Torrent details for "Udemy Secure Coding Based On OWASP Top 10 with Practical Exampl" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
897.5 MB
Info Hash:
95B213515FD99E05A277BBA1D3A36FB446413F1C
Added By:
Added:
Oct. 24, 2024, 4:52 p.m.
Stats:
|
(Last updated: May 1, 2025, 1:22 a.m.)
| File | Size |
|---|---|
| Get Bonus Downloads Here.url | 182 bytes |
| 1 -Introduction.mp4 | 15.0 MB |
| 1 -Security Logging and Monitoring Failures Explained.mp4 | 34.7 MB |
| 1 -Server-Side Request Forgery All in One.mp4 | 32.1 MB |
| 1 -Broken Access Control Explained.mp4 | 10.0 MB |
| 2 -Broken Access Control - Practical Example on a Vulnerable Web Application.mp4 | 35.6 MB |
| 3 -Vulnerable Code vs Secure Code - Example 1 (Broken Access Control).mp4 | 11.1 MB |
| 4 -Vulnerable Code vs Secure Code - Example 2 (IDOR).mp4 | 12.5 MB |
| 5 -Vulnerable Code vs Secure Code - Example (Rate Limiting).mp4 | 11.2 MB |
| 6 -Broken Access Controls Prevention Guide.mp4 | 22.3 MB |
| 1 -Cryptographic Failures Explained.mp4 | 20.9 MB |
| 2 -Vulnerable Code vs Secure Code - Example 1 (Encryption, Weak Cipher Usage).mp4 | 11.8 MB |
| 3 -Vulnerable Code vs Secure Code - Example 2 (Hard Coded Keys, StrongWeak Keys).mp4 | 13.3 MB |
| 4 -Vulnerable Code vs Secure Code - Example 3 (Secure Hashing Algorithms).mp4 | 11.9 MB |
| 5 -Cryptographic Failures Prevention Guide.mp4 | 58.9 MB |
| 1 -Injections Explained.mp4 | 97.7 MB |
| 2 -Vulnerable Code vs Secure Code Example 1 (SQL Injection).mp4 | 36.7 MB |
| 3 -Vulnerable Code vs Secure Code Example 2 (Command Injection).mp4 | 44.2 MB |
| 4 -Vulnerable Code vs Secure Code Example 3 (XML Injection, File Upload, LDAP Inj.).mp4 | 50.7 MB |
| 5 -Injection Prevention Guide.mp4 | 26.4 MB |
| 1 -Insecure Design Explained (Design Principles, Frameworks, Key Practices).mp4 | 69.9 MB |
| 1 -Security Misconfigurations (Security Hardenings, Error Handlings, Secure Config).mp4 | 46.5 MB |
| 1 -Vulnerable and Outdated Components All In One.mp4 | 25.8 MB |
| 1 -Identification and Authentication Failures Explained.mp4 | 38.2 MB |
| 2 -Ident. and Auth. Failures Example 1 (Login Brute Force, Sensitive Data in GET ).mp4 | 51.7 MB |
| 3 -Identification and Authentication Failures Example 2.mp4 | 33.1 MB |
| 4 -Identification and Authentication Failures Prevention Guide.mp4 | 47.1 MB |
| 1 -Software and Data Integrity Failures.mp4 | 28.0 MB |
| Bonus Resources.txt | 386 bytes |
Name
DL
Uploader
Size
S/L
Added
-
897.5 MB
[8
/
1]
2024-10-24
| Uploaded by freecoursewb | Size 897.5 MB | Health [ 8 /1 ] | Added 2024-10-24 |
-
324.9 MB
[16
/
3]
2023-10-23
| Uploaded by freecoursewb | Size 324.9 MB | Health [ 16 /3 ] | Added 2023-10-23 |
-
425.4 MB
[0
/
0]
2023-10-22
| Uploaded by freecoursewb | Size 425.4 MB | Health [ 0 /0 ] | Added 2023-10-22 |
-
434.4 MB
[0
/
3]
2023-10-22
| Uploaded by freecoursewb | Size 434.4 MB | Health [ 0 /3 ] | Added 2023-10-22 |
-
434.9 MB
[0
/
3]
2023-10-22
| Uploaded by freecoursewb | Size 434.9 MB | Health [ 0 /3 ] | Added 2023-10-22 |
-
337.3 MB
[0
/
3]
2023-10-22
| Uploaded by freecoursewb | Size 337.3 MB | Health [ 0 /3 ] | Added 2023-10-22 |
-
612.5 MB
[2
/
3]
2023-06-24
| Uploaded by freecoursewb | Size 612.5 MB | Health [ 2 /3 ] | Added 2023-06-24 |
NOTE
SOURCE: Udemy Secure Coding Based On OWASP Top 10 with Practical Exampl
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×


