RAR-files |
lbwx-cfdfbtbp.rar |
350,000,000 |
29EC9A12 |
lbwx-cfdfbtbp.r00 |
350,000,000 |
F84DEE4F |
lbwx-cfdfbtbp.r01 |
350,000,000 |
93DE644C |
lbwx-cfdfbtbp.r02 |
350,000,000 |
03B83502 |
lbwx-cfdfbtbp.r03 |
350,000,000 |
FBC2A059 |
lbwx-cfdfbtbp.r04 |
350,000,000 |
10E9D576 |
lbwx-cfdfbtbp.r05 |
350,000,000 |
1382D672 |
lbwx-cfdfbtbp.r06 |
350,000,000 |
6E4F36EF |
lbwx-cfdfbtbp.r07 |
350,000,000 |
D5E7CD82 |
lbwx-cfdfbtbp.r08 |
350,000,000 |
53BA6E05 |
lbwx-cfdfbtbp.r09 |
350,000,000 |
D19A55A3 |
lbwx-cfdfbtbp.r10 |
350,000,000 |
AB2D2EB3 |
lbwx-cfdfbtbp.r11 |
350,000,000 |
5008047A |
lbwx-cfdfbtbp.r12 |
350,000,000 |
254B2B5D |
lbwx-cfdfbtbp.r13 |
350,000,000 |
56F92E11 |
lbwx-cfdfbtbp.r14 |
350,000,000 |
A5D47133 |
lbwx-cfdfbtbp.r15 |
350,000,000 |
EF39FFE9 |
lbwx-cfdfbtbp.r16 |
350,000,000 |
4E9E7362 |
lbwx-cfdfbtbp.r17 |
350,000,000 |
21D605B8 |
lbwx-cfdfbtbp.r18 |
249,669,972 |
B6C9E1EB |
|
Total size: |
6,899,669,972 |
|
|
Archived
files |
Chapter_2-Cybersecurity_Comprehensive_Security_Practices_for_Developers\4. Introduction to Cybersecurity p.1 - Overview of current cyber threat landscape.mp4
[19c168cc62566bc]
|
69,458,609 |
925904C9 |
Chapter_2-Cybersecurity_Comprehensive_Security_Practices_for_Developers\5. Introduction to Cybersecurity p.2 - Case Studies, Threat Analysis Models & More.mp4
[6bef9d11efbe0d7b]
|
185,596,716 |
B685C311 |
Chapter_2-Cybersecurity_Comprehensive_Security_Practices_for_Developers\6. Introduction to Cybersecurity p.3 - Security Controls, SDD, SOC.mp4
[692939fe65b57521]
|
269,726,121 |
B70DE538 |
Chapter_3-OWASP_Top_10_2021\10. Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).mp4
[b740e5711ab9b98b]
|
152,276,827 |
126DF0CA |
Chapter_3-OWASP_Top_10_2021\11. Cryptography Failures (Examples, Password Encryption, Hashing, Salting).mp4
[ed6308a50d6e5ade]
|
169,280,098 |
2E6F3F95 |
Chapter_3-OWASP_Top_10_2021\12. Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).mp4
[c6f10786aa3419cf]
|
123,949,743 |
6757AD1F |
Chapter_3-OWASP_Top_10_2021\13. Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).mp4
[80a23e1683a0e1f0]
|
140,256,141 |
E4F047ED |
Chapter_3-OWASP_Top_10_2021\14. Injection (XPath Injection, Log Injection, Input Validation).mp4
[7f1e9a6ba5c6d03]
|
99,773,848 |
E5A3AA83 |
Chapter_3-OWASP_Top_10_2021\15. Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).mp4
[1d66f81893830294]
|
114,247,419 |
22B5D4AB |
Chapter_3-OWASP_Top_10_2021\16. Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).mp4
[f4b239d125db3201]
|
145,394,560 |
9A4325E0 |
Chapter_3-OWASP_Top_10_2021\17. Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).mp4
[6eef4f82b8c5d545]
|
111,456,604 |
E700C2BC |
Chapter_3-OWASP_Top_10_2021\18. Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).mp4
[b93e92c4ca634082]
|
214,839,398 |
32022476 |
Chapter_3-OWASP_Top_10_2021\19. Vulnerable & Outdated Components.mp4
[b395a195519de274]
|
197,100,833 |
6E5ADFA8 |
Chapter_3-OWASP_Top_10_2021\20. Identification & Authentication Failures.mp4
[969da9b788fd5ad1]
|
227,380,843 |
8A8E3B0D |
Chapter_3-OWASP_Top_10_2021\21. Software & Data Integrity Failures.mp4
[9022f4f8943adcd]
|
117,075,425 |
9EFC03A8 |
Chapter_3-OWASP_Top_10_2021\22. Security Logging & Monitoring Failures.mp4
[868484dedc765a96]
|
149,911,703 |
A283B0EC |
Chapter_3-OWASP_Top_10_2021\23. Server-Side Request Forgery (SSRF).mp4
[4a3b36d0d925545d]
|
137,396,090 |
9D4096FA |
Chapter_3-OWASP_Top_10_2021\7. OWASP Top 10 Overview.mp4
[90f5501108650c44]
|
132,840,751 |
2CF0FAA8 |
