Udemy - Secure Coding Based On OWASP Top 10 with Practical Examples
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size897.5 MB
- Uploaded Byfreecoursewb
- Downloads13
- Last checkedOct. 25th '24
- Date uploadedOct. 25th '24
- Seeders 7
- Leechers8
Infohash : 95B213515FD99E05A277BBA1D3A36FB446413F1C
Secure Coding Based On OWASP Top 10 with Practical Examples
https://DevCourseWeb.com
Published 10/2024
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English | Duration: 1h 46m | Size: 897 MB
Secure Coding Guide based on OWASP Top 10 with Python, Java and .NET examples.
What you'll learn
Learn how to avoid insecure coding.
Learn OWASP Top 10 vulnerabilities.
Learn Insecure coding risks.
Learn how to mitigate cyber security risks on code level.
Learn secure functions and algorithms to use while developing critical applications.
Requirements
Software Development Experience
Cyber Security Experience
Files:
[ DevCourseWeb.com ] Udemy - Secure Coding Based On OWASP Top 10 with Practical Examples- Get Bonus Downloads Here.url (0.2 KB) ~Get Your Files Here ! 1 - Giriş
- 1 -Introduction.mp4 (15.0 MB)
- 1 -Security Logging and Monitoring Failures Explained.mp4 (34.7 MB)
- 1 -Server-Side Request Forgery All in One.mp4 (32.1 MB)
- 1 -Broken Access Control Explained.mp4 (10.0 MB)
- 2 -Broken Access Control - Practical Example on a Vulnerable Web Application.mp4 (35.6 MB)
- 3 -Vulnerable Code vs Secure Code - Example 1 (Broken Access Control).mp4 (11.1 MB)
- 4 -Vulnerable Code vs Secure Code - Example 2 (IDOR).mp4 (12.5 MB)
- 5 -Vulnerable Code vs Secure Code - Example (Rate Limiting).mp4 (11.2 MB)
- 6 -Broken Access Controls Prevention Guide.mp4 (22.3 MB)
- 1 -Cryptographic Failures Explained.mp4 (20.9 MB)
- 2 -Vulnerable Code vs Secure Code - Example 1 (Encryption, Weak Cipher Usage).mp4 (11.8 MB)
- 3 -Vulnerable Code vs Secure Code - Example 2 (Hard Coded Keys, StrongWeak Keys).mp4 (13.3 MB)
- 4 -Vulnerable Code vs Secure Code - Example 3 (Secure Hashing Algorithms).mp4 (11.9 MB)
- 5 -Cryptographic Failures Prevention Guide.mp4 (58.9 MB)
- 1 -Injections Explained.mp4 (97.7 MB)
- 2 -Vulnerable Code vs Secure Code Example 1 (SQL Injection).mp4 (36.7 MB)
- 3 -Vulnerable Code vs Secure Code Example 2 (Command Injection).mp4 (44.2 MB)
- 4 -Vulnerable Code vs Secure Code Example 3 (XML Injection, File Upload, LDAP Inj.).mp4 (50.7 MB)
- 5 -Injection Prevention Guide.mp4 (26.4 MB)
- 1 -Insecure Design Explained (Design Principles, Frameworks, Key Practices).mp4 (69.9 MB)
- 1 -Security Misconfigurations (Security Hardenings, Error Handlings, Secure Config).mp4 (46.5 MB)
- 1 -Vulnerable and Outdated Components All In One.mp4 (25.8 MB)
- 1 -Identification and Authentication Failures Explained.mp4 (38.2 MB)
- 2 -Ident. and Auth. Failures Example 1 (Login Brute Force, Sensitive Data in GET ).mp4 (51.7 MB)
- 3 -Identification and Authentication Failures Example 2.mp4 (33.1 MB)
- 4 -Identification and Authentication Failures Prevention Guide.mp4 (47.1 MB)
- 1 -Software and Data Integrity Failures.mp4 (28.0 MB)
- Bonus Resources.txt (0.4 KB)
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- http://tracker.foreverpirates.co:80/announce
- udp://tracker.cyberia.is:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://9.rarbg.to:2780/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://open.stealth.si:80/announce
- udp://9.rarbg.to:2900/announce
- udp://9.rarbg.me:2720/announce
- udp://opentor.org:2710/announce