https://img87.pixhost.to/images/599/359020115_tuto.jpg
6.88 GB | 00:35:21 | mp4 | 1920X1080  | 16:9
Genre:eLearning |Language:English


Files Included :
1 - Communication plan  (75.42 MB)
10 - Injection XPath Injection Log Injection Input Validation  (103.77 MB)
11 - Insecure Design Overivew CWEs Shift Left Security Threat Modeling Manifesto  (136.6 MB)
12 - Insecure Design Secure Design Process Security Controls Metrics Examples  (149.96 MB)
13 - Security Misconfiguration Overview CWEs Types Reallife attacks  (127.66 MB)
14 - Security Misconfiguration Hardening Zero Trust Defense in Depth Practice  (258.83 MB)
15 - Vulnerable Outdated Components  (240.67 MB)
16 - Identification Authentication Failures  (257.88 MB)
17 - Software Data Integrity Failures  (137.08 MB)
18 - Security Logging Monitoring Failures  (167.51 MB)
19 - ServerSide Request Forgery SSRF  (163.03 MB)
3 - OWASP Top 10 Overview  (145.75 MB)
4 - Broken Access Control  (459.26 MB)
5 - Cryptography Failures Theory Sensitive Data Data Breach Types of Failures  (115.89 MB)
6 - Cryptography Failures Practical Examples SQL Injections TLSSSL HTTPS  (153 MB)
7 - Cryptography Failures Examples Password Encryption Hashing Salting  (208 MB)
8 - Injection Overview Fuzzing CWEs Impact Injection Types Command Injection  (147.87 MB)
9 - Injection Cross Site Scripting Types of XSS SQL JPA NoSQL Injections  (145.8 MB)
21 - API12023 Broken Object Level Authorization Part 1  (202.77 MB)
22 - API12023 Broken Object Level Authorization Part 2 Practice  (93.73 MB)
23 - API12023 Broken Object Level Authorization Part 3 ZeroTrust UUIDs  (260.57 MB)
24 - API22023 Broken Authentication Part 1 Basics Impact Types of Attacks  (202.63 MB)
25 - API22023 Broken Authentication Part 2 Case Studies OAuth OpenID  (252.09 MB)
26 - API22023 Broken Authentication P3 Practice JWT Tokens Timing Attacks  (355.21 MB)
27 - API32023 Broken Object Property Level Authorization Part 1  (208.41 MB)
28 - API32023 Broken Object Property Level Authorization Part 2 Practice  (221.01 MB)
29 - API42023 Unrestricted Resource Consumption Part 1  (297.77 MB)
30 - API42023 Unrestricted Resource Consumption Part 2 Practice  (121.91 MB)
31 - API52023 Broken Function Level Authorization Part 1  (91.1 MB)
32 - API52023 Broken Function Level Authorization Part 2 Practice  (101.63 MB)
33 - API62023 Unrestricted Access to Sensitive Business Flows Part 1  (99.42 MB)
34 - API62023 Unrestricted Access to Sensitive Business Flows Part 2  (266.6 MB)
35 - API62023 Unrestricted Access to Sensitive Business Flows Part 3 Practice  (118.42 MB)
38 - API92023 Improper Inventory Management Part 1  (300.19 MB)
39 - API92023 Improper Inventory Management Part 2 Practice  (128.38 MB)
40 - API102023 Unsafe Consumption of APIs Part 1  (330.43 MB)
41 - API102023 Unsafe Consumption of APIs Part 2 Practice  (147.87 MB)
42 - Bonus lesson  (47.62 MB)
[align=center]
Screenshot
https://images2.imgbox.com/b1/f6/oDGI2qPP_o.jpg

[/align]

Код:
https://ddownload.com/l4pmvoq8cmuu/Udemy_Cybersecurity_for_Developers_From_Basics_to_Best_Practices.part1.rar
https://ddownload.com/b9n76qlrie28/Udemy_Cybersecurity_for_Developers_From_Basics_to_Best_Practices.part2.rar
https://ddownload.com/1e2gd0fkfrzk/Udemy_Cybersecurity_for_Developers_From_Basics_to_Best_Practices.part3.rar
https://ddownload.com/6zgql3pbqd37/Udemy_Cybersecurity_for_Developers_From_Basics_to_Best_Practices.part4.rar
Код:
https://rapidgator.net/file/d98e9df42503b8c795eb6630de4345d7/Udemy_Cybersecurity_for_Developers_From_Basics_to_Best_Practices.part1.rar
https://rapidgator.net/file/fe4d484fecc8c8f826fcf99aeb723436/Udemy_Cybersecurity_for_Developers_From_Basics_to_Best_Practices.part2.rar
https://rapidgator.net/file/d46c411e8b73fa26c815813908837081/Udemy_Cybersecurity_for_Developers_From_Basics_to_Best_Practices.part3.rar
https://rapidgator.net/file/5b8aec02459f2ddf3025b5b8a7202bb5/Udemy_Cybersecurity_for_Developers_From_Basics_to_Best_Practices.part4.rar
Код:
https://turbobit.net/s0cnp7kzmw2b/Udemy_Cybersecurity_for_Developers_From_Basics_to_Best_Practices.part1.rar.html
https://turbobit.net/v9pp6o9zjmb2/Udemy_Cybersecurity_for_Developers_From_Basics_to_Best_Practices.part2.rar.html
https://turbobit.net/2ntojj7bpedh/Udemy_Cybersecurity_for_Developers_From_Basics_to_Best_Practices.part3.rar.html
https://turbobit.net/2q8y4us3nqpa/Udemy_Cybersecurity_for_Developers_From_Basics_to_Best_Practices.part4.rar.html