[ FreeCourseWeb.com ] PluralSight - API Security with the OWASP API Security Top 10
File List
- ~Get Your Files Here !/7. Broken Function Level Authorization/2. Demo - Exploiting Broken Function Level Authorization.mp4 10.8 MB
- ~Get Your Files Here !/4. Broken Authentication/4. Demo - Common JWT Attacks.mp4 10.7 MB
- ~Get Your Files Here !/10. Security Misconfiguration/4. Misconfiguration in the API and Response Chain.mp4 10.7 MB
- ~Get Your Files Here !/3. Broken Object Level Authorization/3. Demo - Broken Object Level Attacks.mp4 10.5 MB
- ~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/1. Using the OWASP API Security Top 10.mp4 10.4 MB
- ~Get Your Files Here !/4. Broken Authentication/2. Password Based Attacks and Defenses.mp4 9.7 MB
- ~Get Your Files Here !/11. Improper Inventory Management/3. Attacks and Defenses.mp4 9.2 MB
- ~Get Your Files Here !/12. Unsafe Consumption of APIs/3. API Consumption Defenses.mp4 8.6 MB
- ~Get Your Files Here !/4. Broken Authentication/3. Other Attacks and Defenses.mp4 7.9 MB
- ~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/2. Metrics behind the Top 10 Risks.mp4 7.5 MB
- ~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/1. Sensitive Business Flows and Potential Attacks.mp4 6.6 MB
- ~Get Your Files Here !/10. Security Misconfiguration/3. Server Environment Misconfigurations.mp4 6.5 MB
- ~Get Your Files Here !/5. Broken Object Property Level Authorization/3. Demo - Exploiting Object Properties.mp4 6.4 MB
- ~Get Your Files Here !/9. Server-side Request Forgery/1. Understanding Server-side Request Forgery.mp4 6.4 MB
- ~Get Your Files Here !/6. Unrestricted Resource Consumption/1. Unrestricted Resource Consumption Attacks.mp4 6.4 MB
- ~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/3. Business Flow Defenses.mp4 6.1 MB
- ~Get Your Files Here !/11. Improper Inventory Management/1. Understanding Improper Inventory Management.mp4 6.0 MB
- ~Get Your Files Here !/7. Broken Function Level Authorization/3. Defenses.mp4 5.8 MB
- ~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/2. Demo - Attacking an Unrestricted Business Flow.mp4 5.8 MB
- ~Get Your Files Here !/6. Unrestricted Resource Consumption/2. Defenses for Resource Consumption.mp4 5.5 MB
- ~Get Your Files Here !/7. Broken Function Level Authorization/1. Attacking Broken Function Level Authorization.mp4 5.4 MB
- ~Get Your Files Here !/10. Security Misconfiguration/1. Misconfiguration and Patching.mp4 5.3 MB
- ~Get Your Files Here !/9. Server-side Request Forgery/3. SSRF Defenses.mp4 5.2 MB
- ~Get Your Files Here !/3. Broken Object Level Authorization/2. Object Level Attacks.mp4 4.8 MB
- ~Get Your Files Here !/11. Improper Inventory Management/2. Demo - Deprecated Functionality.mp4 4.4 MB
- ~Get Your Files Here !/9. Server-side Request Forgery/2. Demo - Forging Requests from the Server.mp4 4.3 MB
- ~Get Your Files Here !/12. Unsafe Consumption of APIs/1. Understanding Unsafe Consumption of APIs.mp4 4.0 MB
- ~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4 4.0 MB
- ~Get Your Files Here !/5. Broken Object Property Level Authorization/1. Understanding Broken Object Property Level Authorization.mp4 3.9 MB
- ~Get Your Files Here !/5. Broken Object Property Level Authorization/2. Object Property Attacks and Defenses.mp4 3.7 MB
- ~Get Your Files Here !/3. Broken Object Level Authorization/4. Examining Defenses.mp4 3.6 MB
- ~Get Your Files Here !/10. Security Misconfiguration/2. HTTP Request Chain Misconfigurations.mp4 3.4 MB
- ~Get Your Files Here !/3. Broken Object Level Authorization/1. Understanding Broken Object Level Authorization.mp4 3.1 MB
- ~Get Your Files Here !/4. Broken Authentication/1. Understanding Broken Authentication.mp4 3.1 MB
- ~Get Your Files Here !/12. Unsafe Consumption of APIs/2. API Consumption Attacks.mp4 2.6 MB
