TorBT - Torrents and Magnet Links Search Engine
[ FreeCourseWeb.com ] EC-Council - OWASP Top 10 Security Fundamentals
- Date: 2022-02-03
- Size: 2.9 GB
- Files: 35
File Name
Size
Get Bonus Downloads Here.url
183 B
~Get Your Files Here !/Bonus Resources.txt
357 B
~Get Your Files Here !/Chapter 1 World Wide Web Fundamentals/1. Course Overview .mp4
56 MB
~Get Your Files Here !/Chapter 1 World Wide Web Fundamentals/2. Introduction to the OWASP Top 10 .mp4
78 MB
~Get Your Files Here !/Chapter 1 World Wide Web Fundamentals/3. How the World Wide Web Works- .mp4
108 MB
~Get Your Files Here !/Chapter 10 Using Components with Known Vulnerabilities/28. Threat Analysis .mp4
40 MB
~Get Your Files Here !/Chapter 10 Using Components with Known Vulnerabilities/29. Exploitation .mp4
121 MB
~Get Your Files Here !/Chapter 10 Using Components with Known Vulnerabilities/30. Mitigation .mp4
128 MB
~Get Your Files Here !/Chapter 11 Insufficient Logging & Monitoring/31. Threat Analysis .mp4
30 MB
~Get Your Files Here !/Chapter 11 Insufficient Logging & Monitoring/32. Exploitation .mp4
100 MB
~Get Your Files Here !/Chapter 11 Insufficient Logging & Monitoring/33. Mitigation .mp4
104 MB
~Get Your Files Here !/Chapter 2 Injection Flaws/4. Threat Analysis .mp4
88 MB
~Get Your Files Here !/Chapter 2 Injection Flaws/5. Exploitation .mp4
122 MB
~Get Your Files Here !/Chapter 2 Injection Flaws/6. Mitigation .mp4
81 MB
~Get Your Files Here !/Chapter 3 Broken Authentication/7. Threat Analysis .mp4
45 MB
~Get Your Files Here !/Chapter 3 Broken Authentication/8. Exploitation .mp4
64 MB
~Get Your Files Here !/Chapter 3 Broken Authentication/9. Mitigation .mp4
119 MB
~Get Your Files Here !/Chapter 4 Sensitive Data Exposure/10. Threat Analysis .mp4
51 MB
~Get Your Files Here !/Chapter 4 Sensitive Data Exposure/11. Exploitation .mp4
119 MB
~Get Your Files Here !/Chapter 4 Sensitive Data Exposure/12. Mitigation .mp4
154 MB
~Get Your Files Here !/Chapter 5 XML External Entities (XXE)/13. Threat Analysis .mp4
56 MB
~Get Your Files Here !/Chapter 5 XML External Entities (XXE)/14. Exploitation .mp4
61 MB
~Get Your Files Here !/Chapter 5 XML External Entities (XXE)/15. Mitigation .mp4
86 MB
~Get Your Files Here !/Chapter 6 Broken Access Control/16. Threat Analysis .mp4
50 MB
~Get Your Files Here !/Chapter 6 Broken Access Control/17. Exploitation .mp4
107 MB
~Get Your Files Here !/Chapter 6 Broken Access Control/18. Mitigation .mp4
129 MB
~Get Your Files Here !/Chapter 7 Security Misconfiguration/19. Threat Analysis .mp4
35 MB
~Get Your Files Here !/Chapter 7 Security Misconfiguration/20. Exploitation .mp4
110 MB
~Get Your Files Here !/Chapter 7 Security Misconfiguration/21. Mitigation .mp4
144 MB
~Get Your Files Here !/Chapter 8 Cross-Site Scripting (XSS)/22. Threat Analysis .mp4
88 MB
~Get Your Files Here !/Chapter 8 Cross-Site Scripting (XSS)/23. Exploitation .mp4
113 MB
~Get Your Files Here !/Chapter 8 Cross-Site Scripting (XSS)/24. Mitigation .mp4
89 MB
~Get Your Files Here !/Chapter 9 Insecure Deserialization/25. Threat Analysis .mp4
53 MB
~Get Your Files Here !/Chapter 9 Insecure Deserialization/26. Exploitation .mp4
152 MB
~Get Your Files Here !/Chapter 9 Insecure Deserialization/27. Mitigation .mp4
61 MB