Chapter_3-OWASP_Top_10_2021\8. Broken Access Control.mp4
[8a89750c44220948]
|
340,855,697 |
3810B3FF |
Chapter_3-OWASP_Top_10_2021\9. Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).mp4
[83c44dfd1bc2fa73]
|
104,346,831 |
C5D32AD3 |
Chapter_4-OWASP_API_Top_10_2023\25. API12023 Broken Object Level Authorization - Part 1.mp4
[754618272c12b6a7]
|
190,590,888 |
465FE2F2 |
Chapter_4-OWASP_API_Top_10_2023\26. API12023 Broken Object Level Authorization - Part 2 (Practice).mp4
[5af84ee5e2508011]
|
88,361,964 |
33FDD1C0 |
Chapter_4-OWASP_API_Top_10_2023\27. API12023 Broken Object Level Authorization - Part 3 (Zero-Trust, UUIDs).mp4
[63d95fd9e2d14864]
|
249,709,770 |
66C27F74 |
Chapter_4-OWASP_API_Top_10_2023\28. API22023 Broken Authentication - Part 1 (Basics, Impact, Types of Attacks).mp4
[55614b5e6b634252]
|
187,476,943 |
E764CA9F |
Chapter_4-OWASP_API_Top_10_2023\29. API22023 Broken Authentication - Part 2 (Case Studies, OAuth, OpenID).mp4
[246be691c1a8c787]
|
216,167,164 |
61EE5065 |
Chapter_4-OWASP_API_Top_10_2023\30. API22023 Broken Authentication - P.3 - (Practice, JWT Tokens, Timing Attacks).mp4
[8d92f73d3820db90]
|
276,464,037 |
9C43BF62 |
Chapter_4-OWASP_API_Top_10_2023\31. API32023 Broken Object Property Level Authorization - Part 1.mp4
[1775600191ca5869]
|
198,073,029 |
C4AB6F97 |
Chapter_4-OWASP_API_Top_10_2023\32. API32023 Broken Object Property Level Authorization - Part 2 (Practice).mp4
[f6cc904eab0e2b9]
|
194,445,537 |
65511FE2 |
Chapter_4-OWASP_API_Top_10_2023\33. API42023 Unrestricted Resource Consumption - Part 1.mp4
[ede342eabfe1305b]
|
275,776,305 |
6E68A182 |
Chapter_4-OWASP_API_Top_10_2023\34. API42023 Unrestricted Resource Consumption - Part 2 (Practice).mp4
[8b85cd74977a30bf]
|
104,274,375 |
879E8066 |
Chapter_4-OWASP_API_Top_10_2023\35. API52023 Broken Function Level Authorization - Part 1.mp4
[2d682d755bf08186]
|
185,679,711 |
A38F50CE |
Chapter_4-OWASP_API_Top_10_2023\36. API52023 Broken Function Level Authorization - Part 2 (Practice).mp4
[5f0c282e27ee1fc7]
|
82,141,356 |
73B611B8 |
Chapter_4-OWASP_API_Top_10_2023\37. API62023 Unrestricted Access to Sensitive Business Flows - Part 1.mp4
[a388f8028719b416]
|
221,776,349 |
A6FDDE0F |
Chapter_4-OWASP_API_Top_10_2023\38. API62023 Unrestricted Access to Sensitive Business Flows - Part 2.mp4
[4b924ce34b5c35eb]
|
259,473,819 |
F80D638A |
Chapter_4-OWASP_API_Top_10_2023\39. API62023 Unrestricted Access to Sensitive Business Flows - Part 3 (Practice).mp4
[648a25395551121f]
|
100,421,541 |
EAAD1DB5 |
Chapter_4-OWASP_API_Top_10_2023\42. API92023 Improper Inventory Management - Part 1.mp4
[cbd2b03f25f5ab43]
|
257,652,210 |
79DE6D2C |
Chapter_4-OWASP_API_Top_10_2023\43. API92023 Improper Inventory Management - Part 2 (Practice).mp4
[fe2037db8a5f80a5]
|
95,229,900 |
8AB3CD8D |
Chapter_4-OWASP_API_Top_10_2023\44. API102023 Unsafe Consumption of APIs - Part 1.mp4
[c5ae51a86f1c66f2]
|
309,150,959 |
45F4E64B |
Chapter_4-OWASP_API_Top_10_2023\45. API102023 Unsafe Consumption of APIs - Part 2 (Practice).mp4
[34601119e8f9b32]
|
117,148,079 |
A0E2DF72 |
Chapter_5-Bonus_Section\46. Bonus lesson.mp4
[5f2e15e269d5eaff]
|
32,507,044 |
C58FF66A |
Chapter_1-Introduction\1. Communication plan.mp4
[75716baa14c03caf]
|
53,975,370 |
88419AEC |
Chapter_2-Cybersecurity_Comprehensive_Security_Practices_for_Developers |
0 |
00000000 |
Chapter_3-OWASP_Top_10_2021 |
0 |
00000000 |
Chapter_4-OWASP_API_Top_10_2023 |
0 |
00000000 |
Chapter_5-Bonus_Section |
0 |
00000000 |
Chapter_1-Introduction |
0 |
00000000 |
|
Total size: |
6,899,660,607 |
|
|