Level Authorization/2. Demo - Exploiting Broken Function Level Authorization.mp4 10.82 MB
~Get Your Files Here !/7. Broken Function Level Authorization/2. Demo - Exploiting Broken Function Level Authorization.vtt 3.38 KB
~Get Your Files Here !/7. Broken Function Level Authorization/3. Defenses.mp4 5.82 MB
~Get Your Files Here !/7. Broken Function Level Authorization/3. Defenses.vtt 4.26 KB
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/1. Sensitive Business Flows and Potential Attacks.mp4 6.61 MB
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/1. Sensitive Business Flows and Potential Attacks.vtt 4.95 KB
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/2. Demo - Attacking an Unrestricted Business Flow.mp4 5.78 MB
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/2. Demo - Attacking an Unrestricted Business Flow.vtt 2.91 KB
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/3. Business Flow Defenses.mp4 6.06 MB
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/3. Business Flow Defenses.vtt 5.00 KB
~Get Your Files Here !/9. Server-side Request Forgery/1. Understanding Server-side Request Forgery.mp4 6.43 MB
~Get Your Files Here !/9. Server-side Request Forgery/1. Understanding Server-side Request Forgery.vtt 4.73 KB
~Get Your Files Here !/9. Server-side Request Forgery/2. Demo - Forging Requests from the Server.mp4 4.34 MB
~Get Your Files Here !/9. Server-side Request Forgery/2. Demo - Forging Requests from the Server.vtt 3.22 KB
~Get Your Files Here !/9. Server-side Request Forgery/3. SSRF Defenses.mp4 5.22 MB
~Get Your Files Here !/9. Server-side Request Forgery/3. SSRF Defenses.vtt 3.86 KB
~Get Your Files Here !/Bonus Resources.txt 386 B
~Get Your Files Here !/playlist.m3u 2.63 KB
No trackers found

TorrentBank
Copyright © 2024