17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
Secure coding is a skill that every web developer needs to ensure they are protected from common vulnerabilities. This course teaches you about those vulnerabilities, how an attacker might exploit them, and how to avoid them in your Python websites
There are a number of common vulnerabilities that can be exposed by a website which a malicious user can attack. This can result in anything from the website being defaced to the web server and all of its contents being accessed by unauthorized users. In this course, Python Secure Coding Playbook, you’ll learn to protect your websites from attack. First, you'll explore the most common vulnerabilities that you’re likely to see in a website. Then, you'll see what these vulnerabilities could allow an attacker to do and how they might do it. Finally, you’ll learn how to write your Python code to protect your website from attack. When you’re finished with this course, you’ll have the knowledge of secure coding in Python that you need to protect your website from the attacks that it is most likely to face.
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/02/secure-coding-principles-slides.pdf
1.1 MB
~Get Your Files Here !/03/injection-flaws-slides.pdf
1 MB
~Get Your Files Here !/04/broken-authentication-slides.pdf
985.3 KB
~Get Your Files Here !/05/sensitive-data-exposure-slides.pdf
592 KB
~Get Your Files Here !/06/xml-external-entities-xxe-slides.pdf
371.8 KB
~Get Your Files Here !/07/broken-access-control-slides.pdf
938.1 KB
~Get Your Files Here !/08/security-misconfiguration-slides.pdf
661.8 KB
~Get Your Files Here !/09/cross-site-scripting-xss-slides.pdf
1.2 MB
~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4
3.2 MB
~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt
2.2 KB
~Get Your Files Here !/10. Insecure Deserialization/1. Understanding Deserialization.mp4
2.9 MB
~Get Your Files Here !/10. Insecure Deserialization/1. Understanding Deserialization.vtt
2.9 KB
~Get Your Files Here !/10. Insecure Deserialization/2. Types of Deserialization Vulnerability.mp4
5.7 MB
~Get Your Files Here !/10. Insecure Deserialization/2. Types of Deserialization Vulnerability.vtt
5.5 KB
~Get Your Files Here !/10. Insecure Deserialization/3. Demo - Correcting Deserialization Issues.mp4
11.8 MB
~Get Your Files Here !/10. Insecure Deserialization/3. Demo - Correcting Deserialization Issues.vtt
7.2 KB
~Get Your Files Here !/10/insecure-deserialization-slides.pdf
792.4 KB
~Get Your Files Here !/11. Using Components with Known Vulnerabilities/1. Understanding Known Vulnerabilities.mp4
8.8 MB
~Get Your Files Here !/11. Using Components with Known Vulnerabilities/1. Understanding Known Vulnerabilities.vtt
5.3 KB
~Get Your Files Here !/11. Using Components with Known Vulnerabilities/2. Demo - Detecting Known Vulnerabilities.mp4
8.4 MB
~Get Your Files Here !/11. Using Components with Known Vulnerabilities/2. Demo - Detecting Known Vulnerabilities.vtt
6 KB
~Get Your Files Here !/11/using-components-with-known-vulnerabilities-slides.pdf
425.1 KB
~Get Your Files Here !/12. Insufficient Logging and Monitoring/1. Understanding Logging and Monitoring.mp4
7.8 MB
~Get Your Files Here !/12. Insufficient Logging and Monitoring/1. Understanding Logging and Monitoring.vtt
8.4 KB
~Get Your Files Here !/12. Insufficient Logging and Monitoring/2. Demo - Logging Authentication Actions.mp4
11.4 MB
~Get Your Files Here !/12. Insufficient Logging and Monitoring/2. Demo - Logging Authentication Actions.vtt
