17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
PluralSight - API Security With The OWASP API Security Top 10
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
This course will teach you about unique vulnerabilities faced by web-based APIs and the defenses you’ll need to protect them
APIs are becoming increasingly common. They’re used in everything from web applications to smart devices. The more popular they become, the more attention they attract from hackers. If you’re creating an API then you need to know how to keep it secure. In this course, API Security with the OWASP API Security Top 10, you’ll learn to identify and defend against the most common API security vulnerabilities. First, you’ll explore individual vulnerabilities and the potential problems they can cause. Next, you’ll discover how attackers find and exploit those vulnerabilities. Finally, you’ll learn how to add defenses for each vulnerability. When you’re finished with this course, you’ll have the skills and knowledge of the top 10 API vulnerabilities needed, to create a secure, resilient API.
Homepage
If You Need More Stuff, kindly Visit and Support Us -->> https://DevCourseWeb.com
Get More Tutorials and Support Us -->> https://CourseWikia.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4
4 MB
~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt
2.2 KB
~Get Your Files Here !/10. Security Misconfiguration/1. Misconfiguration and Patching.mp4
5.3 MB
~Get Your Files Here !/10. Security Misconfiguration/1. Misconfiguration and Patching.vtt
4.3 KB
~Get Your Files Here !/10. Security Misconfiguration/2. HTTP Request Chain Misconfigurations.mp4
3.4 MB
~Get Your Files Here !/10. Security Misconfiguration/2. HTTP Request Chain Misconfigurations.vtt
2.8 KB
~Get Your Files Here !/10. Security Misconfiguration/3. Server Environment Misconfigurations.mp4
6.5 MB
~Get Your Files Here !/10. Security Misconfiguration/3. Server Environment Misconfigurations.vtt
4 KB
~Get Your Files Here !/10. Security Misconfiguration/4. Misconfiguration in the API and Response Chain.mp4
10.7 MB
~Get Your Files Here !/10. Security Misconfiguration/4. Misconfiguration in the API and Response Chain.vtt
9.1 KB
~Get Your Files Here !/11. Improper Inventory Management/1. Understanding Improper Inventory Management.mp4
6 MB
~Get Your Files Here !/11. Improper Inventory Management/1. Understanding Improper Inventory Management.vtt
4.5 KB
~Get Your Files Here !/11. Improper Inventory Management/2. Demo - Deprecated Functionality.mp4
4.4 MB
~Get Your Files Here !/11. Improper Inventory Management/2. Demo - Deprecated Functionality.vtt
2.9 KB
~Get Your Files Here !/11. Improper Inventory Management/3. Attacks and Defenses.mp4
9.2 MB
~Get Your Files Here !/11. Improper Inventory Management/3. Attacks and Defenses.vtt
7.4 KB
~Get Your Files Here !/12. Unsafe Consumption of APIs/1. Understanding Unsafe Consumption of APIs.mp4
4 MB
~Get Your Files Here !/12. Unsafe Consumption of APIs/1. Understanding Unsafe Consumption of APIs.vtt
3.3 KB
~Get Your Files Here !/12. Unsafe Consumption of APIs/2. API Consumption Attacks.mp4
2.6 MB
~Get Your Files Here !/12. Unsafe Consumption of APIs/2. API Consumption Attacks.vtt
2.3 KB
~Get Your Files Here !/12. Unsafe Consumption of APIs/3. API Consumption Defenses.mp4
8.6 MB
~Get Your Files Here !/12. Unsafe Consumption of APIs/3. API Consumption Defenses.vtt
7 KB
~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/1. Using the OWASP API Security Top 10.mp4
10.4 MB
~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/1. Using the OWASP API Security Top 10.vtt
6.6 KB
~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/2. Metrics behind the Top 10 Risks.mp4
7.5 MB
~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/2. Metrics behind the Top 10 Risks.vtt
5.5 KB
~Get Your Files Here !/3. Broken Object Level Authorization/1. Understanding Broken Object Level Authorization.mp4
3.1 MB
~Get Your Files Here !/3. Broken Object Level Authorization/1. Understanding Broken Object Level Authorization.vtt
2.2 KB
~Get Your Files Here !/3. Broken Object Level Authorization/2. Object Level Attacks.mp4
4.8 MB
~Get Your Files Here !/3. Broken Object Level Authorization/2. Object Level Attacks.vtt
3.8 KB
