17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Udemy - Security For Developers - An Offensive Approach
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Language: English | Size: 2.07 GB | Duration: 4h 28m
Develop ”Out-of-box” thinking related to web secure codin and see security from offensive perspective
What you'll learn
Best practices when it comes to secure coding for web developers
OWASP Top 10 Web vulnerabilities
"Out-of-box thinking" when it comes to exploiting certain vulnerabilities
Learn certain tools and frameworks for offensive perspective
Requirements
basic knowledge of HTTP Protocol, Linux and web development.
If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com
Get More Tutorials and Support Us -->> https://FreeCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1 - Introduction Agenda/1 - Agenda.mp4
17.4 MB
~Get Your Files Here !/1 - Introduction Agenda/2 - VMs used to replicate the lab.html
406 B
~Get Your Files Here !/1 - Introduction Agenda/2 - VMs-used-to-replicate-the-lab.txt
282 B
~Get Your Files Here !/1 - Introduction Agenda/3 - Additional Resources.html
78 B
~Get Your Files Here !/1 - Introduction Agenda/API_Security_Top_10_RC.pdf
1.5 MB
~Get Your Files Here !/1 - Introduction Agenda/DevOpsSec by Jim Bird.pdf
3.4 MB
~Get Your Files Here !/1 - Introduction Agenda/IT Security Guidline for Web Secure Coding.pdf
468 KB
~Get Your Files Here !/1 - Introduction Agenda/OReilly-Web-Application-Security-NGINX.pdf
4.6 MB
~Get Your Files Here !/1 - Introduction Agenda/OTGv4.pdf
2.1 MB
~Get Your Files Here !/1 - Introduction Agenda/OWASP API Security TOP 10 2019.pdf
555.1 KB
~Get Your Files Here !/1 - Introduction Agenda/OWASP Top 10-2017 (en).pdf
194.4 KB
~Get Your Files Here !/1 - Introduction Agenda/owasp-api-security-top-10.pdf
3.2 MB
~Get Your Files Here !/1 - Introduction Agenda/Owasp-pc-ieee-ott-omtt-ssdf.pdf
134.8 KB
~Get Your Files Here !/1 - Introduction Agenda/OWASP_Application_Security_Verification_Standard_3.0.1.pdf
1.6 MB
~Get Your Files Here !/1 - Introduction Agenda/OWASP_Application_Security_Verification_Standard_4.0-en.pdf
1 MB
~Get Your Files Here !/1 - Introduction Agenda/OWASP_Code_Review_Guide_v2.pdf
2.3 MB
~Get Your Files Here !/1 - Introduction Agenda/OWASP_MSTG-SNAPSHOT-en.pdf
25.9 MB
~Get Your Files Here !/1 - Introduction Agenda/OWASP_Top_10-2017_(en).pdf.pdf
1.7 MB
~Get Your Files Here !/1 - Introduction Agenda/Threat Modeling.pdf
5.9 MB
~Get Your Files Here !/1 - Introduction Agenda/wstg-v4.1.pdf
9.2 MB
~Get Your Files Here !/1 - Introduction Agenda/wstg-v4.2.pdf
9.7 MB
~Get Your Files Here !/1 - Introduction Agenda/__MACOSX/_API_Security_Top_10_RC.pdf
178 B
~Get Your Files Here !/1 - Introduction Agenda/__MACOSX/_DevOpsSec by Jim Bird.pdf
178 B
~Get Your Files Here !/1 - Introduction Agenda/__MACOSX/_IT Security Guidline for Web Secure Coding.pdf
178 B
~Get Your Files Here !/1 - Introduction Agenda/__MACOSX/_OReilly-Web-Application-Security-NGINX.pdf
178 B
~Get Your Files Here !/1 - Introduction Agenda/__MACOSX/_OTGv4.pdf
178 B
~Get Your Files Here !/1 - Introduction Agenda/__MACOSX/_OWASP API Security TOP 10 2019.pdf
178 B
~Get Your Files Here !/1 - Introduction Agenda/__MACOSX/_OWASP Top 10-2017 (en).pdf
178 B
~Get Your Files Here !/1 - Introduction Agenda/__MACOSX/_owasp-api-security-top-10.pdf
