BITCQ

Web Security and the OWASP Top 10 The Big Picture

Size: 290 MB
Magnet link

Name Size
Web Security and the OWASP Top 10 The Big Picture/1. Introduction/1 - Introduction.mp4 17.9 MB
Web Security and the OWASP Top 10 The Big Picture/4. Cross-Site Scripting (XSS)/4 - The risk in Practice.mp4 12.3 MB
Web Security and the OWASP Top 10 The Big Picture/5. Insecure Direct Object References/3 - Defences.mp4 11.6 MB
Web Security and the OWASP Top 10 The Big Picture/4. Cross-Site Scripting (XSS)/1 - Overview.mp4 10.7 MB
Web Security and the OWASP Top 10 The Big Picture/3. Broken Authentication and Session Management/3 - Defences.mp4 10.6 MB
Web Security and the OWASP Top 10 The Big Picture/2. Injection/3 - Defences.mp4 10 MB
Web Security and the OWASP Top 10 The Big Picture/8. Missing Function Level Access Control/3 - Defences.mp4 9.6 MB
Web Security and the OWASP Top 10 The Big Picture/3. Broken Authentication and Session Management/2 - Mounting an Attack.mp4 9.1 MB
Web Security and the OWASP Top 10 The Big Picture/11. Unvalidated Redirects and Forwards/4 - The risk in Practice.mp4 8.8 MB
Web Security and the OWASP Top 10 The Big Picture/7. Sensitive Data Exposure/2 - Mounting an Attack.mp4 8.7 MB
Web Security and the OWASP Top 10 The Big Picture/9. Cross-Site Request Forgery (CSRF)/3 - Defences.mp4 8.1 MB
Web Security and the OWASP Top 10 The Big Picture/2. Injection/1 - Overview.mp4 8.1 MB
Web Security and the OWASP Top 10 The Big Picture/8. Missing Function Level Access Control/2 - Mounting an Attack.mp4 7.3 MB
Web Security and the OWASP Top 10 The Big Picture/7. Sensitive Data Exposure/3 - Defences.mp4 7.2 MB
Web Security and the OWASP Top 10 The Big Picture/6. Security Misconfiguration/2 - Mounting an Attack.mp4 7.1 MB
Web Security and the OWASP Top 10 The Big Picture/6. Security Misconfiguration/3 - Defences.mp4 7.1 MB
Web Security and the OWASP Top 10 The Big Picture/8. Missing Function Level Access Control/4 - The risk in Practice.mp4 7.1 MB
Web Security and the OWASP Top 10 The Big Picture/9. Cross-Site Request Forgery (CSRF)/4 - The risk in Practice.mp4 6.8 MB
Web Security and the OWASP Top 10 The Big Picture/10. Using Components with Known Vulnerabilities/3 - Defences.mp4 6.3 MB
Web Security and the OWASP Top 10 The Big Picture/9. Cross-Site Request Forgery (CSRF)/1 - Overview.mp4 6.2 MB
Web Security and the OWASP Top 10 The Big Picture/8. Missing Function Level Access Control/1 - Overview.mp4 6 MB
Web Security and the OWASP Top 10 The Big Picture/4. Cross-Site Scripting (XSS)/3 - Defences.mp4 5.9 MB
Web Security and the OWASP Top 10 The Big Picture/7. Sensitive Data Exposure/4 - The risk in Practice.mp4 5.9 MB
Web Security and the OWASP Top 10 The Big Picture/2. Injection/4 - The risk in Practice.mp4 5.7 MB
Web Security and the OWASP Top 10 The Big Picture/10. Using Components with Known Vulnerabilities/1 - Overview.mp4 5.5 MB
Web Security and the OWASP Top 10 The Big Picture/3. Broken Authentication and Session Management/1 - Overview.mp4 5.5 MB
Web Security and the OWASP Top 10 The Big Picture/10. Using Components with Known Vulnerabilities/4 - The risk in Practice.mp4 5.3 MB
Web Security and the OWASP Top 10 The Big Picture/6. Security Misconfiguration/4 - The risk in Practice.mp4 5.3 MB
Web Security and the OWASP Top 10 The Big Picture/5. Insecure Direct Object References/1 - Overview.mp4 5.3 MB
Web Security and the OWASP Top 10 The Big Picture/9. Cross-Site Request Forgery (CSRF)/2 - Mounting an Attack.mp4 5.2 MB
