Udemy - OWASP Top 10 - Protecting Against Threats And Vulnerabilities

Torrent Details

Udemy - OWASP Top 10 - Protecting Against Threats and VulnerabilitiesUdemy - OWASP Top 10 - Protecting Against Threats and Vulnerabilities

NAME
Udemy - OWASP Top 10 - Protecting Against Threats and Vulnerabilities.torrent
CATEGORY
Other
INFOHASH
7a2359727301caf3aa11d2cf8f4be7585013c4e1
SIZE
1.1 GB in 43 files
ADDED
Uploaded on 16-11-2023 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

OWASP Top 10: Protecting Against Threats and Vulnerabilities

https://DevCourseWeb.com

Published 11/2023
Created by Kareem Ullah
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 42 Lectures ( 1h 31m ) | Size: 1.1 GB

Master OWASP Web Application Security: Defend the Digital Realm, Advanced Security Strategies, Techniques, & Prevention.

What you'll learn
Recognizing the critical role of web application security in today's digital landscape.
Understanding the significance of the Open Web Application Security Project and its contributions to web application security.
In-depth knowledge of the top ten most critical web application security risks, including injection, broken authentication, sensitive data exposure, and more.
Principles and guidelines for writing secure code.
Techniques for input validation, output encoding, authentication, session management, data validation, and error handling.
Awareness of client-side security threats and the implementation of secure coding practices for JavaScript.
Prevention of Cross-Site Scripting (XSS) and the use of Content Security Policy (CSP) and Cross-Origin Resource Sharing (CORS) for protection.
Methods and techniques for assessing and testing web application security.
Security in the SDLC (Software Development Lifecycle)
Understanding secure development phases and the OWASP SAMM (Software Assurance Maturity Model).
Learn about Securing APIs and Web Services
and much more

Requirements
Willingness or Interest to learn about OWASP Web Application Security and OWASP Top 10

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
~Get Your Files Here !/1. Introduction to Web Application Security/1. Understanding the Importance of Web Application Security.mp430 MB
~Get Your Files Here !/1. Introduction to Web Application Security/2. The Role of OWASP in Web Application Security.mp437.5 MB
~Get Your Files Here !/2. OWASP Top Ten/1. Introduction to the OWASP Top Ten.mp427.5 MB
~Get Your Files Here !/2. OWASP Top Ten/10. A9 Using Components with Known Vulnerabilities.mp428.7 MB
~Get Your Files Here !/2. OWASP Top Ten/11. A10 Insufficient Logging and Monitoring.mp426.6 MB
~Get Your Files Here !/2. OWASP Top Ten/2. A1 Injection.mp420.6 MB
~Get Your Files Here !/2. OWASP Top Ten/3. A2 Broken Authentication.mp424.6 MB
~Get Your Files Here !/2. OWASP Top Ten/4. A3 Sensitive Data Exposure.mp425.3 MB
~Get Your Files Here !/2. OWASP Top Ten/5. A4 XML External Entities (XXE).mp417.4 MB
~Get Your Files Here !/2. OWASP Top Ten/6. A5 Broken Access Control.mp424.7 MB
~Get Your Files Here !/2. OWASP Top Ten/7. A6 Security Misconfiguration.mp426.6 MB
~Get Your Files Here !/2. OWASP Top Ten/8. A7 Cross-Site Scripting (XSS).mp422.6 MB
~Get Your Files Here !/2. OWASP Top Ten/9. A8 Insecure Deserialization.mp422 MB
~Get Your Files Here !/3. Secure Coding and Development/1. Principles of Secure Coding.mp436.8 MB
~Get Your Files Here !/3. Secure Coding and Development/2. OWASP Secure Coding Guidelines.mp434.6 MB
~Get Your Files Here !/3. Secure Coding and Development/3. Input Validation and Output Encoding.mp424.3 MB
~Get Your Files Here !/3. Secure Coding and Development/4. Authentication and Session Management.mp425.6 MB
~Get Your Files Here !/3. Secure Coding and Development/5. Data Validation and Sanitization.mp424.5 MB
~Get Your Files Here !/3. Secure Coding and Development/6. Error Handling and Logging.mp422.6 MB
~Get Your Files Here !/4. OWASP Tools and Resources/1. Introduction to OWASP Tools and Projects.mp424.7 MB
~Get Your Files Here !/4. OWASP Tools and Resources/2. OWASP Web Security Testing Guide.mp426.4 MB
~Get Your Files Here !/4. OWASP Tools and Resources/3. OWASP Application Security Verification Standard.mp428.5 MB
~Get Your Files Here !/4. OWASP Tools and Resources/4. OWASP ZAP (Zed Attack Proxy) Overview.mp420.9 MB
~Get Your Files Here !/4. OWASP Tools and Resources/5. OWASP Resources and Documentation.mp429.1 MB
~Get Your Files Here !/5. Securing APIs and Web Services/1. API Security Challenges.mp427.5 MB
~Get Your Files Here !/5. Securing APIs and Web Services/2. OWASP API Security Top Ten.mp425.1 MB
~Get Your Files Here !/5. Securing APIs and Web Services/3. Authentication and Authorization in APIs.mp425.5 MB
~Get Your Files Here !/5. Securing APIs and Web Services/4. Data Validation and Input Sanitization for APIs.mp426.3 MB
~Get Your Files Here !/5. Securing APIs and Web Services/5. Securing Web Services.mp422.8 MB
~Get Your Files Here !/6. Client-Side Security/1. Understanding Client-Side Security Threats.mp421.4 MB
~Get Your Files Here !/6. Client-Side Security/2. OWASP Secure Coding Practices for JavaScript.mp427 MB
~Get Your Files Here !/6. Client-Side Security/3. Cross-Site Scripting (XSS) Prevention.mp421.5 MB
~Get Your Files Here !/6. Client-Side Security/4. Content Security Policy (CSP).mp422.8 MB
~Get Your Files Here !/6. Client-Side Security/5. Cross-Origin Resource Sharing (CORS).mp418.6 MB
~Get Your Files Here !/7. Web Application Security Assessment/1. Introduction to Security Assessment.mp428.6 MB
~Get Your Files Here !/7. Web Application Security Assessment/2. OWASP Testing Guide.mp421.2 MB
~Get Your Files Here !/7. Web Application Security Assessment/3. Manual and Automated Testing Techniques.mp426.9 MB
~Get Your Files Here !/7. Web Application Security Assessment/4. Reporting Security Findings.mp428.7 MB
~Get Your Files Here !/8. Security in the SDLC/1. Integrating Security in the Software Development Lifecycle (SDLC).mp429.6 MB
~Get Your Files Here !/8. Security in the SDLC/2. Secure Development Phases.mp423.7 MB
~Get Your Files Here !/8. Security in the SDLC/3. OWASP SAMM (Software Assurance Maturity Model).mp422.5 MB
~Get Your Files Here !/8. Security in the SDLC/4. Building a Security Culture.mp425.1 MB
~Get Your Files Here !/Bonus Resources.txt386 B

Alternative Torrents for 'Udemy OWASP Top Protecting Against Threats and Vulnerabilities'.

There are no alternative torrents found.