种子简介
种子名称:
[ DevCourseWeb.com ] Udemy - OWASP Top 10 - Protecting Against Threats and Vulnerabilities
文件类型:
视频
文件数目:
42个文件
文件大小:
1.05 GB
收录时间:
2025-5-9 05:29
已经下载:
3次
资源热度:
77
最近下载:
2025-6-3 00:17
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:7a2359727301caf3aa11d2cf8f4be7585013c4e1&dn=[ DevCourseWeb.com ] Udemy - OWASP Top 10 - Protecting Against Threats and Vulnerabilities
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
[ DevCourseWeb.com ] Udemy - OWASP Top 10 - Protecting Against Threats and Vulnerabilities.torrent
~Get Your Files Here !/1. Introduction to Web Application Security/1. Understanding the Importance of Web Application Security.mp430.01MB
~Get Your Files Here !/1. Introduction to Web Application Security/2. The Role of OWASP in Web Application Security.mp437.49MB
~Get Your Files Here !/2. OWASP Top Ten/1. Introduction to the OWASP Top Ten.mp427.47MB
~Get Your Files Here !/2. OWASP Top Ten/10. A9 Using Components with Known Vulnerabilities.mp428.69MB
~Get Your Files Here !/2. OWASP Top Ten/11. A10 Insufficient Logging and Monitoring.mp426.55MB
~Get Your Files Here !/2. OWASP Top Ten/2. A1 Injection.mp420.63MB
~Get Your Files Here !/2. OWASP Top Ten/3. A2 Broken Authentication.mp424.59MB
~Get Your Files Here !/2. OWASP Top Ten/4. A3 Sensitive Data Exposure.mp425.3MB
~Get Your Files Here !/2. OWASP Top Ten/5. A4 XML External Entities (XXE).mp417.35MB
~Get Your Files Here !/2. OWASP Top Ten/6. A5 Broken Access Control.mp424.74MB
~Get Your Files Here !/2. OWASP Top Ten/7. A6 Security Misconfiguration.mp426.56MB
~Get Your Files Here !/2. OWASP Top Ten/8. A7 Cross-Site Scripting (XSS).mp422.61MB
~Get Your Files Here !/2. OWASP Top Ten/9. A8 Insecure Deserialization.mp422.01MB
~Get Your Files Here !/3. Secure Coding and Development/1. Principles of Secure Coding.mp436.84MB
~Get Your Files Here !/3. Secure Coding and Development/2. OWASP Secure Coding Guidelines.mp434.63MB
~Get Your Files Here !/3. Secure Coding and Development/3. Input Validation and Output Encoding.mp424.27MB
~Get Your Files Here !/3. Secure Coding and Development/4. Authentication and Session Management.mp425.58MB
~Get Your Files Here !/3. Secure Coding and Development/5. Data Validation and Sanitization.mp424.47MB
~Get Your Files Here !/3. Secure Coding and Development/6. Error Handling and Logging.mp422.59MB
~Get Your Files Here !/4. OWASP Tools and Resources/1. Introduction to OWASP Tools and Projects.mp424.71MB
~Get Your Files Here !/4. OWASP Tools and Resources/2. OWASP Web Security Testing Guide.mp426.45MB
~Get Your Files Here !/4. OWASP Tools and Resources/3. OWASP Application Security Verification Standard.mp428.53MB
~Get Your Files Here !/4. OWASP Tools and Resources/4. OWASP ZAP (Zed Attack Proxy) Overview.mp420.85MB
~Get Your Files Here !/4. OWASP Tools and Resources/5. OWASP Resources and Documentation.mp429.15MB
~Get Your Files Here !/5. Securing APIs and Web Services/1. API Security Challenges.mp427.55MB
~Get Your Files Here !/5. Securing APIs and Web Services/2. OWASP API Security Top Ten.mp425.07MB
~Get Your Files Here !/5. Securing APIs and Web Services/3. Authentication and Authorization in APIs.mp425.5MB
~Get Your Files Here !/5. Securing APIs and Web Services/4. Data Validation and Input Sanitization for APIs.mp426.28MB
~Get Your Files Here !/5. Securing APIs and Web Services/5. Securing Web Services.mp422.76MB
~Get Your Files Here !/6. Client-Side Security/1. Understanding Client-Side Security Threats.mp421.37MB
~Get Your Files Here !/6. Client-Side Security/2. OWASP Secure Coding Practices for JavaScript.mp427MB
~Get Your Files Here !/6. Client-Side Security/3. Cross-Site Scripting (XSS) Prevention.mp421.52MB
~Get Your Files Here !/6. Client-Side Security/4. Content Security Policy (CSP).mp422.78MB
~Get Your Files Here !/6. Client-Side Security/5. Cross-Origin Resource Sharing (CORS).mp418.56MB
~Get Your Files Here !/7. Web Application Security Assessment/1. Introduction to Security Assessment.mp428.6MB
~Get Your Files Here !/7. Web Application Security Assessment/2. OWASP Testing Guide.mp421.17MB
~Get Your Files Here !/7. Web Application Security Assessment/3. Manual and Automated Testing Techniques.mp426.9MB
~Get Your Files Here !/7. Web Application Security Assessment/4. Reporting Security Findings.mp428.73MB
~Get Your Files Here !/8. Security in the SDLC/1. Integrating Security in the Software Development Lifecycle (SDLC).mp429.6MB
~Get Your Files Here !/8. Security in the SDLC/2. Secure Development Phases.mp423.72MB
~Get Your Files Here !/8. Security in the SDLC/3. OWASP SAMM (Software Assurance Maturity Model).mp422.51MB
~Get Your Files Here !/8. Security in the SDLC/4. Building a Security Culture.mp425.05MB