Create Tool:
Create Time:1970-01-01 08:00:00
File Size:1076.74 MB
File Count:44
File Hash:7a2359727301caf3aa11d2cf8f4be7585013c4e1
Get Bonus Downloads Here.url | 182 B |
~Get Your Files Here !/1. Introduction to Web Application Security/1. Understanding the Importance of Web Application Security.mp4 | 30.01 MB |
~Get Your Files Here !/1. Introduction to Web Application Security/2. The Role of OWASP in Web Application Security.mp4 | 37.49 MB |
~Get Your Files Here !/2. OWASP Top Ten/1. Introduction to the OWASP Top Ten.mp4 | 27.47 MB |
~Get Your Files Here !/2. OWASP Top Ten/10. A9 Using Components with Known Vulnerabilities.mp4 | 28.69 MB |
~Get Your Files Here !/2. OWASP Top Ten/11. A10 Insufficient Logging and Monitoring.mp4 | 26.55 MB |
~Get Your Files Here !/2. OWASP Top Ten/2. A1 Injection.mp4 | 20.63 MB |
~Get Your Files Here !/2. OWASP Top Ten/3. A2 Broken Authentication.mp4 | 24.59 MB |
~Get Your Files Here !/2. OWASP Top Ten/4. A3 Sensitive Data Exposure.mp4 | 25.30 MB |
~Get Your Files Here !/2. OWASP Top Ten/5. A4 XML External Entities (XXE).mp4 | 17.35 MB |
~Get Your Files Here !/2. OWASP Top Ten/6. A5 Broken Access Control.mp4 | 24.74 MB |
~Get Your Files Here !/2. OWASP Top Ten/7. A6 Security Misconfiguration.mp4 | 26.56 MB |
~Get Your Files Here !/2. OWASP Top Ten/8. A7 Cross-Site Scripting (XSS).mp4 | 22.61 MB |
~Get Your Files Here !/2. OWASP Top Ten/9. A8 Insecure Deserialization.mp4 | 22.01 MB |
~Get Your Files Here !/3. Secure Coding and Development/1. Principles of Secure Coding.mp4 | 36.84 MB |
~Get Your Files Here !/3. Secure Coding and Development/2. OWASP Secure Coding Guidelines.mp4 | 34.63 MB |
~Get Your Files Here !/3. Secure Coding and Development/3. Input Validation and Output Encoding.mp4 | 24.27 MB |
~Get Your Files Here !/3. Secure Coding and Development/4. Authentication and Session Management.mp4 | 25.58 MB |
~Get Your Files Here !/3. Secure Coding and Development/5. Data Validation and Sanitization.mp4 | 24.47 MB |
~Get Your Files Here !/3. Secure Coding and Development/6. Error Handling and Logging.mp4 | 22.59 MB |
~Get Your Files Here !/4. OWASP Tools and Resources/1. Introduction to OWASP Tools and Projects.mp4 | 24.71 MB |
~Get Your Files Here !/4. OWASP Tools and Resources/2. OWASP Web Security Testing Guide.mp4 | 26.45 MB |
~Get Your Files Here !/4. OWASP Tools and Resources/3. OWASP Application Security Verification Standard.mp4 | 28.53 MB |
~Get Your Files Here !/4. OWASP Tools and Resources/4. OWASP ZAP (Zed Attack Proxy) Overview.mp4 | 20.85 MB |
~Get Your Files Here !/4. OWASP Tools and Resources/5. OWASP Resources and Documentation.mp4 | 29.15 MB |
~Get Your Files Here !/5. Securing APIs and Web Services/1. API Security Challenges.mp4 | 27.55 MB |
~Get Your Files Here !/5. Securing APIs and Web Services/2. OWASP API Security Top Ten.mp4 | 25.07 MB |
~Get Your Files Here !/5. Securing APIs and Web Services/3. Authentication and Authorization in APIs.mp4 | 25.50 MB |
~Get Your Files Here !/5. Securing APIs and Web Services/4. Data Validation and Input Sanitization for APIs.mp4 | 26.28 MB |
~Get Your Files Here !/5. Securing APIs and Web Services/5. Securing Web Services.mp4 | 22.76 MB |
~Get Your Files Here !/6. Client-Side Security/1. Understanding Client-Side Security Threats.mp4 | 21.37 MB |
~Get Your Files Here !/6. Client-Side Security/2. OWASP Secure Coding Practices for JavaScript.mp4 | 27.00 MB |
~Get Your Files Here !/6. Client-Side Security/3. Cross-Site Scripting (XSS) Prevention.mp4 | 21.52 MB |
~Get Your Files Here !/6. Client-Side Security/4. Content Security Policy (CSP).mp4 | 22.78 MB |
~Get Your Files Here !/6. Client-Side Security/5. Cross-Origin Resource Sharing (CORS).mp4 | 18.56 MB |
~Get Your Files Here !/7. Web Application Security Assessment/1. Introduction to Security Assessment.mp4 | 28.60 MB |
~Get Your Files Here !/7. Web Application Security Assessment/2. OWASP Testing Guide.mp4 | 21.17 MB |
~Get Your Files Here !/7. Web Application Security Assessment/3. Manual and Automated Testing Techniques.mp4 | 26.90 MB |
~Get Your Files Here !/7. Web Application Security Assessment/4. Reporting Security Findings.mp4 | 28.73 MB |
~Get Your Files Here !/8. Security in the SDLC/1. Integrating Security in the Software Development Lifecycle (SDLC).mp4 | 29.60 MB |
~Get Your Files Here !/8. Security in the SDLC/2. Secure Development Phases.mp4 | 23.72 MB |
~Get Your Files Here !/8. Security in the SDLC/3. OWASP SAMM (Software Assurance Maturity Model).mp4 | 22.51 MB |
~Get Your Files Here !/8. Security in the SDLC/4. Building a Security Culture.mp4 | 25.05 MB |
~Get Your Files Here !/Bonus Resources.txt | 386 B |
http://tracker.foreverpirates.co:80/announce |
http://tracker.openbittorrent.com:80/announce |
udp://9.rarbg.me:2720/announce |
udp://9.rarbg.to:2780/announce |
udp://9.rarbg.to:2900/announce |
udp://coppersurfer.tk:6969/announce |
udp://exodus.desync.com:6969/announce |
udp://explodie.org:6969/announce |
udp://ipv4.tracker.harry.lu:80/announce |
udp://open.stealth.si:80/announce |
udp://opentor.org:2710/announce |
udp://opentracker.i2p.rocks:6969/announce |
udp://tracker.cyberia.is:6969/announce |
udp://tracker.internetwarriors.net:1337/announce |
udp://tracker.leechers-paradise.org:6969/announce |
udp://tracker.opentrackr.org:1337/announce |
udp://tracker.tiny-vps.com:6969/announce |
udp://tracker.torrent.eu.org:451/announce |
udp://tracker.zer0day.to:1337/announce |
TorrentBank
Copyright © 2024