17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Pentesting And Securing Web Applications (Ethical Hacking)
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Computer security is one of the biggest job gaps in history, with a shortage of 3.5 million skilled workers needing to tackle a problem estimated to be worth $6 trillion. This is one of the biggest opportunities in history.
When I was at university I did a lot of security courses and to be honest I was pretty frustrated at how they were taught. The concepts and their importance captured my imagination but I knew it could be taught in a better way… so I created a few YouTube videos on the topic. They were very well received… So well received that after a few years working in industry I decided to make this course.
This course covers all the topics of several of my courses at university. It’s not long, it’s light hearted, and doesn’t feel dense… but all the content is there.
Who this course is for:
University students studying computer science or a related field
Tinkerers wanting to ensure their apps are secure
Employees wanting to improve the cyber security of their firm
Developers interested in learning security
Requirements
Ability to write programs
Basic knowledge of a programming language
(Not required) Preferably have written a mobile or web app before
Last Updated 11/2020
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
TutsNode.com.txt
63 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/1. Be Ethical. Never Hack..mp4
11.1 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/1. Be Ethical. Never Hack..srt
781 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/10. Pentesting using injection.html
172 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/2. Never Hack.html
168 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/3. Injection Intro.mp4
190.2 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/3. Injection Intro.srt
14.2 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/4. SQL Injection.mp4
251.6 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/4. SQL Injection.srt
20 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/5. XML Injection.mp4
114.3 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/5. XML Injection.srt
8.6 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/6. Library Bloat.mp4
53.4 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/6. Library Bloat.srt
3.6 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/7. Cross Site Scripting (XSS).mp4
115 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/7. Cross Site Scripting (XSS).srt
9.1 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/8. Injection Defense.mp4
129.4 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/8. Injection Defense.srt
10 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/9. Do I need to worry about injection here.html
168 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/10. Monitoring and Response/1. Shocking Figures.mp4
63 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/10. Monitoring and Response/1. Shocking Figures.srt
5.8 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/10. Monitoring and Response/2. Identifying an Attack.mp4
107.2 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/10. Monitoring and Response/2. Identifying an Attack.srt
9.3 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/10. Monitoring and Response/3. Honeypots.mp4
28.4 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/10. Monitoring and Response/3. Honeypots.srt
2.7 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/10. Monitoring and Response/4. Breach Response and Defense.mp4
117.6 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/10. Monitoring and Response/4. Breach Response and Defense.srt
9.9 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/10. Monitoring and Response/5. Monitoring and Response Quiz.html
168 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/10. Monitoring and Response/6. Create a Breach Response Plan.html
172 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/11. Conclusion/1. OWASP Top 10.mp4
326.2 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/11. Conclusion/1. OWASP Top 10.srt
25.6 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/11. Conclusion/2. Conclusion.mp4
8 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/11. Conclusion/2. Conclusion.srt
685 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/1. Common Terms.mp4
145.4 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/1. Common Terms.srt
10.8 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/2. Phishing.mp4
66.8 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/2. Phishing.srt
5.4 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/3. Ethics & Legality.mp4
130.6 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/3. Ethics & Legality.srt
10 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/4. Basics.mp4
80.6 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/4. Basics.srt
6.1 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/5. Attack Surface.mp4
152.7 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/5. Attack Surface.srt
10.8 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/6. 0 days.mp4
75.3 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/6. 0 days.srt
6.1 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/7. Brute Force.mp4
206.1 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/7. Brute Force.srt
15.4 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/8. Misconceptions.mp4
95.8 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/8. Misconceptions.srt
7.8 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/9. Core Knowledge Quiz.html
168 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/3. Security Mindset/1. Security Mindset.mp4
412.7 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/3. Security Mindset/1. Security Mindset.srt
28.8 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/4. Client Side and Server Side/1. Client and Server Side.mp4
153 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/4. Client Side and Server Side/1. Client and Server Side.srt
10.8 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/4. Client Side and Server Side/2. Client and Server Side Quiz.html
168 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/5. Authentication and Access Control/1. Authentication and Access Control.mp4
142.2 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/5. Authentication and Access Control/1. Authentication and Access Control.srt
11.9 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/5. Authentication and Access Control/2. Authentication and Access Control Quiz.html
168 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/1. What is a Cryptographic Hash.mp4
42.1 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/1. What is a Cryptographic Hash.srt
3.1 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/2. How is Hashing Useful.mp4
93.5 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/2. How is Hashing Useful.srt
6.4 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/3. Hash Attacks.mp4
183.6 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/3. Hash Attacks.srt
11.2 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/4. Cryptographic Hash Defense.mp4
67.5 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/4. Cryptographic Hash Defense.srt
5.4 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/5. Encryption.mp4
160.2 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/5. Encryption.srt
12.1 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/6. Cryptography Quiz.html
168 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/7. Cross Site Request Forgery/1. Cross Site Request Forgery.mp4
150.4 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/7. Cross Site Request Forgery/1. Cross Site Request Forgery.srt
11.1 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/7. Cross Site Request Forgery/2. CSRF Quiz.html
168 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/8. Deployment/1. DDoS - Distributed Denial of Service.mp4
180.8 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/8. Deployment/1. DDoS - Distributed Denial of Service.srt
13.2 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/8. Deployment/2. Configuration.mp4
198.3 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/8. Deployment/2. Configuration.srt
15 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/8. Deployment/3. Passwords.mp4
124.1 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/8. Deployment/3. Passwords.srt
10.5 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/8. Deployment/4. Deployment Quiz.html
168 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/9. External Packages/1. External Packages.mp4
219 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/9. External Packages/1. External Packages.srt
17.1 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/9. External Packages/2. Implement or Import.mp4
91.1 MB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/9. External Packages/2. Implement or Import.srt
7.6 KB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/9. External Packages/3. External Packages Quiz.html