17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Udemy - OWASP Top 10 - Protecting Against Threats And Vulnerabilities
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
OWASP Top 10: Protecting Against Threats and Vulnerabilities
https://DevCourseWeb.com
Published 11/2023 Created by Kareem Ullah MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 42 Lectures ( 1h 31m ) | Size: 1.1 GB
Master OWASP Web Application Security: Defend the Digital Realm, Advanced Security Strategies, Techniques, & Prevention.
What you'll learn Recognizing the critical role of web application security in today's digital landscape. Understanding the significance of the Open Web Application Security Project and its contributions to web application security. In-depth knowledge of the top ten most critical web application security risks, including injection, broken authentication, sensitive data exposure, and more. Principles and guidelines for writing secure code. Techniques for input validation, output encoding, authentication, session management, data validation, and error handling. Awareness of client-side security threats and the implementation of secure coding practices for JavaScript. Prevention of Cross-Site Scripting (XSS) and the use of Content Security Policy (CSP) and Cross-Origin Resource Sharing (CORS) for protection. Methods and techniques for assessing and testing web application security. Security in the SDLC (Software Development Lifecycle) Understanding secure development phases and the OWASP SAMM (Software Assurance Maturity Model). Learn about Securing APIs and Web Services and much more
Requirements Willingness or Interest to learn about OWASP Web Application Security and OWASP Top 10
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. Introduction to Web Application Security/1. Understanding the Importance of Web Application Security.mp4
30 MB
~Get Your Files Here !/1. Introduction to Web Application Security/2. The Role of OWASP in Web Application Security.mp4
37.5 MB
~Get Your Files Here !/2. OWASP Top Ten/1. Introduction to the OWASP Top Ten.mp4
27.5 MB
~Get Your Files Here !/2. OWASP Top Ten/10. A9 Using Components with Known Vulnerabilities.mp4
28.7 MB
~Get Your Files Here !/2. OWASP Top Ten/11. A10 Insufficient Logging and Monitoring.mp4
26.6 MB
~Get Your Files Here !/2. OWASP Top Ten/2. A1 Injection.mp4
20.6 MB
~Get Your Files Here !/2. OWASP Top Ten/3. A2 Broken Authentication.mp4
24.6 MB
~Get Your Files Here !/2. OWASP Top Ten/4. A3 Sensitive Data Exposure.mp4
25.3 MB
~Get Your Files Here !/2. OWASP Top Ten/5. A4 XML External Entities (XXE).mp4
17.4 MB
~Get Your Files Here !/2. OWASP Top Ten/6. A5 Broken Access Control.mp4
24.7 MB
~Get Your Files Here !/2. OWASP Top Ten/7. A6 Security Misconfiguration.mp4
26.6 MB
~Get Your Files Here !/2. OWASP Top Ten/8. A7 Cross-Site Scripting (XSS).mp4
22.6 MB
~Get Your Files Here !/2. OWASP Top Ten/9. A8 Insecure Deserialization.mp4
22 MB
~Get Your Files Here !/3. Secure Coding and Development/1. Principles of Secure Coding.mp4
36.8 MB
~Get Your Files Here !/3. Secure Coding and Development/2. OWASP Secure Coding Guidelines.mp4
34.6 MB
~Get Your Files Here !/3. Secure Coding and Development/3. Input Validation and Output Encoding.mp4
24.3 MB
~Get Your Files Here !/3. Secure Coding and Development/4. Authentication and Session Management.mp4
25.6 MB
~Get Your Files Here !/3. Secure Coding and Development/5. Data Validation and Sanitization.mp4
24.5 MB
~Get Your Files Here !/3. Secure Coding and Development/6. Error Handling and Logging.mp4
22.6 MB
~Get Your Files Here !/4. OWASP Tools and Resources/1. Introduction to OWASP Tools and Projects.mp4
24.7 MB
~Get Your Files Here !/4. OWASP Tools and Resources/2. OWASP Web Security Testing Guide.mp4
26.4 MB
~Get Your Files Here !/4. OWASP Tools and Resources/3. OWASP Application Security Verification Standard.mp4
28.5 MB
~Get Your Files Here !/4. OWASP Tools and Resources/4. OWASP ZAP (Zed Attack Proxy) Overview.mp4
20.9 MB
~Get Your Files Here !/4. OWASP Tools and Resources/5. OWASP Resources and Documentation.mp4
29.1 MB
~Get Your Files Here !/5. Securing APIs and Web Services/1. API Security Challenges.mp4
27.5 MB
~Get Your Files Here !/5. Securing APIs and Web Services/2. OWASP API Security Top Ten.mp4
25.1 MB
~Get Your Files Here !/5. Securing APIs and Web Services/3. Authentication and Authorization in APIs.mp4
25.5 MB
~Get Your Files Here !/5. Securing APIs and Web Services/4. Data Validation and Input Sanitization for APIs.mp4
26.3 MB
~Get Your Files Here !/5. Securing APIs and Web Services/5. Securing Web Services.mp4
22.8 MB
~Get Your Files Here !/6. Client-Side Security/1. Understanding Client-Side Security Threats.mp4
21.4 MB
~Get Your Files Here !/6. Client-Side Security/2. OWASP Secure Coding Practices for JavaScript.mp4
27 MB
~Get Your Files Here !/6. Client-Side Security/3. Cross-Site Scripting (XSS) Prevention.mp4
21.5 MB
~Get Your Files Here !/6. Client-Side Security/4. Content Security Policy (CSP).mp4
22.8 MB
~Get Your Files Here !/6. Client-Side Security/5. Cross-Origin Resource Sharing (CORS).mp4
18.6 MB
~Get Your Files Here !/7. Web Application Security Assessment/1. Introduction to Security Assessment.mp4
28.6 MB
~Get Your Files Here !/7. Web Application Security Assessment/2. OWASP Testing Guide.mp4
21.2 MB
~Get Your Files Here !/7. Web Application Security Assessment/3. Manual and Automated Testing Techniques.mp4
26.9 MB
~Get Your Files Here !/7. Web Application Security Assessment/4. Reporting Security Findings.mp4
28.7 MB
~Get Your Files Here !/8. Security in the SDLC/1. Integrating Security in the Software Development Lifecycle (SDLC).mp4
29.6 MB
~Get Your Files Here !/8. Security in the SDLC/2. Secure Development Phases.mp4
23.7 MB
~Get Your Files Here !/8. Security in the SDLC/3. OWASP SAMM (Software Assurance Maturity Model).mp4
22.5 MB
~Get Your Files Here !/8. Security in the SDLC/4. Building a Security Culture.mp4