OWASP Top 10- API Security Playbook/08. Security Misconfiguration/02. Common Security Misconfigurations.mp4 |
9.9 MB |
OWASP Top 10- API Security Playbook/00. Course Overview/00. Course Overview.srt |
2 KB |
OWASP Top 10- API Security Playbook/01. Using the OWASP API Top 10/6 Simple Memory Techniques.html |
98 B |
OWASP Top 10- API Security Playbook/01. Using the OWASP API Top 10/00. Goals of the API Top 10.mp4 |
8 MB |
OWASP Top 10- API Security Playbook/01. Using the OWASP API Top 10/00. Goals of the API Top 10.srt |
8 KB |
OWASP Top 10- API Security Playbook/01. Using the OWASP API Top 10/01. Vulnerability Risk Factors.mp4 |
5.7 MB |
OWASP Top 10- API Security Playbook/01. Using the OWASP API Top 10/01. Vulnerability Risk Factors.srt |
6 KB |
OWASP Top 10- API Security Playbook/02. Broken Object Level Authorization/00. Overview.mp4 |
3.1 MB |
OWASP Top 10- API Security Playbook/02. Broken Object Level Authorization/00. Overview.srt |
3 KB |
OWASP Top 10- API Security Playbook/02. Broken Object Level Authorization/01. Attacking Broken Object Level Authorization.mp4 |
7.2 MB |
OWASP Top 10- API Security Playbook/02. Broken Object Level Authorization/01. Attacking Broken Object Level Authorization.srt |
8 KB |
OWASP Top 10- API Security Playbook/02. Broken Object Level Authorization/02. Defending Against Broken Object Level Authorization.mp4 |
4.5 MB |
OWASP Top 10- API Security Playbook/02. Broken Object Level Authorization/02. Defending Against Broken Object Level Authorization.srt |
5 KB |
OWASP Top 10- API Security Playbook/02. Broken Object Level Authorization/USB Rubber Ducky Deluxe.html |
84 B |
OWASP Top 10- API Security Playbook/03. Broken User Authentication/00. Understanding Broken Authorization.mp4 |
7.2 MB |
OWASP Top 10- API Security Playbook/03. Broken User Authentication/00. Understanding Broken Authorization.srt |
8 KB |
OWASP Top 10- API Security Playbook/03. Broken User Authentication/01. Storing Passwords Securely.mp4 |
4.4 MB |
OWASP Top 10- API Security Playbook/03. Broken User Authentication/01. Storing Passwords Securely.srt |
5 KB |
OWASP Top 10- API Security Playbook/03. Broken User Authentication/02. Credential Stuffing.mp4 |
3.3 MB |
OWASP Top 10- API Security Playbook/03. Broken User Authentication/02. Credential Stuffing.srt |
3 KB |
OWASP Top 10- API Security Playbook/03. Broken User Authentication/03. Common JWT Failures.mp4 |
5.2 MB |
OWASP Top 10- API Security Playbook/03. Broken User Authentication/03. Common JWT Failures.srt |
5 KB |
OWASP Top 10- API Security Playbook/03. Broken User Authentication/04. Using API Keys.mp4 |
4.6 MB |
OWASP Top 10- API Security Playbook/03. Broken User Authentication/04. Using API Keys.srt |
5 KB |
OWASP Top 10- API Security Playbook/03. Broken User Authentication/Yubico - YubiKey 5 NFC.html |
84 B |
OWASP Top 10- API Security Playbook/04. Excessive Data Exposure/00. Overview.mp4 |
5.5 MB |
OWASP Top 10- API Security Playbook/04. Excessive Data Exposure/00. Overview.srt |
6 KB |
OWASP Top 10- API Security Playbook/04. Excessive Data Exposure/01. Attacking Excessive Data Exposure.mp4 |
4.9 MB |
OWASP Top 10- API Security Playbook/04. Excessive Data Exposure/01. Attacking Excessive Data Exposure.srt |
5 KB |
OWASP Top 10- API Security Playbook/04. Excessive Data Exposure/02. Defending Against Excessive Data Exposure.mp4 |
3.3 MB |
OWASP Top 10- API Security Playbook/04. Excessive Data Exposure/02. Defending Against Excessive Data Exposure.srt |
4 KB |
OWASP Top 10- API Security Playbook/05. Lack of Resource and Rate Limiting/00. Overview.mp4 |
3.8 MB |
OWASP Top 10- API Security Playbook/05. Lack of Resource and Rate Limiting/00. Overview.srt |
4 KB |
OWASP Top 10- API Security Playbook/05. Lack of Resource and Rate Limiting/01. Attacks on Rate Limiting Vulnerabilities.mp4 |
5.7 MB |
OWASP Top 10- API Security Playbook/05. Lack of Resource and Rate Limiting/01. Attacks on Rate Limiting Vulnerabilities.srt |
6 KB |
OWASP Top 10- API Security Playbook/05. Lack of Resource and Rate Limiting/02. Rate Limiting Risks.mp4 |
3.3 MB |
OWASP Top 10- API Security Playbook/05. Lack of Resource and Rate Limiting/02. Rate Limiting Risks.srt |
3 KB |
OWASP Top 10- API Security Playbook/05. Lack of Resource and Rate Limiting/03. Rate Limiting Defenses.mp4 |
6.1 MB |
OWASP Top 10- API Security Playbook/05. Lack of Resource and Rate Limiting/03. Rate Limiting Defenses.srt |
6 KB |
