9 hours ago
6.43 GB | 35min 21s | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English
Files Included :
FileName :1 Communication plan.mp4 | Size: (51.47 MB)
FileName :4 Introduction to Cybersecurity p 1 - Overview of current cyber threat landscape.mp4 | Size: (66.24 MB)
FileName :5 Introduction to Cybersecurity p 2 - Case Studies, Threat Analysis Models & More.mp4 | Size: (177 MB)
FileName :6 Introduction to Cybersecurity p 3 - Security Controls, SDD, SOC.mp4 | Size: (257.23 MB)
FileName :10 Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).mp4 | Size: (145.22 MB)
FileName :11 Cryptography Failures (Examples, Password Encryption, Hashing, Salting).mp4 | Size: (161.44 MB)
FileName :12 Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).mp4 | Size: (118.21 MB)
FileName :13 Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).mp4 | Size: (133.76 MB)
FileName :14 Injection (XPath Injection, Log Injection, Input Validation).mp4 | Size: (95.15 MB)
FileName :15 Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).mp4 | Size: (108.95 MB)
FileName :16 Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).mp4 | Size: (138.66 MB)
FileName :17 Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).mp4 | Size: (106.29 MB)
FileName :18 Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).mp4 | Size: (204.89 MB)
FileName :19 Vulnerable & Outdated Components.mp4 | Size: (187.97 MB)
FileName :20 Identification & Authentication Failures.mp4 | Size: (216.85 MB)
FileName :21 Software & Data Integrity Failures.mp4 | Size: (111.65 MB)
FileName :22 Security Logging & Monitoring Failures.mp4 | Size: (142.97 MB)
FileName :23 Server-Side Request Forgery (SSRF).mp4 | Size: (131.03 MB)
FileName :7 OWASP Top 10 Overview.mp4 | Size: (126.69 MB)
FileName :8 Broken Access Control.mp4 | Size: (325.07 MB)
FileName :9 Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).mp4 | Size: (99.51 MB)
FileName :25 API12023 Broken Object Level Authorization - Part 1.mp4 | Size: (181.76 MB)
FileName :26 API12023 Broken Object Level Authorization - Part 2 (Practice).mp4 | Size: (84.27 MB)
FileName :27 API12023 Broken Object Level Authorization - Part 3 (Zero-Trust, UUIDs).mp4 | Size: (238.14 MB)
FileName :28 API22023 Broken Authentication - Part 1 (Basics, Impact, Types of Attacks).mp4 | Size: (178.79 MB)
FileName :29 API22023 Broken Authentication - Part 2 (Case Studies, OAuth, OpenID).mp4 | Size: (206.15 MB)
FileName :30 API22023 Broken Authentication - P 3 - (Practice, JWT Tokens, Timing Attacks).mp4 | Size: (263.66 MB)
FileName :31 API32023 Broken Object Property Level Authorization - Part 1.mp4 | Size: (188.9 MB)
FileName :32 API32023 Broken Object Property Level Authorization - Part 2 (Practice).mp4 | Size: (185.44 MB)
FileName :33 API42023 Unrestricted Resource Consumption - Part 1.mp4 | Size: (263 MB)
FileName :34 API42023 Unrestricted Resource Consumption - Part 2 (Practice).mp4 | Size: (99.44 MB)
FileName :35 API52023 Broken Function Level Authorization - Part 1.mp4 | Size: (177.08 MB)
FileName :36 API52023 Broken Function Level Authorization - Part 2 (Practice).mp4 | Size: (78.34 MB)
FileName :37 API62023 Unrestricted Access to Sensitive Business Flows - Part 1.mp4 | Size: (211.5 MB)
FileName :38 API62023 Unrestricted Access to Sensitive Business Flows - Part 2.mp4 | Size: (247.45 MB)
FileName :39 API62023 Unrestricted Access to Sensitive Business Flows - Part 3 (Practice).mp4 | Size: (95.77 MB)
FileName :42 API92023 Improper Inventory Management - Part 1.mp4 | Size: (245.72 MB)
FileName :43 API92023 Improper Inventory Management - Part 2 (Practice).mp4 | Size: (90.82 MB)
FileName :44 API102023 Unsafe Consumption of APIs - Part 1.mp4 | Size: (294.83 MB)
FileName :45 API102023 Unsafe Consumption of APIs - Part 2 (Practice).mp4 | Size: (111.72 MB)