6.1 KB
~Get Your Files Here !/12. Insufficient Logging and Monitoring/3. Demo - Logging Authorization Actions.mp4
6.3 MB
~Get Your Files Here !/12. Insufficient Logging and Monitoring/3. Demo - Logging Authorization Actions.vtt
4.3 KB
~Get Your Files Here !/12/insufficient-logging-and-monitoring-slides.pdf
855.2 KB
~Get Your Files Here !/2. Secure Coding Principles/1. Secure Coding and the OWASP Top 10.mp4
3.1 MB
~Get Your Files Here !/2. Secure Coding Principles/1. Secure Coding and the OWASP Top 10.vtt
3.2 KB
~Get Your Files Here !/2. Secure Coding Principles/2. Secure Coding Guidelines.mp4
8.1 MB
~Get Your Files Here !/2. Secure Coding Principles/2. Secure Coding Guidelines.vtt
9 KB
~Get Your Files Here !/3. Injection Flaws/1. Understanding Injection Flaws.mp4
2.6 MB
~Get Your Files Here !/3. Injection Flaws/1. Understanding Injection Flaws.vtt
2.5 KB
~Get Your Files Here !/3. Injection Flaws/2. Attacking and Defending SQL Injection.mp4
5.6 MB
~Get Your Files Here !/3. Injection Flaws/2. Attacking and Defending SQL Injection.vtt
5.8 KB
~Get Your Files Here !/3. Injection Flaws/3. Attacking and Defending Operating System Command Injection.mp4
3.6 MB
~Get Your Files Here !/3. Injection Flaws/3. Attacking and Defending Operating System Command Injection.vtt
3.4 KB
~Get Your Files Here !/3. Injection Flaws/4. Demo - Defending Against Injection Attacks in Python.mp4
8.9 MB
~Get Your Files Here !/3. Injection Flaws/4. Demo - Defending Against Injection Attacks in Python.vtt
7.3 KB
~Get Your Files Here !/4. Broken Authentication/1. Authentication Components.mp4
4 MB
~Get Your Files Here !/4. Broken Authentication/1. Authentication Components.vtt
3.8 KB
~Get Your Files Here !/4. Broken Authentication/2. Handling Passwords.mp4
3.6 MB
~Get Your Files Here !/4. Broken Authentication/2. Handling Passwords.vtt
3.8 KB
~Get Your Files Here !/4. Broken Authentication/3. Password Guessing.mp4
2.1 MB
~Get Your Files Here !/4. Broken Authentication/3. Password Guessing.vtt
2.1 KB
~Get Your Files Here !/4. Broken Authentication/4. Demo - Password Guessing Defense.mp4
10.3 MB
~Get Your Files Here !/4. Broken Authentication/4. Demo - Password Guessing Defense.vtt
6.4 KB
~Get Your Files Here !/4. Broken Authentication/5. Credential Stuffing.mp4
3.2 MB
~Get Your Files Here !/4. Broken Authentication/5. Credential Stuffing.vtt
3.2 KB
~Get Your Files Here !/4. Broken Authentication/6. Demo - Credential Stuffing.mp4
12.3 MB
~Get Your Files Here !/4. Broken Authentication/6. Demo - Credential Stuffing.vtt
5.7 KB
~Get Your Files Here !/4. Broken Authentication/7. Demo - Time-based One-time Passwords.mp4
17 MB
~Get Your Files Here !/4. Broken Authentication/7. Demo - Time-based One-time Passwords.vtt
8.2 KB
~Get Your Files Here !/4. Broken Authentication/8. Further Time-based One-time Password Security.mp4
2.6 MB
~Get Your Files Here !/4. Broken Authentication/8. Further Time-based One-time Password Security.vtt
2.6 KB
~Get Your Files Here !/5. Sensitive Data Exposure/1. Data Sensitivity.mp4
2.2 MB
~Get Your Files Here !/5. Sensitive Data Exposure/1. Data Sensitivity.vtt
2.6 KB
~Get Your Files Here !/5. Sensitive Data Exposure/2. Areas of Data Exposure.mp4
9.2 MB
~Get Your Files Here !/5. Sensitive Data Exposure/2. Areas of Data Exposure.vtt
8.4 KB
~Get Your Files Here !/5. Sensitive Data Exposure/3. Demo - Protecting Sensitive Data.mp4
11.5 MB
~Get Your Files Here !/5. Sensitive Data Exposure/3. Demo - Protecting Sensitive Data.vtt
7.1 KB
~Get Your Files Here !/6. XML External Entities (XXE)/1. XXE Attacks.mp4
