[ FreeCourseWeb.com ] PluralSight - API Security with the OWASP API Security Top 10

File Type Create Time File Size Seeders Leechers Updated
Movie 2023-08-27 218.51MB 3 1 6 days ago
Download
Magnet link   or   Save Instantly without Torrenting   or   Torrent download

To download this file, you need a free bitTorrent client such as qBittorrent.

Report Abuse
Tags
FreeCourseWeb  com  PluralSight  API  Security  with  the  OWASP  API  Security  Top  
Related Torrents
  1. API Security with the OWASP API Security Top 10 242.80MB
  2. [ DevCourseWeb.com ] Owasp Api Security Top 10 - With Nodejs Code Samples 1.20GB
  3. [ FreeCourseWeb.com ] Moon Portugal - With Madeira & the Azores - Best Beaches, Top Excursions, Local Flavors (Travel Guide), 3rd Edition 35.75MB
  4. [ FreeCourseWeb.com ] Crab - 50 Recipes with the Fresh Taste of the Sea from the Pacific, Atlantic & Gulf Coasts (true EPUB) 67.72MB
  5. freecourseweb-com-pluralsight---getting-started-with-hashicorp-vault-zip - Downloader.exe 782.95KB
  6. [ FreeCourseWeb.com ] Ham - An Obsession with the Hindquarter.zip 19.72MB
  7. [ FreeCourseWeb.com ] PluralSight - Node.js Microservices - API Gateway and Edge Services 494.85MB
  8. [ FreeCourseWeb.com ] PluralSight - Building a REST API Using Python and Flask.zip 285.49MB
  9. [ FreeCourseWeb.com ] PluralSight - Developing Generative AI Applications with Python and Open AI 443.16MB
  10. [ FreeCourseWeb.com ] PluralSight - Build Machine Learning Models with Azure Machine Learning Designer 212.92MB
Files
  1. Get Bonus Downloads Here.url 183B
  2. ~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4 4.03MB
  3. ~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt 2.24KB
  4. ~Get Your Files Here !/10. Security Misconfiguration/1. Misconfiguration and Patching.mp4 5.30MB
  5. ~Get Your Files Here !/10. Security Misconfiguration/1. Misconfiguration and Patching.vtt 4.31KB
  6. ~Get Your Files Here !/10. Security Misconfiguration/2. HTTP Request Chain Misconfigurations.mp4 3.40MB
  7. ~Get Your Files Here !/10. Security Misconfiguration/2. HTTP Request Chain Misconfigurations.vtt 2.82KB
  8. ~Get Your Files Here !/10. Security Misconfiguration/3. Server Environment Misconfigurations.mp4 6.50MB
  9. ~Get Your Files Here !/10. Security Misconfiguration/3. Server Environment Misconfigurations.vtt 4.05KB
  10. ~Get Your Files Here !/10. Security Misconfiguration/4. Misconfiguration in the API and Response Chain.mp4 10.70MB
  11. ~Get Your Files Here !/10. Security Misconfiguration/4. Misconfiguration in the API and Response Chain.vtt 9.11KB
  12. ~Get Your Files Here !/11. Improper Inventory Management/1. Understanding Improper Inventory Management.mp4 5.97MB
  13. ~Get Your Files Here !/11. Improper Inventory Management/1. Understanding Improper Inventory Management.vtt 4.49KB
  14. ~Get Your Files Here !/11. Improper Inventory Management/2. Demo - Deprecated Functionality.mp4 4.41MB
  15. ~Get Your Files Here !/11. Improper Inventory Management/2. Demo - Deprecated Functionality.vtt 2.88KB
  16. ~Get Your Files Here !/11. Improper Inventory Management/3. Attacks and Defenses.mp4 9.17MB
  17. ~Get Your Files Here !/11. Improper Inventory Management/3. Attacks and Defenses.vtt 7.40KB
  18. ~Get Your Files Here !/12. Unsafe Consumption of APIs/1. Understanding Unsafe Consumption of APIs.mp4 4.04MB
  19. ~Get Your Files Here !/12. Unsafe Consumption of APIs/1. Understanding Unsafe Consumption of APIs.vtt 3.32KB
  20. ~Get Your Files Here !/12. Unsafe Consumption of APIs/2. API Consumption Attacks.mp4 2.59MB
  21. ~Get Your Files Here !/12. Unsafe Consumption of APIs/2. API Consumption Attacks.vtt 2.29KB
  22. ~Get Your Files Here !/12. Unsafe Consumption of APIs/3. API Consumption Defenses.mp4 8.59MB
  23. ~Get Your Files Here !/12. Unsafe Consumption of APIs/3. API Consumption Defenses.vtt 6.96KB
  24. ~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/1. Using the OWASP API Security Top 10.mp4 10.37MB
  25. ~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/1. Using the OWASP API Security Top 10.vtt 6.64KB
  26. ~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/2. Metrics behind the Top 10 Risks.mp4 7.48MB
  27. ~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/2. Metrics behind the Top 10 Risks.vtt 5.50KB
  28. ~Get Your Files Here !/3. Broken Object Level Authorization/1. Understanding Broken Object Level Authorization.mp4 3.12MB
  29. ~Get Your Files Here !/3. Broken Object Level Authorization/1. Understanding Broken Object Level Authorization.vtt 2.16KB
  30. ~Get Your Files Here !/3. Broken Object Level Authorization/2. Object Level Attacks.mp4 4.77MB
