download скачать Free download скачать : Udemy Cyber Security Python and Web Applications
mp4 | Video: h264,2560X1440 | Audio: AAC, 44.1 KHz
Genre:eLearning | Language: English | Size:5.67 GB
Files Included :
01 Course Introduction.mp4 (233.32 MB)
MP4
02 Course Work Overview.mp4 (9.44 MB)
MP4
03 Sample Tool 1 - Log Analyzer.mp4 (398.43 MB)
MP4
04 Sample Tool 2 - Password Checker.mp4 (165.07 MB)
MP4
05 Development Environment Overview.mp4 (20.74 MB)
MP4
01 Cyber Security Introduction to Section 2.mp4 (78.12 MB)
MP4
02 What is Cyber Security.mp4 (30.59 MB)
MP4
03 Explaining the Methodology.mp4 (28.64 MB)
MP4
04 repl it Introduction.mp4 (67.27 MB)
MP4
05 Penetration Testing - Overview.mp4 (19.79 MB)
MP4
06 Penetration Testing - Remediation.mp4 (29.32 MB)
MP4
07 Penetration Testing - Code Example.mp4 (53.63 MB)
MP4
08 Port Scanning - Overview.mp4 (16.52 MB)
MP4
09 Port Scanning - Code Examples.mp4 (25.71 MB)
MP4
10 Port Scanning - Remediation.mp4 (11.74 MB)
MP4
11 Botnets - Overview.mp4 (30.33 MB)
MP4
12 Botnets - Code Example.mp4 (48.27 MB)
MP4
13 Botnets - Code Example Continued.mp4 (63.12 MB)
MP4
14 Botnets - Remediation.mp4 (53.93 MB)
MP4
15 Code Exploits - Overview.mp4 (15.61 MB)
MP4
16 Code Exploits - Code Example.mp4 (43.29 MB)
MP4
17 Code Exploits - Remediation.mp4 (13.36 MB)
MP4
18 Forensic Investigations - Overview.mp4 (19.6 MB)
MP4
19 Forensic Investigations - Code Example.mp4 (72.68 MB)
MP4
20 Forensic Investigations - Remediation.mp4 (18.5 MB)
MP4
21 Network Traffic Analysis - Overview.mp4 (19.09 MB)
MP4
22 Network Traffic Analysis - Code Example.mp4 (24.1 MB)
MP4
23 Network Traffic Analysis - Remediation.mp4 (12.39 MB)
MP4
24 Wireless - Overview.mp4 (18.89 MB)
MP4
25 Wireless - Code Example.mp4 (14.46 MB)
MP4
26 Wireless - Remediation.mp4 (34.22 MB)
MP4
27 Web Reconnaissance - Overview.mp4 (21.21 MB)
MP4
28 Web Reconnaissance - Code Example.mp4 (90.38 MB)
MP4
29 Web Reconnaissance - Remediation.mp4 (22.75 MB)
MP4
30 Antivirus Evasion - Overview.mp4 (23.01 MB)
MP4
31 Antivirus Evasion - Code Example.mp4 (66.98 MB)
MP4
32 Antivirus Evasion - Remediation.mp4 (13.2 MB)
MP4
33 Social Engineering - Overview.mp4 (21.45 MB)
MP4
34 Social Engineering - Code Example.mp4 (42.21 MB)
MP4
35 Social Engineering - Remediation.mp4 (8.32 MB)
MP4
01 Intro to Section 3 Building your own security tool.mp4 (115.49 MB)
MP4
02 Tool Development with Python - Overview.mp4 (16.68 MB)
MP4
03 Introduction to Pip.mp4 (27.15 MB)
MP4
04 Basic Python Script.mp4 (16.74 MB)
MP4
05 Command Line Arguments.mp4 (12.81 MB)
MP4
06 Argument Parsing.mp4 (78.2 MB)
MP4
07 Validating Input.mp4 (29.69 MB)
MP4
08 Sending Requests to the Web.mp4 (19.02 MB)
MP4
09 Parsing Results.mp4 (52.31 MB)
MP4
10 Checking Forms.mp4 (40.99 MB)
MP4
11 Generating the Report.mp4 (20.83 MB)
MP4
12 Checking Comments.mp4 (78.18 MB)
MP4
13 Checking Inputs.mp4 (45.11 MB)
MP4
14 Improving the Report.mp4 (31.21 MB)
MP4
15 Using Config Settings.mp4 (91.02 MB)
MP4
16 Configuration from File.mp4 (44.39 MB)
MP4
17 Merging the Configs.mp4 (24.69 MB)
MP4
18 Outputting the Report.mp4 (89.06 MB)
MP4
19 Pushing to GitHub.mp4 (45.66 MB)
MP4
20 Testing the Python Tool.mp4 (21 MB)
MP4
21 Writing the Documentation.mp4 (113.44 MB)
MP4
22 Distributing Your Tool.mp4 (213.35 MB)
MP4
01 Section 4 Introduction.mp4 (99.33 MB)
MP4
02 Web Application Security Introduction.mp4 (22.64 MB)
MP4
03 OWASP Overview.mp4 (111.22 MB)
MP4
04 Introduction to the OWASP Top 10 List.mp4 (12.22 MB)
MP4
05 Rails Overview.mp4 (57.01 MB)
MP4
06 PHP Overview.mp4 (83.93 MB)
MP4
07 Command Injection - Overview.mp4 (17.6 MB)
MP4
08 Command Injection - Rails Example.mp4 (51.21 MB)
MP4
09 Command Injection - PHP Example.mp4 (30.23 MB)
MP4
10 SQL Injection - Overview.mp4 (30.01 MB)
MP4
11 SQL Injection - Rails Example.mp4 (40.42 MB)
MP4
12 SQL Injection - PHP Example.mp4 (27.62 MB)
MP4
13 SQL Injection - PHP Example - Remediation.mp4 (40.82 MB)
MP4
14 Password Complexity - Overview.mp4 (21.95 MB)