6.7 MB
~Get Your Files Here !/6. XML External Entities (XXE)/1. XXE Attacks.vtt
6.3 KB
~Get Your Files Here !/6. XML External Entities (XXE)/2. Demo - XXE Attack and Defense.mp4
7.5 MB
~Get Your Files Here !/6. XML External Entities (XXE)/2. Demo - XXE Attack and Defense.vtt
4.3 KB
~Get Your Files Here !/7. Broken Access Control/1. Understanding Authorization.mp4
3.1 MB
~Get Your Files Here !/7. Broken Access Control/1. Understanding Authorization.vtt
3.1 KB
~Get Your Files Here !/7. Broken Access Control/2. Access Control with Role-based Access.mp4
6 MB
~Get Your Files Here !/7. Broken Access Control/2. Access Control with Role-based Access.vtt
6.6 KB
~Get Your Files Here !/7. Broken Access Control/3. Demo - Implementing Role-based Access.mp4
11.7 MB
~Get Your Files Here !/7. Broken Access Control/3. Demo - Implementing Role-based Access.vtt
7.1 KB
~Get Your Files Here !/8. Security Misconfiguration/1. Areas of Misconfiguration.mp4
3.3 MB
~Get Your Files Here !/8. Security Misconfiguration/1. Areas of Misconfiguration.vtt
3.3 KB
~Get Your Files Here !/8. Security Misconfiguration/2. Common Misconfigurations.mp4
4.6 MB
~Get Your Files Here !/8. Security Misconfiguration/2. Common Misconfigurations.vtt
4.2 KB
~Get Your Files Here !/8. Security Misconfiguration/3. Demo - Fixing Common Misconfigurations.mp4
20.1 MB
~Get Your Files Here !/8. Security Misconfiguration/3. Demo - Fixing Common Misconfigurations.vtt
8.8 KB
~Get Your Files Here !/9. Cross-Site Scripting (XSS)/1. Understanding Cross-Site Scripting.mp4
3.1 MB
~Get Your Files Here !/9. Cross-Site Scripting (XSS)/1. Understanding Cross-Site Scripting.vtt
3.2 KB
~Get Your Files Here !/9. Cross-Site Scripting (XSS)/2. Types of XSS.mp4
4.7 MB
~Get Your Files Here !/9. Cross-Site Scripting (XSS)/2. Types of XSS.vtt
4.9 KB
~Get Your Files Here !/9. Cross-Site Scripting (XSS)/3. XSS Defenses.mp4
4.8 MB
~Get Your Files Here !/9. Cross-Site Scripting (XSS)/3. XSS Defenses.vtt
4.3 KB
~Get Your Files Here !/9. Cross-Site Scripting (XSS)/4. Demo - XSS Defenses.mp4
11.6 MB
~Get Your Files Here !/9. Cross-Site Scripting (XSS)/4. Demo - XSS Defenses.vtt
7.8 KB
~Get Your Files Here !/Bonus Resources.txt
386 B
~Get Your Files Here !/PythonSecureCodingPlaybook/10-InsecureDeserialization/CompleteCode/timesheet/db.sqlite3
224 KB
~Get Your Files Here !/PythonSecureCodingPlaybook/10-InsecureDeserialization/CompleteCode/timesheet/manage.py
687 B
~Get Your Files Here !/PythonSecureCodingPlaybook/10-InsecureDeserialization/CompleteCode/timesheet/requirements.txt
558 B
~Get Your Files Here !/PythonSecureCodingPlaybook/10-InsecureDeserialization/CompleteCode/timesheet/timesheet/asgi.py
177 B
~Get Your Files Here !/PythonSecureCodingPlaybook/10-InsecureDeserialization/CompleteCode/timesheet/timesheet/middleware/__init__.py
0 B
~Get Your Files Here !/PythonSecureCodingPlaybook/10-InsecureDeserialization/CompleteCode/timesheet/timesheet/__init__.py
0 B
~Get Your Files Here !/PythonSecureCodingPlaybook/10-InsecureDeserialization/CompleteCode/timesheet/timesheet/__pycache__/settings.cpython-39.pyc
2.5 KB
~Get Your Files Here !/PythonSecureCodingPlaybook/10-InsecureDeserialization/CompleteCode/timesheet/timesheet/__pycache__/urls.cpython-39.pyc
1019 B
~Get Your Files Here !/PythonSecureCodingPlaybook/10-InsecureDeserialization/CompleteCode/timesheet/timesheet/__pycache__/wsgi.cpython-39.pyc
360 B
~Get Your Files Here !/PythonSecureCodingPlaybook/10-InsecureDeserialization/CompleteCode/timesheet/timesheet/__pycache__/__init__.cpython-39.pyc