[ FreeCourseWeb.com ] PluralSight - API Security with the OWASP API Security Top 10


File Information

File Size:   223.75 MB
Creat Time:   2024-10-16
Active Degree:   16
Last Active:   2024-11-26
Magnet Link:    Magnet LinkMagnet Link
Statement:   This site does not provide download links, only text displays, and does not contain any infringement.

File List

  1. ~Get Your Files Here !/7. Broken Function Level Authorization/2. Demo - Exploiting Broken Function Level Authorization.mp4 11.08 MB
  2. ~Get Your Files Here !/4. Broken Authentication/4. Demo - Common JWT Attacks.mp4 10.97 MB
  3. ~Get Your Files Here !/10. Security Misconfiguration/4. Misconfiguration in the API and Response Chain.mp4 10.96 MB
  4. ~Get Your Files Here !/3. Broken Object Level Authorization/3. Demo - Broken Object Level Attacks.mp4 10.78 MB
  5. ~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/1. Using the OWASP API Security Top 10.mp4 10.62 MB
  6. ~Get Your Files Here !/4. Broken Authentication/2. Password Based Attacks and Defenses.mp4 9.97 MB
  7. ~Get Your Files Here !/11. Improper Inventory Management/3. Attacks and Defenses.mp4 9.39 MB
  8. ~Get Your Files Here !/12. Unsafe Consumption of APIs/3. API Consumption Defenses.mp4 8.79 MB
  9. ~Get Your Files Here !/4. Broken Authentication/3. Other Attacks and Defenses.mp4 8.12 MB
  10. ~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/2. Metrics behind the Top 10 Risks.mp4 7.66 MB
  11. ~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/1. Sensitive Business Flows and Potential Attacks.mp4 6.76 MB
  12. ~Get Your Files Here !/10. Security Misconfiguration/3. Server Environment Misconfigurations.mp4 6.66 MB
  13. ~Get Your Files Here !/5. Broken Object Property Level Authorization/3. Demo - Exploiting Object Properties.mp4 6.59 MB
  14. ~Get Your Files Here !/9. Server-side Request Forgery/1. Understanding Server-side Request Forgery.mp4 6.58 MB
  15. ~Get Your Files Here !/6. Unrestricted Resource Consumption/1. Unrestricted Resource Consumption Attacks.mp4 6.52 MB
  16. ~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/3. Business Flow Defenses.mp4 6.21 MB
  17. ~Get Your Files Here !/11. Improper Inventory Management/1. Understanding Improper Inventory Management.mp4 6.11 MB
  18. ~Get Your Files Here !/7. Broken Function Level Authorization/3. Defenses.mp4 5.96 MB
  19. ~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/2. Demo - Attacking an Unrestricted Business Flow.mp4 5.92 MB
  20. ~Get Your Files Here !/6. Unrestricted Resource Consumption/2. Defenses for Resource Consumption.mp4 5.63 MB
  21. ~Get Your Files Here !/7. Broken Function Level Authorization/1. Attacking Broken Function Level Authorization.mp4 5.49 MB
  22. ~Get Your Files Here !/10. Security Misconfiguration/1. Misconfiguration and Patching.mp4 5.43 MB
  23. ~Get Your Files Here !/9. Server-side Request Forgery/3. SSRF Defenses.mp4 5.35 MB
  24. ~Get Your Files Here !/3. Broken Object Level Authorization/2. Object Level Attacks.mp4 4.88 MB
  25. ~Get Your Files Here !/11. Improper Inventory Management/2. Demo - Deprecated Functionality.mp4 4.52 MB
  26. ~Get Your Files Here !/9. Server-side Request Forgery/2. Demo - Forging Requests from the Server.mp4 4.44 MB
  27. ~Get Your Files Here !/12. Unsafe Consumption of APIs/1. Understanding Unsafe Consumption of APIs.mp4 4.14 MB
  28. ~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4 4.13 MB
  29. ~Get Your Files Here !/5. Broken Object Property Level Authorization/1. Understanding Broken Object Property Level Authorization.mp4 3.97 MB
  30. ~Get Your Files Here !/5. Broken Object Property Level Authorization/2. Object Property Attacks and Defenses.mp4 3.80 MB
  31. ~Get Your Files Here !/3. Broken Object Level Authorization/4. Examining Defenses.mp4 3.66 MB
  32. ~Get Your Files Here !/10. Security Misconfiguration/2. HTTP Request Chain Misconfigurations.mp4 3.48 MB
  33. ~Get Your Files Here !/3. Broken Object Level Authorization/1. Understanding Broken Object Level Authorization.mp4 3.20 MB
  34. ~Get Your Files Here !/4. Broken Authentication/1. Understanding Broken Authentication.mp4 3.18 MB
  35. ~Get Your Files Here !/12. Unsafe Consumption of APIs/2. API Consumption Attacks.mp4 2.65 MB
  36. ~Get Your Files Here !/10. Security Misconfiguration/4. Misconfiguration in the API and Response Chain.vtt 9 KB
  37. ~Get Your Files Here !/11. Improper Inventory Management/3. Attacks and Defenses.vtt 7 KB
  38. ~Get Your Files Here !/4. Broken Authentication/2. Password Based Attacks and Defenses.vtt 7 KB
  39. ~Get Your Files Here !/12. Unsafe Consumption of APIs/3. API Consumption Defenses.vtt 7 KB
  40. ~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/1. Using the OWASP API Security Top 10.vtt 6 KB
  41. ~Get Your Files Here !/4. Broken Authentication/3. Other Attacks and Defenses.vtt 6 KB
  42. ~Get Your Files Here !/2. Understanding the OWASP API Security Top 10/2. Metrics behind the Top 10 Risks.vtt 5 KB
  43. ~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/3. Business Flow Defenses.vtt 5 KB
  44. ~Get Your Files Here !/8. Unrestricted Access to Sensitive Business Flows/1. Sensitive Business Flows and Potential Attacks.vtt 5 KB
  45. ~Get Your Files Here !/4. Broken Authentication/4. Demo - Common JWT Attacks.vtt 4 KB
  46. ~Get Your Files Here !/9. Server-side Request Forgery/1. Understanding Server-side Request Forgery.vtt 4 KB
  47. ~Get Your Files Here !/6. Unrestricted Resource Consumption/1. Unrestricted Resource Consumption Attacks.vtt 4 KB
  48. ~Get Your Files Here !/11. Improper Inventory Management/1. Understanding Improper Inventory Management.vtt 4 KB
  49. ~Get Your Files Here !/10. Security Misconfiguration/1. Misconfiguration and Patching.vtt 4 KB
  50. ~Get Your Files Here !/7. Broken Function Level Authorization/3. Defenses.vtt 4 KB