  31. ~Get Your Files Here !/3. Broken Object Level Authorization/2. Object Level Attacks.vtt 3.76KB
  32. ~Get Your Files Here !/3. Broken Object Level Authorization/3. Demo - Broken Object Level Attacks.mp4 10.52MB
  33. ~Get Your Files Here !/3. Broken Object Level Authorization/3. Demo - Broken Object Level Attacks.vtt 3.34KB
  34. ~Get Your Files Here !/3. Broken Object Level Authorization/4. Examining Defenses.mp4 3.57MB
  35. ~Get Your Files Here !/3. Broken Object Level Authorization/4. Examining Defenses.vtt 2.48KB
  36. ~Get Your Files Here !/4. Broken Authentication/1. Understanding Broken Authentication.mp4 3.10MB
  37. ~Get Your Files Here !/4. Broken Authentication/1. Understanding Broken Authentication.vtt 2.35KB
  38. ~Get Your Files Here !/4. Broken Authentication/2. Password Based Attacks and Defenses.mp4 9.73MB
  39. ~Get Your Files Here !/4. Broken Authentication/2. Password Based Attacks and Defenses.vtt 7.14KB
  40. ~Get Your Files Here !/4. Broken Authentication/3. Other Attacks and Defenses.mp4 7.93MB
  41. ~Get Your Files Here !/4. Broken Authentication/3. Other Attacks and Defenses.vtt 5.94KB
  42. ~Get Your Files Here !/4. Broken Authentication/4. Demo - Common JWT Attacks.mp4 10.71MB
  43. ~Get Your Files Here !/4. Broken Authentication/4. Demo - Common JWT Attacks.vtt 4.78KB
  44. ~Get Your Files Here !/5. Broken Object Property Level Authorization/1. Understanding Broken Object Property Level Authorization.mp4 3.88MB
  45. ~Get Your Files Here !/5. Broken Object Property Level Authorization/1. Understanding Broken Object Property Level Authorization.vtt 2.97KB
  46. ~Get Your Files Here !/5. Broken Object Property Level Authorization/2. Object Property Attacks and Defenses.mp4 3.71MB
  47. ~Get Your Files Here !/5. Broken Object Property Level Authorization/2. Object Property Attacks and Defenses.vtt 3.24KB
  48. ~Get Your Files Here !/5. Broken Object Property Level Authorization/3. Demo - Exploiting Object Properties.mp4 6.43MB
  49. ~Get Your Files Here !/5. Broken Object Property Level Authorization/3. Demo - Exploiting Object Properties.vtt 3.72KB
  50. ~Get Your Files Here !/6. Unrestricted Resource Consumption/1. Unrestricted Resource Consumption Attacks.mp4 6.37MB
  51. ~Get Your Files Here !/6. Unrestricted Resource Consumption/1. Unrestricted Resource Consumption Attacks.vtt 4.54KB
  52. ~Get Your Files Here !/6. Unrestricted Resource Consumption/2. Defenses for Resource Consumption.mp4 5.50MB
  53. ~Get Your Files Here !/6. Unrestricted Resource Consumption/2. Defenses for Resource Consumption.vtt 4.00KB
  54. ~Get Your Files Here !/7. Broken Function Level Authorization/1. Attacking Broken Function Level Authorization.mp4 5.36MB
  55. ~Get Your Files Here !/7. Broken Function Level Authorization/1. Attacking Broken Function Level Authorization.vtt 4.26KB
  56. ~Get Your Files Here !/7. Broken Function Level Authorization/2. Demo - Exploiting Broken Function Level Authorization.mp4 10.82MB
  57. ~Get Your Files Here !/7. Broken Function Level Authorization/2. Demo - Exploiting Broken Function Level Authorization.vtt 3.38KB
  58. ~Get Your Files Here !/7. Broken Function Level Authorization/3. Defenses.mp4 5.82MB
  59. ~Get Your Files Here !/7. Broken Function Level Authorization/3. Defenses.vtt 4.26KB
  60. ~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/1. Sensitive Business Flows and Potential Attacks.mp4 6.61MB
  61. ~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/1. Sensitive Business Flows and Potential Attacks.vtt 4.95KB
  62. ~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/2. Demo - Attacking an Unrestricted Business Flow.mp4 5.78MB
  63. ~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/2. Demo - Attacking an Unrestricted Business Flow.vtt 2.91KB
  64. ~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/3. Business Flow Defenses.mp4 6.06MB
  65. ~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/3. Business Flow Defenses.vtt 5.00KB
  66. ~Get Your Files Here !/9. Server-side Request Forgery/1. Understanding Server-side Request Forgery.mp4 6.43MB
  67. ~Get Your Files Here !/9. Server-side Request Forgery/1. Understanding Server-side Request Forgery.vtt 4.73KB
  68. ~Get Your Files Here !/9. Server-side Request Forgery/2. Demo - Forging Requests from the Server.mp4 4.34MB
  69. ~Get Your Files Here !/9. Server-side Request Forgery/2. Demo - Forging Requests from the Server.vtt 3.22KB
  70. ~Get Your Files Here !/9. Server-side Request Forgery/3. SSRF Defenses.mp4 5.22MB
  71. ~Get Your Files Here !/9. Server-side Request Forgery/3. SSRF Defenses.vtt 3.86KB
  72. ~Get Your Files Here !/Bonus Resources.txt 386B
  73. ~Get Your Files Here !/playlist.m3u 2.63KB