OWASP Top 10- API Security Playbook/06. Broken Function Level Authorization/00. Overview.mp4 |
3.3 MB |
OWASP Top 10- API Security Playbook/06. Broken Function Level Authorization/00. Overview.srt |
3 KB |
OWASP Top 10- API Security Playbook/06. Broken Function Level Authorization/01. Attacks on Function Level Authorization.mp4 |
7.2 MB |
OWASP Top 10- API Security Playbook/06. Broken Function Level Authorization/01. Attacks on Function Level Authorization.srt |
7 KB |
OWASP Top 10- API Security Playbook/06. Broken Function Level Authorization/02. Function Level Authorization Defenses.mp4 |
3.9 MB |
OWASP Top 10- API Security Playbook/06. Broken Function Level Authorization/02. Function Level Authorization Defenses.srt |
4 KB |
OWASP Top 10- API Security Playbook/06. Broken Function Level Authorization/Linux Tails Operating System.html |
84 B |
OWASP Top 10- API Security Playbook/07. Mass Assignment/00. Overview.mp4 |
4.6 MB |
OWASP Top 10- API Security Playbook/07. Mass Assignment/00. Overview.srt |
5 KB |
OWASP Top 10- API Security Playbook/07. Mass Assignment/01. Attacking Mass Assignment Vulnerabilities.mp4 |
4.7 MB |
OWASP Top 10- API Security Playbook/07. Mass Assignment/01. Attacking Mass Assignment Vulnerabilities.srt |
5 KB |
OWASP Top 10- API Security Playbook/07. Mass Assignment/02. Mass Assignment Defenses.mp4 |
3.3 MB |
OWASP Top 10- API Security Playbook/07. Mass Assignment/02. Mass Assignment Defenses.srt |
4 KB |
OWASP Top 10- API Security Playbook/08. Security Misconfiguration/00. Overview.mp4 |
7.6 MB |
OWASP Top 10- API Security Playbook/08. Security Misconfiguration/00. Overview.srt |
9 KB |
OWASP Top 10- API Security Playbook/08. Security Misconfiguration/01. Understanding a Vulnerable CORS Implementation.mp4 |
7.9 MB |
OWASP Top 10- API Security Playbook/08. Security Misconfiguration/01. Understanding a Vulnerable CORS Implementation.srt |
8 KB |
OWASP Top 10- API Security Playbook/00. Course Overview/00. Course Overview.mp4 |
3.3 MB |
OWASP Top 10- API Security Playbook/08. Security Misconfiguration/02. Common Security Misconfigurations.srt |
10 KB |
OWASP Top 10- API Security Playbook/09. Injection/00. Overview.mp4 |
4 MB |
OWASP Top 10- API Security Playbook/09. Injection/00. Overview.srt |
4 KB |
OWASP Top 10- API Security Playbook/09. Injection/01. Attacking Injection Vulnerabilities.mp4 |
7.6 MB |
OWASP Top 10- API Security Playbook/09. Injection/01. Attacking Injection Vulnerabilities.srt |
8 KB |
OWASP Top 10- API Security Playbook/09. Injection/02. Injection Risks.mp4 |
4.9 MB |
OWASP Top 10- API Security Playbook/09. Injection/02. Injection Risks.srt |
4 KB |
OWASP Top 10- API Security Playbook/09. Injection/03. Injection Defenses.mp4 |
9.9 MB |
OWASP Top 10- API Security Playbook/09. Injection/03. Injection Defenses.srt |
10 KB |
OWASP Top 10- API Security Playbook/10. Improper Assets Management/00. Overview.mp4 |
4.2 MB |
OWASP Top 10- API Security Playbook/10. Improper Assets Management/00. Overview.srt |
4 KB |
OWASP Top 10- API Security Playbook/10. Improper Assets Management/01. Attacks on Improper Asset Management.mp4 |
9.2 MB |
OWASP Top 10- API Security Playbook/10. Improper Assets Management/01. Attacks on Improper Asset Management.srt |
8 KB |
OWASP Top 10- API Security Playbook/10. Improper Assets Management/02. Defending Your Assets.mp4 |
5.7 MB |
OWASP Top 10- API Security Playbook/10. Improper Assets Management/02. Defending Your Assets.srt |
6 KB |
OWASP Top 10- API Security Playbook/11. Insufficient Logging and Monitoring/00. Overview.mp4 |
4.7 MB |
OWASP Top 10- API Security Playbook/11. Insufficient Logging and Monitoring/00. Overview.srt |
5 KB |
OWASP Top 10- API Security Playbook/11. Insufficient Logging and Monitoring/01. Effects of Insufficient Logging and Monitoring.mp4 |
3.4 MB |
OWASP Top 10- API Security Playbook/11. Insufficient Logging and Monitoring/01. Effects of Insufficient Logging and Monitoring.srt |
3 KB |
OWASP Top 10- API Security Playbook/11. Insufficient Logging and Monitoring/02. Logging and Monitoring for Defense.mp4 |
4.9 MB |
OWASP Top 10- API Security Playbook/11. Insufficient Logging and Monitoring/02. Logging and Monitoring for Defense.srt |
5 KB |
OWASP Top 10- API Security Playbook/11. Insufficient Logging and Monitoring/LIFX 1100-Lumen.html |
84 B |
OWASP Top 10- API Security Playbook/11. Insufficient Logging and Monitoring/Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html |
84 B |