FileName :46 Bonus lesson.mp4 | Size: (31 MB)]
Screenshot
FileName :1 Communication plan.mp4 | Size: (51.47 MB)
FileName :4 Introduction to Cybersecurity p 1 - Overview of current cyber threat landscape.mp4 | Size: (66.24 MB)
FileName :5 Introduction to Cybersecurity p 2 - Case Studies, Threat Analysis Models & More.mp4 | Size: (177 MB)
FileName :6 Introduction to Cybersecurity p 3 - Security Controls, SDD, SOC.mp4 | Size: (257.23 MB)
FileName :10 Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).mp4 | Size: (145.22 MB)
FileName :11 Cryptography Failures (Examples, Password Encryption, Hashing, Salting).mp4 | Size: (161.44 MB)
FileName :12 Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).mp4 | Size: (118.21 MB)
FileName :13 Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).mp4 | Size: (133.76 MB)
FileName :14 Injection (XPath Injection, Log Injection, Input Validation).mp4 | Size: (95.15 MB)
FileName :15 Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).mp4 | Size: (108.95 MB)
FileName :16 Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).mp4 | Size: (138.66 MB)
FileName :17 Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).mp4 | Size: (106.29 MB)
FileName :18 Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).mp4 | Size: (204.89 MB)
FileName :19 Vulnerable & Outdated Components.mp4 | Size: (187.97 MB)
FileName :20 Identification & Authentication Failures.mp4 | Size: (216.85 MB)
FileName :21 Software & Data Integrity Failures.mp4 | Size: (111.65 MB)
FileName :22 Security Logging & Monitoring Failures.mp4 | Size: (142.97 MB)
FileName :23 Server-Side Request Forgery (SSRF).mp4 | Size: (131.03 MB)
FileName :7 OWASP Top 10 Overview.mp4 | Size: (126.69 MB)
FileName :8 Broken Access Control.mp4 | Size: (325.07 MB)
FileName :9 Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).mp4 | Size: (99.51 MB)
FileName :25 API12023 Broken Object Level Authorization - Part 1.mp4 | Size: (181.76 MB)
FileName :26 API12023 Broken Object Level Authorization - Part 2 (Practice).mp4 | Size: (84.27 MB)
FileName :27 API12023 Broken Object Level Authorization - Part 3 (Zero-Trust, UUIDs).mp4 | Size: (238.14 MB)
FileName :28 API22023 Broken Authentication - Part 1 (Basics, Impact, Types of Attacks).mp4 | Size: (178.79 MB)
FileName :29 API22023 Broken Authentication - Part 2 (Case Studies, OAuth, OpenID).mp4 | Size: (206.15 MB)
FileName :30 API22023 Broken Authentication - P 3 - (Practice, JWT Tokens, Timing Attacks).mp4 | Size: (263.66 MB)
FileName :31 API32023 Broken Object Property Level Authorization - Part 1.mp4 | Size: (188.9 MB)
FileName :32 API32023 Broken Object Property Level Authorization - Part 2 (Practice).mp4 | Size: (185.44 MB)
FileName :33 API42023 Unrestricted Resource Consumption - Part 1.mp4 | Size: (263 MB)
FileName :34 API42023 Unrestricted Resource Consumption - Part 2 (Practice).mp4 | Size: (99.44 MB)
FileName :35 API52023 Broken Function Level Authorization - Part 1.mp4 | Size: (177.08 MB)
FileName :36 API52023 Broken Function Level Authorization - Part 2 (Practice).mp4 | Size: (78.34 MB)
FileName :37 API62023 Unrestricted Access to Sensitive Business Flows - Part 1.mp4 | Size: (211.5 MB)
FileName :38 API62023 Unrestricted Access to Sensitive Business Flows - Part 2.mp4 | Size: (247.45 MB)
FileName :39 API62023 Unrestricted Access to Sensitive Business Flows - Part 3 (Practice).mp4 | Size: (95.77 MB)
FileName :42 API92023 Improper Inventory Management - Part 1.mp4 | Size: (245.72 MB)
FileName :43 API92023 Improper Inventory Management - Part 2 (Practice).mp4 | Size: (90.82 MB)
FileName :44 API102023 Unsafe Consumption of APIs - Part 1.mp4 | Size: (294.83 MB)
FileName :45 API102023 Unsafe Consumption of APIs - Part 2 (Practice).mp4 | Size: (111.72 MB)
FileName :46 Bonus lesson.mp4 | Size: (31 MB)]
Screenshot