https://img100.pixhost.to/images/617/539499712_359020115_tuto.jpg
6.43 GB | 35min 21s | mp4 | 1280X720  | 16:9
Genre:eLearning |Language:English


Files Included :
FileName :1  Communication plan.mp4 | Size:  (51.47 MB)
FileName :4  Introduction to Cybersecurity p 1 - Overview of current cyber threat landscape.mp4 | Size:  (66.24 MB)
FileName :5  Introduction to Cybersecurity p 2 - Case Studies, Threat Analysis Models & More.mp4 | Size:  (177 MB)
FileName :6  Introduction to Cybersecurity p 3 - Security Controls, SDD, SOC.mp4 | Size:  (257.23 MB)
FileName :10  Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).mp4 | Size:  (145.22 MB)
FileName :11  Cryptography Failures (Examples, Password Encryption, Hashing, Salting).mp4 | Size:  (161.44 MB)
FileName :12  Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).mp4 | Size:  (118.21 MB)
FileName :13  Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).mp4 | Size:  (133.76 MB)
FileName :14  Injection (XPath Injection, Log Injection, Input Validation).mp4 | Size:  (95.15 MB)
FileName :15  Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).mp4 | Size:  (108.95 MB)
FileName :16  Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).mp4 | Size:  (138.66 MB)
FileName :17  Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).mp4 | Size:  (106.29 MB)
FileName :18  Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).mp4 | Size:  (204.89 MB)
FileName :19  Vulnerable & Outdated Components.mp4 | Size:  (187.97 MB)
FileName :20  Identification & Authentication Failures.mp4 | Size:  (216.85 MB)
FileName :21  Software & Data Integrity Failures.mp4 | Size:  (111.65 MB)
FileName :22  Security Logging & Monitoring Failures.mp4 | Size:  (142.97 MB)
FileName :23  Server-Side Request Forgery (SSRF).mp4 | Size:  (131.03 MB)
FileName :7  OWASP Top 10 Overview.mp4 | Size:  (126.69 MB)
FileName :8  Broken Access Control.mp4 | Size:  (325.07 MB)
FileName :9  Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).mp4 | Size:  (99.51 MB)
FileName :25  API12023 Broken Object Level Authorization - Part 1.mp4 | Size:  (181.76 MB)
FileName :26  API12023 Broken Object Level Authorization - Part 2 (Practice).mp4 | Size:  (84.27 MB)
FileName :27  API12023 Broken Object Level Authorization - Part 3 (Zero-Trust, UUIDs).mp4 | Size:  (238.14 MB)
FileName :28  API22023 Broken Authentication - Part 1 (Basics, Impact, Types of Attacks).mp4 | Size:  (178.79 MB)
FileName :29  API22023 Broken Authentication - Part 2 (Case Studies, OAuth, OpenID).mp4 | Size:  (206.15 MB)
FileName :30  API22023 Broken Authentication - P 3 - (Practice, JWT Tokens, Timing Attacks).mp4 | Size:  (263.66 MB)
FileName :31  API32023 Broken Object Property Level Authorization - Part 1.mp4 | Size:  (188.9 MB)
FileName :32  API32023 Broken Object Property Level Authorization - Part 2 (Practice).mp4 | Size:  (185.44 MB)
FileName :33  API42023 Unrestricted Resource Consumption - Part 1.mp4 | Size:  (263 MB)
FileName :34  API42023 Unrestricted Resource Consumption - Part 2 (Practice).mp4 | Size:  (99.44 MB)
FileName :35  API52023 Broken Function Level Authorization - Part 1.mp4 | Size:  (177.08 MB)
FileName :36  API52023 Broken Function Level Authorization - Part 2 (Practice).mp4 | Size:  (78.34 MB)
FileName :37  API62023 Unrestricted Access to Sensitive Business Flows - Part 1.mp4 | Size:  (211.5 MB)
FileName :38  API62023 Unrestricted Access to Sensitive Business Flows - Part 2.mp4 | Size:  (247.45 MB)
FileName :39  API62023 Unrestricted Access to Sensitive Business Flows - Part 3 (Practice).mp4 | Size:  (95.77 MB)
FileName :42  API92023 Improper Inventory Management - Part 1.mp4 | Size:  (245.72 MB)
FileName :43  API92023 Improper Inventory Management - Part 2 (Practice).mp4 | Size:  (90.82 MB)
FileName :44  API102023 Unsafe Consumption of APIs - Part 1.mp4 | Size:  (294.83 MB)
FileName :45  API102023 Unsafe Consumption of APIs - Part 2 (Practice).mp4 | Size:  (111.72 MB)
FileName :46  Bonus lesson.mp4 | Size:  (31 MB)]
Screenshot
https://images2.imgbox.com/6f/4e/tNYiOWJL_o.jpg


RapidGator

Код:
https://rapidgator.net/file/1184dd50a064b5dce6a9edfb67c9952e/Cybersecurity.for.Developers.From.Basics.to.Best.Practices.part1.rar
https://rapidgator.net/file/60d66e1e950a62429e647c632c47d704/Cybersecurity.for.Developers.From.Basics.to.Best.Practices.part2.rar
https://rapidgator.net/file/b8ee666528e816d16a38446bbe5c62ec/Cybersecurity.for.Developers.From.Basics.to.Best.Practices.part3.rar

NitroFlare

Код:
https://nitroflare.com/view/25985EE404987C6/Cybersecurity.for.Developers.From.Basics.to.Best.Practices.part1.rar
https://nitroflare.com/view/E7215EEAA99D0EC/Cybersecurity.for.Developers.From.Basics.to.Best.Practices.part2.rar
https://nitroflare.com/view/82DB937DACD736A/Cybersecurity.for.Developers.From.Basics.to.Best.Practices.part3.rar

UploadY

Код:
https://uploady.io/0fix9didg5s9/Cybersecurity.for.Developers.From.Basics.to.Best.Practices.part1.rar
https://uploady.io/kn0uhktyplh9/Cybersecurity.for.Developers.From.Basics.to.Best.Practices.part2.rar
https://uploady.io/ne5nz9g5q5rj/Cybersecurity.for.Developers.From.Basics.to.Best.Practices.part3.rar