- ~Get Your Files Here !/10. Security Misconfiguration/4. Misconfiguration in the API and Response Chain.vtt 9.1 KB
- ~Get Your Files Here !/11. Improper Inventory Management/3. Attacks and Defenses.vtt 7.4 KB
- ~Get Your Files Here !/4. Broken Authentication/2. Password Based Attacks and Defenses.vtt 7.1 KB
- ~Get Your Files Here !/12. Unsafe Consumption of APIs/3. API Consumption Defenses.vtt 7.0 KB
- ~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/1. Using the OWASP API Security Top 10.vtt 6.6 KB
- ~Get Your Files Here !/4. Broken Authentication/3. Other Attacks and Defenses.vtt 5.9 KB
- ~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/2. Metrics behind the Top 10 Risks.vtt 5.5 KB
- ~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/3. Business Flow Defenses.vtt 5.0 KB
- ~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/1. Sensitive Business Flows and Potential Attacks.vtt 4.9 KB
- ~Get Your Files Here !/4. Broken Authentication/4. Demo - Common JWT Attacks.vtt 4.8 KB
- ~Get Your Files Here !/9. Server-side Request Forgery/1. Understanding Server-side Request Forgery.vtt 4.7 KB
- ~Get Your Files Here !/6. Unrestricted Resource Consumption/1. Unrestricted Resource Consumption Attacks.vtt 4.5 KB
- ~Get Your Files Here !/11. Improper Inventory Management/1. Understanding Improper Inventory Management.vtt 4.5 KB
- ~Get Your Files Here !/10. Security Misconfiguration/1. Misconfiguration and Patching.vtt 4.3 KB
- ~Get Your Files Here !/7. Broken Function Level Authorization/3. Defenses.vtt 4.3 KB
- ~Get Your Files Here !/7. Broken Function Level Authorization/1. Attacking Broken Function Level Authorization.vtt 4.3 KB
- ~Get Your Files Here !/10. Security Misconfiguration/3. Server Environment Misconfigurations.vtt 4.0 KB
- ~Get Your Files Here !/6. Unrestricted Resource Consumption/2. Defenses for Resource Consumption.vtt 4.0 KB
- ~Get Your Files Here !/9. Server-side Request Forgery/3. SSRF Defenses.vtt 3.9 KB
- ~Get Your Files Here !/3. Broken Object Level Authorization/2. Object Level Attacks.vtt 3.8 KB
- ~Get Your Files Here !/5. Broken Object Property Level Authorization/3. Demo - Exploiting Object Properties.vtt 3.7 KB
- ~Get Your Files Here !/7. Broken Function Level Authorization/2. Demo - Exploiting Broken Function Level Authorization.vtt 3.4 KB
- ~Get Your Files Here !/3. Broken Object Level Authorization/3. Demo - Broken Object Level Attacks.vtt 3.3 KB
- ~Get Your Files Here !/12. Unsafe Consumption of APIs/1. Understanding Unsafe Consumption of APIs.vtt 3.3 KB
- ~Get Your Files Here !/5. Broken Object Property Level Authorization/2. Object Property Attacks and Defenses.vtt 3.2 KB
- ~Get Your Files Here !/9. Server-side Request Forgery/2. Demo - Forging Requests from the Server.vtt 3.2 KB
- ~Get Your Files Here !/5. Broken Object Property Level Authorization/1. Understanding Broken Object Property Level Authorization.vtt 3.0 KB
- ~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/2. Demo - Attacking an Unrestricted Business Flow.vtt 2.9 KB
- ~Get Your Files Here !/11. Improper Inventory Management/2. Demo - Deprecated Functionality.vtt 2.9 KB
- ~Get Your Files Here !/10. Security Misconfiguration/2. HTTP Request Chain Misconfigurations.vtt 2.8 KB
- ~Get Your Files Here !/playlist.m3u 2.6 KB
- ~Get Your Files Here !/3. Broken Object Level Authorization/4. Examining Defenses.vtt 2.5 KB
- ~Get Your Files Here !/4. Broken Authentication/1. Understanding Broken Authentication.vtt 2.4 KB
- ~Get Your Files Here !/12. Unsafe Consumption of APIs/2. API Consumption Attacks.vtt 2.3 KB
- ~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt 2.2 KB
- ~Get Your Files Here !/3. Broken Object Level Authorization/1. Understanding Broken Object Level Authorization.vtt 2.2 KB
- ~Get Your Files Here !/Bonus Resources.txt 386 bytes
- Get Bonus Downloads Here.url 183 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.