Magnetic link has been copied to the cutting board

Name API Security with the OWASP API Security Top 10

File Type package

Size 242.80MB

UpdateDate 2024-6-29

hash *****2820B8F182641C6FB4C5C353EA9A76A486

Hot 36

Files 01. Course Overview/01. Course Overview.mp4 | 4.03MB 01. Course Overview/01. Course Overview.srt | 2.33KB 02. Understanding the OWASP API Security Top 10/01. Using the OWASP API Security Top 10.mp4 | 10.37MB 02. Understanding the OWASP API Security Top 10/01. Using the OWASP API Security Top 10.srt | 7.51KB 02. Understanding the OWASP API Security Top 10/02. Metrics behind the Top 10 Risks.mp4 | 7.48MB 02. Understanding the OWASP API Security Top 10/02. Metrics behind the Top 10 Risks.srt | 6.26KB 03. Broken Object Level Authorization/01. Understanding Broken Object Level Authorization.mp4 | 3.12MB 03. Broken Object Level Authorization/01. Understanding Broken Object Level Authorization.srt | 2.25KB 03. Broken Object Level Authorization/02. Object Level Attacks.mp4 | 4.77MB 03. Broken Object Level Authorization/02. Object Level Attacks.srt | 4.02KB 03. Broken Object Level Authorization/03. Demo- Broken Object Level Attacks.mp4 | 10.52MB 03. Broken Object Level Authorization/03. Demo- Broken Object Level Attacks.srt | 3.65KB 03. Broken Object Level Authorization/04. Examining Defenses.mp4 | 3.57MB 03. Broken Object Level Authorization/04. Examining Defenses.srt | 2.66KB 04. Broken Authentication/01. Understanding Broken Authentication.mp4 | 3.10MB 04. Broken Authentication/01. Understanding Broken Authentication.srt | 2.53KB 04. Broken Authentication/02. Password Based Attacks and Defenses.mp4 | 9.73MB 04. Broken Authentication/02. Password Based Attacks and Defenses.srt | 7.65KB 04. Broken Authentication/03. Other Attacks and Defenses.mp4 | 7.93MB 04. Broken Authentication/03. Other Attacks and Defenses.srt | 6.39KB 04. Broken Authentication/04. Demo- Common JWT Attacks.mp4 | 10.71MB 04. Broken Authentication/04. Demo- Common JWT Attacks.srt | 5.05KB 05. Broken Object Property Level Authorization/01. Understanding Broken Object Property Level Authorization.mp4 | 3.88MB 05. Broken Object Property Level Authorization/01. Understanding Broken Object Property Level Authorization.srt | 3.08KB 05. Broken Object Property Level Authorization/02. Object Property Attacks and Defenses.mp4 | 3.71MB 05. Broken Object Property Level Authorization/02. Object Property Attacks and Defenses.srt | 3.46KB 05. Broken Object Property Level Authorization/03. Demo- Exploiting Object Properties.mp4 | 6.43MB 05. Broken Object Property Level Authorization/03. Demo- Exploiting Object Properties.srt | 3.91KB 06. Unrestricted Resource Consumption/01. Unrestricted Resource Consumption Attacks.mp4 | 6.37MB 06. Unrestricted Resource Consumption/01. Unrestricted Resource Consumption Attacks.srt | 4.78KB 06. Unrestricted Resource Consumption/02. Defenses for Resource Consumption.mp4 | 5.50MB 06. Unrestricted Resource Consumption/02. Defenses for Resource Consumption.srt | 4.37KB 07. Broken Function Level Authorization/01. Attacking Broken Function Level Authorization.mp4 | 5.36MB 07. Broken Function Level Authorization/01. Attacking Broken Function Level Authorization.srt | 4.59KB 07. Broken Function Level Authorization/02. Demo- Exploiting Broken Function Level Authorization.mp4 | 10.82MB 07. Broken Function Level Authorization/02. Demo- Exploiting Broken Function Level Authorization.srt | 3.55KB 07. Broken Function Level Authorization/03. Defenses.mp4 | 5.82MB 07. Broken Function Level Authorization/03. Defenses.srt | 4.46KB 08. Unrestricted Access to Sensitive Business Flows/01. Sensitive Business Flows and Potential Attacks.mp4 | 6.61MB 08. Unrestricted Access to Sensitive Business Flows/01. Sensitive Business Flows and Potential Attacks.srt | 5.29KB 08. Unrestricted Access to Sensitive Business Flows/02. Demo- Attacking an Unrestricted Business Flow.mp4 | 5.78MB 08. Unrestricted Access to Sensitive Business Flows/02. Demo- Attacking an Unrestricted Business Flow.srt | 3.08KB 08. Unrestricted Access to Sensitive Business Flows/03. Business Flow Defenses.mp4 | 6.06MB 08. Unrestricted Access to Sensitive Business Flows/03. Business Flow Defenses.srt | 5.42KB 09. Server-side Request Forgery/01. Understanding Server-side Request Forgery.mp4 | 6.43MB 09. Server-side Request Forgery/01. Understanding Server-side Request Forgery.srt | 5.12KB 09. Server-side Request Forgery/02. Demo- Forging Requests from the Server.mp4 | 4.34MB 09. Server-side Request Forgery/02. Demo- Forging Requests from the Server.srt | 3.32KB 09. Server-side Request Forgery/03. SSRF Defenses.mp4 | 5.22MB 09. Server-side Request Forgery/03. SSRF Defenses.srt | 4.20KB 10. Security Misconfiguration/01. Misconfiguration and Patching.mp4 | 5.30MB 10. Security Misconfiguration/01. Misconfiguration and Patching.srt | 4.67KB 10. Security Misconfiguration/02. HTTP Request Chain Misconfigurations.mp4 | 3.40MB 10. Security Misconfiguration/02. HTTP Request Chain Misconfigurations.srt | 3.08KB 10. Security Misconfiguration/03. Server Environment Misconfigurations.mp4 | 6.50MB 10. Security Misconfiguration/03. Server Environment Misconfigurations.srt | 4.37KB 10. Security Misconfiguration/04. Misconfiguration in the API and Response Chain.mp4 | 10.70MB 10. Security Misconfiguration/04. Misconfiguration in the API and Response Chain.srt | 9.61KB 11. Improper Inventory Management/01. Understanding Improper Inventory Management.mp4 | 5.97MB 11. Improper Inventory Management/01. Understanding Improper Inventory Management.srt | 4.61KB 11. Improper Inventory Management/02. Demo- Deprecated Functionality.mp4 | 4.41MB 11. Improper Inventory Management/02. Demo- Deprecated Functionality.srt | 2.86KB 11. Improper Inventory Management/03. Attacks and Defenses.mp4 | 9.17MB 11. Improper Inventory Management/03. Attacks and Defenses.srt | 7.73KB 12. Unsafe Consumption of APIs/01. Understanding Unsafe Consumption of APIs.mp4 | 4.04MB 12. Unsafe Consumption of APIs/01. Understanding Unsafe Consumption of APIs.srt | 3.52KB 12. Unsafe Consumption of APIs/02. API Consumption Attacks.mp4 | 2.59MB 12. Unsafe Consumption of APIs/02. API Consumption Attacks.srt | 2.38KB 12. Unsafe Consumption of APIs/03. API Consumption Defenses.mp4 | 8.59MB 12. Unsafe Consumption of APIs/03. API Consumption Defenses.srt | 7.36KB owasp-api-security-top-10.zip | 24.28MB

Recommend

Magnetic link has been copied to the cutting board