OWASP Top 10- API Security Playbook
File List
- 08. Security Misconfiguration/02. Common Security Misconfigurations.mp4 9.9 MB
- 09. Injection/03. Injection Defenses.mp4 9.9 MB
- 10. Improper Assets Management/01. Attacks on Improper Asset Management.mp4 9.2 MB
- 01. Using the OWASP API Top 10/00. Goals of the API Top 10.mp4 8.0 MB
- 08. Security Misconfiguration/01. Understanding a Vulnerable CORS Implementation.mp4 7.9 MB
- 08. Security Misconfiguration/00. Overview.mp4 7.6 MB
- 09. Injection/01. Attacking Injection Vulnerabilities.mp4 7.6 MB
- 03. Broken User Authentication/00. Understanding Broken Authorization.mp4 7.2 MB
- 06. Broken Function Level Authorization/01. Attacks on Function Level Authorization.mp4 7.2 MB
- 02. Broken Object Level Authorization/01. Attacking Broken Object Level Authorization.mp4 7.2 MB
- 05. Lack of Resource and Rate Limiting/03. Rate Limiting Defenses.mp4 6.1 MB
- 10. Improper Assets Management/02. Defending Your Assets.mp4 5.7 MB
- 05. Lack of Resource and Rate Limiting/01. Attacks on Rate Limiting Vulnerabilities.mp4 5.7 MB
- 01. Using the OWASP API Top 10/01. Vulnerability Risk Factors.mp4 5.7 MB
- 04. Excessive Data Exposure/00. Overview.mp4 5.5 MB
- 03. Broken User Authentication/03. Common JWT Failures.mp4 5.2 MB
- 11. Insufficient Logging and Monitoring/02. Logging and Monitoring for Defense.mp4 4.9 MB
- 09. Injection/02. Injection Risks.mp4 4.9 MB
- 04. Excessive Data Exposure/01. Attacking Excessive Data Exposure.mp4 4.9 MB
- 07. Mass Assignment/01. Attacking Mass Assignment Vulnerabilities.mp4 4.7 MB
- 11. Insufficient Logging and Monitoring/00. Overview.mp4 4.7 MB
- 03. Broken User Authentication/04. Using API Keys.mp4 4.6 MB
- 07. Mass Assignment/00. Overview.mp4 4.6 MB
- 02. Broken Object Level Authorization/02. Defending Against Broken Object Level Authorization.mp4 4.5 MB
- 03. Broken User Authentication/01. Storing Passwords Securely.mp4 4.4 MB
- 10. Improper Assets Management/00. Overview.mp4 4.2 MB
- 09. Injection/00. Overview.mp4 4.0 MB
- 06. Broken Function Level Authorization/02. Function Level Authorization Defenses.mp4 3.9 MB
- 05. Lack of Resource and Rate Limiting/00. Overview.mp4 3.8 MB
- 11. Insufficient Logging and Monitoring/01. Effects of Insufficient Logging and Monitoring.mp4 3.4 MB
- 00. Course Overview/00. Course Overview.mp4 3.3 MB
- 07. Mass Assignment/02. Mass Assignment Defenses.mp4 3.3 MB
- 03. Broken User Authentication/02. Credential Stuffing.mp4 3.3 MB
- 04. Excessive Data Exposure/02. Defending Against Excessive Data Exposure.mp4 3.3 MB
- 05. Lack of Resource and Rate Limiting/02. Rate Limiting Risks.mp4 3.3 MB
- 06. Broken Function Level Authorization/00. Overview.mp4 3.3 MB
- 02. Broken Object Level Authorization/00. Overview.mp4 3.1 MB
- 08. Security Misconfiguration/02. Common Security Misconfigurations.srt 10.3 KB
- 09. Injection/03. Injection Defenses.srt 10.2 KB
- 08. Security Misconfiguration/00. Overview.srt 8.8 KB
- 08. Security Misconfiguration/01. Understanding a Vulnerable CORS Implementation.srt 8.1 KB
- 10. Improper Assets Management/01. Attacks on Improper Asset Management.srt 7.9 KB
- 02. Broken Object Level Authorization/01. Attacking Broken Object Level Authorization.srt 7.9 KB
- 01. Using the OWASP API Top 10/00. Goals of the API Top 10.srt 7.8 KB
- 09. Injection/01. Attacking Injection Vulnerabilities.srt 7.8 KB
- 03. Broken User Authentication/00. Understanding Broken Authorization.srt 7.7 KB
- 06. Broken Function Level Authorization/01. Attacks on Function Level Authorization.srt 7.4 KB
- 01. Using the OWASP API Top 10/01. Vulnerability Risk Factors.srt 6.3 KB
- 05. Lack of Resource and Rate Limiting/03. Rate Limiting Defenses.srt 5.9 KB
- 05. Lack of Resource and Rate Limiting/01. Attacks on Rate Limiting Vulnerabilities.srt 5.7 KB
- 04. Excessive Data Exposure/00. Overview.srt 5.7 KB
- 10. Improper Assets Management/02. Defending Your Assets.srt 5.6 KB
- 03. Broken User Authentication/03. Common JWT Failures.srt 5.5 KB
- 11. Insufficient Logging and Monitoring/02. Logging and Monitoring for Defense.srt 5.4 KB
- 11. Insufficient Logging and Monitoring/00. Overview.srt 5.2 KB
- 03. Broken User Authentication/04. Using API Keys.srt 5.2 KB
- 03. Broken User Authentication/01. Storing Passwords Securely.srt 5.0 KB
- 04. Excessive Data Exposure/01. Attacking Excessive Data Exposure.srt 5.0 KB
- 02. Broken Object Level Authorization/02. Defending Against Broken Object Level Authorization.srt 4.8 KB
- 07. Mass Assignment/01. Attacking Mass Assignment Vulnerabilities.srt 4.8 KB
- 07. Mass Assignment/00. Overview.srt 4.7 KB
- 10. Improper Assets Management/00. Overview.srt 4.5 KB
- 09. Injection/02. Injection Risks.srt 4.5 KB
- 05. Lack of Resource and Rate Limiting/00. Overview.srt 4.3 KB
- 09. Injection/00. Overview.srt 4.2 KB
- 06. Broken Function Level Authorization/02. Function Level Authorization Defenses.srt 4.2 KB
- 04. Excessive Data Exposure/02. Defending Against Excessive Data Exposure.srt 3.8 KB
- 07. Mass Assignment/02. Mass Assignment Defenses.srt 3.7 KB
- 02. Broken Object Level Authorization/00. Overview.srt 3.5 KB
- 05. Lack of Resource and Rate Limiting/02. Rate Limiting Risks.srt 3.3 KB
- 06. Broken Function Level Authorization/00. Overview.srt 3.3 KB
- 11. Insufficient Logging and Monitoring/01. Effects of Insufficient Logging and Monitoring.srt 3.2 KB
- 03. Broken User Authentication/02. Credential Stuffing.srt 3.0 KB
- 00. Course Overview/00. Course Overview.srt 2.3 KB
- 01. Using the OWASP API Top 10/6 Simple Memory Techniques.html 98 bytes
- 02. Broken Object Level Authorization/USB Rubber Ducky Deluxe.html 84 bytes
- 03. Broken User Authentication/Yubico - YubiKey 5 NFC.html 84 bytes
- 06. Broken Function Level Authorization/Linux Tails Operating System.html 84 bytes
- 11. Insufficient Logging and Monitoring/LIFX 1100-Lumen.html 84 bytes
- 11. Insufficient Logging and Monitoring/Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html 84 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.