~Get Your Files Here !/3. Broken Object Level Authorization/3. Demo - Broken Object Level Attacks.mp4
10.5 MB
~Get Your Files Here !/3. Broken Object Level Authorization/3. Demo - Broken Object Level Attacks.vtt
3.3 KB
~Get Your Files Here !/3. Broken Object Level Authorization/4. Examining Defenses.mp4
3.6 MB
~Get Your Files Here !/3. Broken Object Level Authorization/4. Examining Defenses.vtt
2.5 KB
~Get Your Files Here !/4. Broken Authentication/1. Understanding Broken Authentication.mp4
3.1 MB
~Get Your Files Here !/4. Broken Authentication/1. Understanding Broken Authentication.vtt
2.4 KB
~Get Your Files Here !/4. Broken Authentication/2. Password Based Attacks and Defenses.mp4
9.7 MB
~Get Your Files Here !/4. Broken Authentication/2. Password Based Attacks and Defenses.vtt
7.1 KB
~Get Your Files Here !/4. Broken Authentication/3. Other Attacks and Defenses.mp4
7.9 MB
~Get Your Files Here !/4. Broken Authentication/3. Other Attacks and Defenses.vtt
5.9 KB
~Get Your Files Here !/4. Broken Authentication/4. Demo - Common JWT Attacks.mp4
10.7 MB
~Get Your Files Here !/4. Broken Authentication/4. Demo - Common JWT Attacks.vtt
4.8 KB
~Get Your Files Here !/5. Broken Object Property Level Authorization/1. Understanding Broken Object Property Level Authorization.mp4
3.9 MB
~Get Your Files Here !/5. Broken Object Property Level Authorization/1. Understanding Broken Object Property Level Authorization.vtt
3 KB
~Get Your Files Here !/5. Broken Object Property Level Authorization/2. Object Property Attacks and Defenses.mp4
3.7 MB
~Get Your Files Here !/5. Broken Object Property Level Authorization/2. Object Property Attacks and Defenses.vtt
3.2 KB
~Get Your Files Here !/5. Broken Object Property Level Authorization/3. Demo - Exploiting Object Properties.mp4
6.4 MB
~Get Your Files Here !/5. Broken Object Property Level Authorization/3. Demo - Exploiting Object Properties.vtt
3.7 KB
~Get Your Files Here !/6. Unrestricted Resource Consumption/1. Unrestricted Resource Consumption Attacks.mp4
6.4 MB
~Get Your Files Here !/6. Unrestricted Resource Consumption/1. Unrestricted Resource Consumption Attacks.vtt
4.5 KB
~Get Your Files Here !/6. Unrestricted Resource Consumption/2. Defenses for Resource Consumption.mp4
5.5 MB
~Get Your Files Here !/6. Unrestricted Resource Consumption/2. Defenses for Resource Consumption.vtt
4 KB
~Get Your Files Here !/7. Broken Function Level Authorization/1. Attacking Broken Function Level Authorization.mp4
5.4 MB
~Get Your Files Here !/7. Broken Function Level Authorization/1. Attacking Broken Function Level Authorization.vtt
4.3 KB
~Get Your Files Here !/7. Broken Function Level Authorization/2. Demo - Exploiting Broken Function Level Authorization.mp4
10.8 MB
~Get Your Files Here !/7. Broken Function Level Authorization/2. Demo - Exploiting Broken Function Level Authorization.vtt
3.4 KB
~Get Your Files Here !/7. Broken Function Level Authorization/3. Defenses.mp4
5.8 MB
~Get Your Files Here !/7. Broken Function Level Authorization/3. Defenses.vtt
4.3 KB
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/1. Sensitive Business Flows and Potential Attacks.mp4
6.6 MB
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/1. Sensitive Business Flows and Potential Attacks.vtt
4.9 KB
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/2. Demo - Attacking an Unrestricted Business Flow.mp4
5.8 MB
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/2. Demo - Attacking an Unrestricted Business Flow.vtt
2.9 KB
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/3. Business Flow Defenses.mp4
6.1 MB
~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/3. Business Flow Defenses.vtt
5 KB
~Get Your Files Here !/9. Server-side Request Forgery/1. Understanding Server-side Request Forgery.mp4
6.4 MB
~Get Your Files Here !/9. Server-side Request Forgery/1. Understanding Server-side Request Forgery.vtt
4.7 KB
~Get Your Files Here !/9. Server-side Request Forgery/2. Demo - Forging Requests from the Server.mp4
4.3 MB
~Get Your Files Here !/9. Server-side Request Forgery/2. Demo - Forging Requests from the Server.vtt
3.2 KB
~Get Your Files Here !/9. Server-side Request Forgery/3. SSRF Defenses.mp4
5.2 MB
~Get Your Files Here !/9. Server-side Request Forgery/3. SSRF Defenses.vtt