17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Udemy - Secure Coding Based On OWASP Top 10 With Practical Examples
~Get Your Files Here !/1 - Giriş/1 -Introduction.mp4
15 MB
~Get Your Files Here !/10 - Secure Coding - A092021 Security Logging and Monitoring Failures/1 -Security Logging and Monitoring Failures Explained.mp4
34.7 MB
~Get Your Files Here !/11 - Secure Coding - A102021 Server-Side Request Forgery/1 -Server-Side Request Forgery All in One.mp4
32.1 MB
~Get Your Files Here !/2 - Secure Coding - A012021 Broken Access Control/1 -Broken Access Control Explained.mp4
10 MB
~Get Your Files Here !/2 - Secure Coding - A012021 Broken Access Control/2 -Broken Access Control - Practical Example on a Vulnerable Web Application.mp4
35.6 MB
~Get Your Files Here !/2 - Secure Coding - A012021 Broken Access Control/3 -Vulnerable Code vs Secure Code - Example 1 (Broken Access Control).mp4
11.1 MB
~Get Your Files Here !/2 - Secure Coding - A012021 Broken Access Control/4 -Vulnerable Code vs Secure Code - Example 2 (IDOR).mp4
12.5 MB
~Get Your Files Here !/2 - Secure Coding - A012021 Broken Access Control/5 -Vulnerable Code vs Secure Code - Example (Rate Limiting).mp4
11.2 MB
~Get Your Files Here !/2 - Secure Coding - A012021 Broken Access Control/6 -Broken Access Controls Prevention Guide.mp4
22.3 MB
~Get Your Files Here !/3 - Secure Coding - A022021 Cryptographic Failures/1 -Cryptographic Failures Explained.mp4
20.9 MB
~Get Your Files Here !/3 - Secure Coding - A022021 Cryptographic Failures/2 -Vulnerable Code vs Secure Code - Example 1 (Encryption, Weak Cipher Usage).mp4
11.8 MB
~Get Your Files Here !/3 - Secure Coding - A022021 Cryptographic Failures/3 -Vulnerable Code vs Secure Code - Example 2 (Hard Coded Keys, StrongWeak Keys).mp4
13.3 MB
~Get Your Files Here !/3 - Secure Coding - A022021 Cryptographic Failures/4 -Vulnerable Code vs Secure Code - Example 3 (Secure Hashing Algorithms).mp4
11.9 MB
~Get Your Files Here !/3 - Secure Coding - A022021 Cryptographic Failures/5 -Cryptographic Failures Prevention Guide.mp4
58.9 MB
~Get Your Files Here !/4 - Secure Coding - A032021 Injections/1 -Injections Explained.mp4
97.7 MB
~Get Your Files Here !/4 - Secure Coding - A032021 Injections/2 -Vulnerable Code vs Secure Code Example 1 (SQL Injection).mp4
36.7 MB
~Get Your Files Here !/4 - Secure Coding - A032021 Injections/3 -Vulnerable Code vs Secure Code Example 2 (Command Injection).mp4
44.2 MB
~Get Your Files Here !/4 - Secure Coding - A032021 Injections/4 -Vulnerable Code vs Secure Code Example 3 (XML Injection, File Upload, LDAP Inj.).mp4
50.7 MB
~Get Your Files Here !/4 - Secure Coding - A032021 Injections/5 -Injection Prevention Guide.mp4
26.4 MB
~Get Your Files Here !/5 - Secure Coding - A042021 Insecure Design/1 -Insecure Design Explained (Design Principles, Frameworks, Key Practices).mp4
69.9 MB
~Get Your Files Here !/6 - Secure Coding - A052021 Security Misconfiguration/1 -Security Misconfigurations (Security Hardenings, Error Handlings, Secure Config).mp4
46.5 MB
~Get Your Files Here !/7 - Secure Coding - A062021 Vulnerable and Outdated Components/1 -Vulnerable and Outdated Components All In One.mp4
25.8 MB
~Get Your Files Here !/8 - Secure Coding - A072021 Identification and Authentication Failures/1 -Identification and Authentication Failures Explained.mp4
38.2 MB
~Get Your Files Here !/8 - Secure Coding - A072021 Identification and Authentication Failures/2 -Ident. and Auth. Failures Example 1 (Login Brute Force, Sensitive Data in GET ).mp4
51.7 MB
~Get Your Files Here !/8 - Secure Coding - A072021 Identification and Authentication Failures/3 -Identification and Authentication Failures Example 2.mp4
33.1 MB
~Get Your Files Here !/8 - Secure Coding - A072021 Identification and Authentication Failures/4 -Identification and Authentication Failures Prevention Guide.mp4
47.1 MB
~Get Your Files Here !/9 - Secure Coding - A082021 Software and Data Integrity Failures/1 -Software and Data Integrity Failures.mp4