177 B
~Get Your Files Here !/1 - Introduction Agenda/__MACOSX/_Owasp-pc-ieee-ott-omtt-ssdf.pdf
178 B
~Get Your Files Here !/1 - Introduction Agenda/__MACOSX/_OWASP_Application_Security_Verification_Standard_3.0.1.pdf
178 B
~Get Your Files Here !/1 - Introduction Agenda/__MACOSX/_OWASP_Application_Security_Verification_Standard_4.0-en.pdf
178 B
~Get Your Files Here !/1 - Introduction Agenda/__MACOSX/_OWASP_Code_Review_Guide_v2.pdf
177 B
~Get Your Files Here !/1 - Introduction Agenda/__MACOSX/_OWASP_MSTG-SNAPSHOT-en.pdf
178 B
~Get Your Files Here !/1 - Introduction Agenda/__MACOSX/_OWASP_Top_10-2017_(en).pdf.pdf
178 B
~Get Your Files Here !/1 - Introduction Agenda/__MACOSX/_Threat Modeling.pdf
178 B
~Get Your Files Here !/1 - Introduction Agenda/__MACOSX/_wstg-v4.1.pdf
178 B
~Get Your Files Here !/1 - Introduction Agenda/__MACOSX/_wstg-v4.2.pdf
178 B
~Get Your Files Here !/2 - Overview of Web Penetration Testing/10 - Attacking the users Reflected XSS.mp4
78.7 MB
~Get Your Files Here !/2 - Overview of Web Penetration Testing/11 - Attacking the users Stored XSS.mp4
129.2 MB
~Get Your Files Here !/2 - Overview of Web Penetration Testing/12 - Attacking the users CSRF Clickjacking Open Redirect.mp4
88.9 MB
~Get Your Files Here !/2 - Overview of Web Penetration Testing/13 - Attacking the server OS Command Injection.mp4
71.9 MB
~Get Your Files Here !/2 - Overview of Web Penetration Testing/14 - Attacking the Server SMTP Injection.mp4
25.6 MB
~Get Your Files Here !/2 - Overview of Web Penetration Testing/15 - Attacking Authentication.mp4
58 MB
~Get Your Files Here !/2 - Overview of Web Penetration Testing/16 - Attacking the Datastore SQLi part 1.mp4
98.9 MB
~Get Your Files Here !/2 - Overview of Web Penetration Testing/17 - Attacking the Datastore SQLi part 2.mp4
145.3 MB
~Get Your Files Here !/2 - Overview of Web Penetration Testing/4 - Overview of Web Penetration Testing.mp4
77.5 MB
~Get Your Files Here !/2 - Overview of Web Penetration Testing/5 - Information Gathering Part 1.mp4
76.9 MB
~Get Your Files Here !/2 - Overview of Web Penetration Testing/6 - Information Gathering Part 2.mp4
106.1 MB
~Get Your Files Here !/2 - Overview of Web Penetration Testing/7 - Information Gathering Part 3.mp4
76.2 MB
~Get Your Files Here !/2 - Overview of Web Penetration Testing/8 - Scanning and Enumeration.mp4
18.6 MB
~Get Your Files Here !/2 - Overview of Web Penetration Testing/9 - Mapping.mp4
66.2 MB
~Get Your Files Here !/3 - OWASP API Top 10 Vulnerabilities/18 - API OWASP Top 10 Part 1.mp4
92.2 MB
~Get Your Files Here !/3 - OWASP API Top 10 Vulnerabilities/19 - API OWASP Top 10 Part 2.mp4
73.6 MB
~Get Your Files Here !/4 - OWASP Web Top 10 Vulnerabilities/20 - Web OWASP Top 10.mp4
133 MB
~Get Your Files Here !/5 - HTTP Security Headers/21 - HTTP Security Headers.mp4
117.9 MB
~Get Your Files Here !/6 - JSON Web Tokens/22 - JSON Web Tokens.mp4
139.4 MB
~Get Your Files Here !/7 - Technical Measures and Best Practices/23 - Technical measures and best practices part 1.mp4
115.1 MB
~Get Your Files Here !/7 - Technical Measures and Best Practices/24 - Technical measures and best practices part 2.mp4
109.2 MB
~Get Your Files Here !/8 - Cryptography/25 - Cryptography part 1.mp4
67.7 MB
~Get Your Files Here !/8 - Cryptography/26 - Cryptography part 2.mp4