Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
01 - The importance of security.mp4 |
20.40MB |
02 - What is security.mp4 |
17.18MB |
03 - Why security matters.mp4 |
12.29MB |
04 - What is a hacker.mp4 |
18.48MB |
05 - Threat models.mp4 |
19.93MB |
06 - Total security is unachievable.mp4 |
16.80MB |
07 - Least privilege.mp4 |
22.02MB |
08 - Simple is more secure.mp4 |
17.32MB |
09 - Never trust users.mp4 |
19.75MB |
10 - Expect the unexpected.mp4 |
11.53MB |
11 - Defense in depth.mp4 |
22.03MB |
12 - Security through obscurity.mp4 |
23.32MB |
13 - Deny lists and allow lists.mp4 |
20.38MB |
14 - Map exposure points and data passageways.mp4 |
19.14MB |
15 - Regulate requests.mp4 |
24.53MB |
16 - Validate input.mp4 |
22.16MB |
17 - Sanitize data.mp4 |
37.40MB |
18 - Label variables.mp4 |
6.24MB |
19 - Keep code private.mp4 |
14.74MB |
20 - Keep credentials private.mp4 |
23.81MB |
21 - Keep error messages vague.mp4 |
14.11MB |
22 - Smart logging.mp4 |
18.20MB |
23 - Types of credential attacks.mp4 |
29.38MB |
24 - Strong passwords.mp4 |
28.09MB |
25 - URL manipulation and insecure direct object reference (IDOR).mp4 |
26.29MB |
26 - SQL injection.mp4 |
33.19MB |
27 - Cross-site scripting (XSS).mp4 |
34.34MB |
28 - Cross-site request forgery (CSRF).mp4 |
25.93MB |
29 - Cross-site request protections.mp4 |
22.75MB |
30 - Cookie visibility and theft.mp4 |
27.13MB |
31 - Session hijacking.mp4 |
33.96MB |
32 - Session fixation.mp4 |
17.88MB |
33 - Remote code execution.mp4 |
14.69MB |
34 - File upload abuse.mp4 |
13.70MB |
35 - Denial of service.mp4 |
29.32MB |
36 - Next steps.mp4 |
13.96MB |
AhLaN.txt |
175B |
Seed Me!!.png |
42.05KB |