MP4
15 Password Complexity - Rails Example.mp4 (69.97 MB)
MP4
16 Password Complexity - PHP Example.mp4 (76.35 MB)
MP4
17 Information Leakage - Overview.mp4 (20.41 MB)
MP4
18 Information Leakage - Rails Example.mp4 (20.56 MB)
MP4
19 Information Leakage - PHP Example.mp4 (87.41 MB)
MP4
20 Sensitive Data Exposure - Overview.mp4 (17.35 MB)
MP4
21 Sensitive Data Exposure - Rails Example.mp4 (46.1 MB)
MP4
22 Sensitive Data Exposure - PHP Example.mp4 (34.47 MB)
MP4
23 XML External Entities (XXE) - Overview.mp4 (18.27 MB)
MP4
24 XML External Entities (XXE) - Rails Example.mp4 (45.16 MB)
MP4
25 XML External Entities (XXE) - PHP Example.mp4 (41.75 MB)
MP4
26 Broken Access Control - Overview.mp4 (20.78 MB)
MP4
27 Broken Access Control - Rails Example.mp4 (140.66 MB)
MP4
28 Broken Access Control - PHP Example.mp4 (30.3 MB)
MP4
29 Security Misconfiguration - Overview.mp4 (20.75 MB)
MP4
30 Security Misconfiguration - Rails Example.mp4 (48.74 MB)
MP4
31 Security Misconfiguration - PHP Example.mp4 (31.72 MB)
MP4
32 Cross-Site Scripting (XSS) - Overview.mp4 (5.37 MB)
MP4
33 Cross-Site Scripting (XSS) - Rails Example.mp4 (47.38 MB)
MP4
34 Cross-Site Scripting (XSS) - PHP Example.mp4 (53.62 MB)
MP4
35 Insecure Deserialization - Overview.mp4 (15.09 MB)
MP4
36 Insecure Deserialization - Rails Example.mp4 (34.56 MB)
MP4
37 Insecure Deserialization - PHP Example.mp4 (81.74 MB)
MP4
38 Using Components with Known Vulnerabilities - Overview.mp4 (21.73 MB)
MP4
39 Using Components with Known Vulnerabilities - Rails Example.mp4 (133.73 MB)
MP4
40 Using Components with Known Vulnerabilities - PHP Example.mp4 (38.78 MB)
MP4
41 Insufficient Logging and Monitoring - Overview.mp4 (17.83 MB)
MP4
42 Insufficient Logging and Monitoring - PHP Example.mp4 (175.02 MB)
MP4
43 Insufficient Logging and Monitoring - Rails Example.mp4 (78.27 MB)
MP4
44 Web Security Analysis Tool.mp4 (116.95 MB)
MP4
01 Multi-Factor Authentication.mp4 (58.82 MB)
MP4
02 Ethical Hacking.mp4 (13.5 MB)
MP4
03 Password Complexity.mp4 (37.23 MB)
MP4
04 Physical Security.mp4 (28.53 MB)
MP4
05 Data Breaches.mp4 (39.44 MB)
MP4
06 Cloud Security.mp4 (48.47 MB)
MP4
Thank you.mp4 (117.37 MB)
MP4
https://rapidgator.net/file/0e49c9035e0310c0d1ef21c2007c915e/Udemy_Cyber_Security_Python_and_Web_Applications.z01 https://rapidgator.net/file/8d9ae46afb70b5a138f0c3a4b8ec1424/Udemy_Cyber_Security_Python_and_Web_Applications.z02 https://rapidgator.net/file/1e7588a7129d84e5a7ef516fcdf75fb0/Udemy_Cyber_Security_Python_and_Web_Applications.z03 https://rapidgator.net/file/e45ec02635601328d6a5e5cc4c72562e/Udemy_Cyber_Security_Python_and_Web_Applications.z04 https://rapidgator.net/file/c86730a86388daec73988c007fe3b4ad/Udemy_Cyber_Security_Python_and_Web_Applications.z05 https://rapidgator.net/file/94cfef9b406113e0f61981b200b145f5/Udemy_Cyber_Security_Python_and_Web_Applications.zip
https://nitroflare.com/view/02E60726FDE9554/Udemy_Cyber_Security_Python_and_Web_Applications.z01 https://nitroflare.com/view/1D688D9727F61B2/Udemy_Cyber_Security_Python_and_Web_Applications.z02 https://nitroflare.com/view/7FD2079A406CF99/Udemy_Cyber_Security_Python_and_Web_Applications.z03 https://nitroflare.com/view/DD8BC02DF8D7090/Udemy_Cyber_Security_Python_and_Web_Applications.z04 https://nitroflare.com/view/81F6E6F9E84D6FF/Udemy_Cyber_Security_Python_and_Web_Applications.z05 https://nitroflare.com/view/C72439437107DDD/Udemy_Cyber_Security_Python_and_Web_Applications.zip
https://ddownload.com/y1l76brn29eo/Udemy_Cyber_Security_Python_and_Web_Applications.z01 https://ddownload.com/cn863lhdtlqt/Udemy_Cyber_Security_Python_and_Web_Applications.z02 https://ddownload.com/qnz9il4m336d/Udemy_Cyber_Security_Python_and_Web_Applications.z03 https://ddownload.com/lvi76j78690b/Udemy_Cyber_Security_Python_and_Web_Applications.z04 https://ddownload.com/qyfo4nmrf8zh/Udemy_Cyber_Security_Python_and_Web_Applications.z05 https://ddownload.com/3i5uwvzbft4c/Udemy_Cyber_Security_Python_and_Web_Applications.zip