Web Security and the OWASP Top 10 The Big Picture/11. Unvalidated Redirects and Forwards/2 - Mounting an Attack.mp4 5 MB
Web Security and the OWASP Top 10 The Big Picture/11. Unvalidated Redirects and Forwards/3 - Defences.mp4 4.9 MB
Web Security and the OWASP Top 10 The Big Picture/11. Unvalidated Redirects and Forwards/1 - Overview.mp4 4.9 MB
Web Security and the OWASP Top 10 The Big Picture/10. Using Components with Known Vulnerabilities/2 - Mounting an Attack.mp4 4.7 MB
Web Security and the OWASP Top 10 The Big Picture/2. Injection/2 - Mounting an Attack.mp4 4.7 MB
Web Security and the OWASP Top 10 The Big Picture/7. Sensitive Data Exposure/1 - Overview.mp4 4.7 MB
Web Security and the OWASP Top 10 The Big Picture/5. Insecure Direct Object References/2 - Mounting an Attack.mp4 4.4 MB
Web Security and the OWASP Top 10 The Big Picture/5. Insecure Direct Object References/4 - The risk in Practice.mp4 4.4 MB
Web Security and the OWASP Top 10 The Big Picture/Excercise Files.zip 4.1 MB
Web Security and the OWASP Top 10 The Big Picture/3. Broken Authentication and Session Management/4 - The risk in Practive.mp4 4 MB
Web Security and the OWASP Top 10 The Big Picture/4. Cross-Site Scripting (XSS)/2 -Mounting an Attack.mp4 3.9 MB
Web Security and the OWASP Top 10 The Big Picture/6. Security Misconfiguration/1 - Overview.mp4 3.9 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
Offensive Security WEB-300 Advanced Web Attacks and Exploitation 2020 Video 1.6 GB 2
[ DevCourseWeb.com ] Udemy - Secure Programming of Web Applications - Developers and TPMs.zip Application 418.6 MB 44
[ DevCourseWeb.com ] Udemy - Web Security and Web Hacking for Beginners.zip Application 1.1 GB 9
[ DevCourseWeb.com ] Udemy - Web Hacking - WordPress Penetration Testing and Security.zip Application 899.5 MB 9
The Web Application Hacker's Handbook - Finding and Exploiting Security Flaws{H33T}{Easypath} Application 10.2 MB 3
[ FreeCourseWeb.com ] Web Application Advanced Hacking - A Hands-On Field Guide to latest techniques used by security researchers and bug hunters.zip Application 12.6 MB 2
JSON Web Token (JWT) with Spring Security And Angular Video 9.3 GB 0
[ FreeCourseWeb.com ] PluralSight - Angular Security Using .NET 5 and JSON Web Tokens Video 352.3 MB 0
Cyber Security - Python and Web Applications Application 3 GB 42
[ FreeCourseWeb.com ] Hacking Web Apps - Detecting and Preventing Web Application Security Problems.zip Application 13.1 MB 34
[ FreeCourseWeb.com ] Udemy - LEE's Web Hacking (SQL-injection AND SECURE-CODING Skills).zip Application 585.8 MB 23
[ FreeCourseWeb.com ] Udemy - Apache Web Server - Deployment and Security - Hands-On.zip Application 2.5 GB 23
DickDrainers.20.10.01.Aria.Banks.Security.Guard.Solves.The.Crime.And.Punishes.Arias.Tigtht.Teenage.Pussy.XXX.720p.WEB.x264-GalaXXXy[XvX] Video 458.5 MB 13
Offensive-Security-Advanced-Web-Attacks-and-Exploitation-AWAE Application 29.8 GB 9
Computer Cyber Security Fundamentals topic include web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more Application 7 MB 9
Deep Web Secrecy and Security by Conrad Jaeger Application 1.2 MB 8
Practical Cryptology and Web Security.pdf Application 25.2 MB 8
[ FreeCourseWeb.com ] Security with Go - Explore the power of Golang to secure host, web, and cloud services (True).zip Application 6.6 MB 6
Linux Journal - Security Guidelines for Web Development + Intro to Rack Hosting and Deployment + Add SPlit Testing to Your Web App (February 2014) 11.6 MB 6
AppDev - Java EE Programming. AJAX with Direct Web Remoting (DWR), DOJO, and Security Video 2.1 GB 6

Loading...