Language:
Total Size:
Health:
~Get Your Files Here !/1 – Giriş/1 -Introduction.mp4
~Get Your Files Here !/10 – Secure Coding – A092021 Security Logging and Monitoring Failures/1 -Security Logging and Monitoring Failures Explained.mp4
~Get Your Files Here !/11 – Secure Coding – A102021 Server-Side Request Forgery/1 -Server-Side Request Forgery All in One.mp4
~Get Your Files Here !/2 – Secure Coding – A012021 Broken Access Control/1 -Broken Access Control Explained.mp4
~Get Your Files Here !/2 – Secure Coding – A012021 Broken Access Control/2 -Broken Access Control – Practical Example on a Vulnerable Web Application.mp4
~Get Your Files Here !/2 – Secure Coding – A012021 Broken Access Control/3 -Vulnerable Code vs Secure Code – Example 1 (Broken Access Control).mp4
~Get Your Files Here !/2 – Secure Coding – A012021 Broken Access Control/4 -Vulnerable Code vs Secure Code – Example 2 (IDOR).mp4
~Get Your Files Here !/2 – Secure Coding – A012021 Broken Access Control/5 -Vulnerable Code vs Secure Code – Example (Rate Limiting).mp4
~Get Your Files Here !/2 – Secure Coding – A012021 Broken Access Control/6 -Broken Access Controls Prevention Guide.mp4
~Get Your Files Here !/3 – Secure Coding – A022021 Cryptographic Failures/1 -Cryptographic Failures Explained.mp4
~Get Your Files Here !/3 – Secure Coding – A022021 Cryptographic Failures/2 -Vulnerable Code vs Secure Code – Example 1 (Encryption, Weak Cipher Usage).mp4
~Get Your Files Here !/3 – Secure Coding – A022021 Cryptographic Failures/3 -Vulnerable Code vs Secure Code – Example 2 (Hard Coded Keys, StrongWeak Keys).mp4
~Get Your Files Here !/3 – Secure Coding – A022021 Cryptographic Failures/4 -Vulnerable Code vs Secure Code – Example 3 (Secure Hashing Algorithms).mp4
~Get Your Files Here !/3 – Secure Coding – A022021 Cryptographic Failures/5 -Cryptographic Failures Prevention Guide.mp4
~Get Your Files Here !/4 – Secure Coding – A032021 Injections/1 -Injections Explained.mp4
~Get Your Files Here !/4 – Secure Coding – A032021 Injections/2 -Vulnerable Code vs Secure Code Example 1 (SQL Injection).mp4
~Get Your Files Here !/4 – Secure Coding – A032021 Injections/3 -Vulnerable Code vs Secure Code Example 2 (Command Injection).mp4
~Get Your Files Here !/4 – Secure Coding – A032021 Injections/4 -Vulnerable Code vs Secure Code Example 3 (XML Injection, File Upload, LDAP Inj.).mp4
~Get Your Files Here !/4 – Secure Coding – A032021 Injections/5 -Injection Prevention Guide.mp4
~Get Your Files Here !/5 – Secure Coding – A042021 Insecure Design/1 -Insecure Design Explained (Design Principles, Frameworks, Key Practices).mp4
~Get Your Files Here !/6 – Secure Coding – A052021 Security Misconfiguration/1 -Security Misconfigurations (Security Hardenings, Error Handlings, Secure Config).mp4
~Get Your Files Here !/7 – Secure Coding – A062021 Vulnerable and Outdated Components/1 -Vulnerable and Outdated Components All In One.mp4
~Get Your Files Here !/8 – Secure Coding – A072021 Identification and Authentication Failures/1 -Identification and Authentication Failures Explained.mp4
~Get Your Files Here !/8 – Secure Coding – A072021 Identification and Authentication Failures/2 -Ident. and Auth. Failures Example 1 (Login Brute Force, Sensitive Data in GET ).mp4
~Get Your Files Here !/8 – Secure Coding – A072021 Identification and Authentication Failures/3 -Identification and Authentication Failures Example 2.mp4
~Get Your Files Here !/8 – Secure Coding – A072021 Identification and Authentication Failures/4 -Identification and Authentication Failures Prevention Guide.mp4
~Get Your Files Here !/9 – Secure Coding – A082021 Software and Data Integrity Failures/1 -Software and Data Integrity Failures.mp4
~Get Your Files Here !/Bonus Resources.txt
Secure Coding Based On OWASP Top 10 with Practical Examples –> [ DevCourseWeb ]
هنوز نظری ثبت نشده است.
اولین نفری باشید که نظر خود را ثبت میکند.