TorBT - Torrents and Magnet Links Search Engine

Udemy - Cybersecurity for Developers From Basics to Best Practices (9.2024)

File Name
Size
1 - Introduction/1 - All resources and links for the lesson.txt
96 B
1 - Introduction/1 - Communication plan.mp4
75 MB
1 - Introduction/2 - Introduction to Cybersecurity and the Role of OWASP.html
4.3 kB
2 - OWASP Top 10 2021/10 - Injection XPath Injection Log Injection Input Validation.mp4
104 MB
2 - OWASP Top 10 2021/10 - Source code examples from the lesson.txt
158 B
2 - OWASP Top 10 2021/11 - Insecure Design Overivew CWEs Shift Left Security Threat Modeling Manifesto.mp4
137 MB
2 - OWASP Top 10 2021/12 - Insecure Design Secure Design Process Security Controls Metrics Examples.mp4
150 MB
2 - OWASP Top 10 2021/13 - Security Misconfiguration Overview CWEs Types Reallife attacks.mp4
128 MB
2 - OWASP Top 10 2021/14 - All resources and links for the lesson.txt
96 B
2 - OWASP Top 10 2021/14 - Security Misconfiguration Hardening Zero Trust Defense in Depth Practice.mp4
259 MB
2 - OWASP Top 10 2021/15 - All resources and links for the lesson.txt
96 B
2 - OWASP Top 10 2021/15 - Vulnerable Outdated Components.mp4
241 MB
2 - OWASP Top 10 2021/16 - Identification Authentication Failures.mp4
258 MB
2 - OWASP Top 10 2021/17 - Software Data Integrity Failures.mp4
137 MB
2 - OWASP Top 10 2021/18 - Computer Security Incident Handling Guide.txt
74 B
2 - OWASP Top 10 2021/18 - Security Logging Monitoring Failures.mp4
168 MB
2 - OWASP Top 10 2021/19 - ServerSide Request Forgery SSRF.mp4
163 MB
2 - OWASP Top 10 2021/3 - Common Weakness Enumeration CWE official website.txt
32 B
2 - OWASP Top 10 2021/3 - OWASP Top 10 Overview.mp4
146 MB
2 - OWASP Top 10 2021/4 - Broken Access Control.mp4
459 MB
2 - OWASP Top 10 2021/4 - Source code examples from the lesson.txt
152 B
2 - OWASP Top 10 2021/5 - Cryptography Failures Theory Sensitive Data Data Breach Types of Failures.mp4
116 MB
2 - OWASP Top 10 2021/6 - Cryptography Failures Practical Examples SQL Injections TLSSSL HTTPS.mp4
153 MB
2 - OWASP Top 10 2021/6 - Source code examples from the lesson.txt
151 B
2 - OWASP Top 10 2021/7 - Cryptography Failures Examples Password Encryption Hashing Salting.mp4
208 MB
2 - OWASP Top 10 2021/7 - Source code examples from the lesson.txt
151 B
2 - OWASP Top 10 2021/8 - Injection Overview Fuzzing CWEs Impact Injection Types Command Injection.mp4
148 MB
2 - OWASP Top 10 2021/9 - Injection Cross Site Scripting Types of XSS SQL JPA NoSQL Injections.mp4
146 MB
3 - OWASP API Top 10 2023/20 - OWASP API Security Project OWASP API Security Top 10 2023.html
8.9 kB
3 - OWASP API Top 10 2023/21 - API12023 Broken Object Level Authorization Part 1.mp4
203 MB
3 - OWASP API Top 10 2023/22 - API12023 Broken Object Level Authorization Part 2 Practice.mp4
94 MB
3 - OWASP API Top 10 2023/22 - Source code examples from the lesson.txt
111 B
3 - OWASP API Top 10 2023/23 - API12023 Broken Object Level Authorization Part 3 ZeroTrust UUIDs.mp4
261 MB
3 - OWASP API Top 10 2023/24 - API22023 Broken Authentication Part 1 Basics Impact Types of Attacks.mp4
203 MB
3 - OWASP API Top 10 2023/25 - API22023 Broken Authentication Part 2 Case Studies OAuth OpenID.mp4
252 MB
3 - OWASP API Top 10 2023/26 - API22023 Broken Authentication P3 Practice JWT Tokens Timing Attacks.mp4
355 MB
3 - OWASP API Top 10 2023/26 - Source code examples from the lesson.txt
111 B
3 - OWASP API Top 10 2023/27 - API32023 Broken Object Property Level Authorization Part 1.mp4
208 MB
3 - OWASP API Top 10 2023/28 - API32023 Broken Object Property Level Authorization Part 2 Practice.mp4
221 MB
3 - OWASP API Top 10 2023/28 - Source code examples from the lesson.txt
154 B
3 - OWASP API Top 10 2023/29 - API42023 Unrestricted Resource Consumption Part 1.mp4
298 MB
3 - OWASP API Top 10 2023/30 - API42023 Unrestricted Resource Consumption Part 2 Practice.mp4
122 MB
3 - OWASP API Top 10 2023/30 - Source code examples from the lesson.txt
152 B
3 - OWASP API Top 10 2023/31 - API52023 Broken Function Level Authorization Part 1.mp4
91 MB
3 - OWASP API Top 10 2023/32 - API52023 Broken Function Level Authorization Part 2 Practice.mp4
102 MB
3 - OWASP API Top 10 2023/32 - Source code examples from the lesson.txt
153 B
3 - OWASP API Top 10 2023/33 - API62023 Unrestricted Access to Sensitive Business Flows Part 1.mp4
99 MB
3 - OWASP API Top 10 2023/34 - API62023 Unrestricted Access to Sensitive Business Flows Part 2.mp4
267 MB
3 - OWASP API Top 10 2023/35 - API62023 Unrestricted Access to Sensitive Business Flows Part 3 Practice.mp4
118 MB
3 - OWASP API Top 10 2023/35 - Source code examples from the lesson.txt
154 B
3 - OWASP API Top 10 2023/36 - API72023 Server Side Request Forgery.html
6.0 kB
3 - OWASP API Top 10 2023/37 - API82023 Security Misconfiguration.html
3.9 kB
3 - OWASP API Top 10 2023/38 - API92023 Improper Inventory Management Part 1.mp4
300 MB
3 - OWASP API Top 10 2023/39 - API92023 Improper Inventory Management Part 2 Practice.mp4
128 MB
3 - OWASP API Top 10 2023/40 - API102023 Unsafe Consumption of APIs Part 1.mp4
330 MB
3 - OWASP API Top 10 2023/41 - API102023 Unsafe Consumption of APIs Part 2 Practice.mp4
148 MB
3 - OWASP API Top 10 2023/41 - Source code examples from the lesson.txt
152 B
4 - Bonus section/42 - All resources and links for the lesson.txt
96 B
4 - Bonus section/42 - Bonus lesson.mp4
48 MB