API Security with the OWASP API Security Top 10
大小
242.8 MB
文件数
71
Info Hash:
015B42820B8F182641C6FB4C5C353EA9A76A4868
收录时间
2026-02-13 19:50:20
更新时间
2026-02-13 19:50:20
文件列表 (71)
01. Course Overview/01. Course Overview.mp4
4.03 MB
01. Course Overview/01. Course Overview.srt
2.33 KB
02. Understanding the OWASP API Security Top 10/01. Using the OWASP API Security Top 10.mp4
10.37 MB
02. Understanding the OWASP API Security Top 10/01. Using the OWASP API Security Top 10.srt
7.51 KB
02. Understanding the OWASP API Security Top 10/02. Metrics behind the Top 10 Risks.mp4
7.48 MB
02. Understanding the OWASP API Security Top 10/02. Metrics behind the Top 10 Risks.srt
6.26 KB
03. Broken Object Level Authorization/01. Understanding Broken Object Level Authorization.mp4
3.12 MB
03. Broken Object Level Authorization/01. Understanding Broken Object Level Authorization.srt
2.25 KB
03. Broken Object Level Authorization/02. Object Level Attacks.mp4
4.77 MB
03. Broken Object Level Authorization/02. Object Level Attacks.srt
4.02 KB
03. Broken Object Level Authorization/03. Demo- Broken Object Level Attacks.mp4
10.52 MB
03. Broken Object Level Authorization/03. Demo- Broken Object Level Attacks.srt
3.65 KB
03. Broken Object Level Authorization/04. Examining Defenses.mp4
3.57 MB
03. Broken Object Level Authorization/04. Examining Defenses.srt
2.66 KB
04. Broken Authentication/01. Understanding Broken Authentication.mp4
3.1 MB
04. Broken Authentication/01. Understanding Broken Authentication.srt
2.53 KB
04. Broken Authentication/02. Password Based Attacks and Defenses.mp4
9.73 MB
04. Broken Authentication/02. Password Based Attacks and Defenses.srt
7.65 KB
04. Broken Authentication/03. Other Attacks and Defenses.mp4
7.93 MB
04. Broken Authentication/03. Other Attacks and Defenses.srt
6.39 KB
04. Broken Authentication/04. Demo- Common JWT Attacks.mp4
10.71 MB
04. Broken Authentication/04. Demo- Common JWT Attacks.srt
5.05 KB
05. Broken Object Property Level Authorization/01. Understanding Broken Object Property Level Authorization.mp4
3.88 MB
05. Broken Object Property Level Authorization/01. Understanding Broken Object Property Level Authorization.srt
3.08 KB
05. Broken Object Property Level Authorization/02. Object Property Attacks and Defenses.mp4
3.71 MB
05. Broken Object Property Level Authorization/02. Object Property Attacks and Defenses.srt
3.46 KB
05. Broken Object Property Level Authorization/03. Demo- Exploiting Object Properties.mp4
6.43 MB
05. Broken Object Property Level Authorization/03. Demo- Exploiting Object Properties.srt
3.91 KB
06. Unrestricted Resource Consumption/01. Unrestricted Resource Consumption Attacks.mp4
6.37 MB
06. Unrestricted Resource Consumption/01. Unrestricted Resource Consumption Attacks.srt
4.78 KB
06. Unrestricted Resource Consumption/02. Defenses for Resource Consumption.mp4
5.5 MB
06. Unrestricted Resource Consumption/02. Defenses for Resource Consumption.srt
4.37 KB
07. Broken Function Level Authorization/01. Attacking Broken Function Level Authorization.mp4
5.36 MB
07. Broken Function Level Authorization/01. Attacking Broken Function Level Authorization.srt
4.59 KB
07. Broken Function Level Authorization/02. Demo- Exploiting Broken Function Level Authorization.mp4
10.82 MB
07. Broken Function Level Authorization/02. Demo- Exploiting Broken Function Level Authorization.srt
3.55 KB
07. Broken Function Level Authorization/03. Defenses.mp4
5.82 MB
07. Broken Function Level Authorization/03. Defenses.srt
4.46 KB
08. Unrestricted Access to Sensitive Business Flows/01. Sensitive Business Flows and Potential Attacks.mp4
6.61 MB
08. Unrestricted Access to Sensitive Business Flows/01. Sensitive Business Flows and Potential Attacks.srt
5.29 KB
08. Unrestricted Access to Sensitive Business Flows/02. Demo- Attacking an Unrestricted Business Flow.mp4
5.78 MB
08. Unrestricted Access to Sensitive Business Flows/02. Demo- Attacking an Unrestricted Business Flow.srt
3.08 KB
08. Unrestricted Access to Sensitive Business Flows/03. Business Flow Defenses.mp4
6.06 MB
08. Unrestricted Access to Sensitive Business Flows/03. Business Flow Defenses.srt
5.42 KB
09. Server-side Request Forgery/01. Understanding Server-side Request Forgery.mp4
6.43 MB
09. Server-side Request Forgery/01. Understanding Server-side Request Forgery.srt
5.12 KB
09. Server-side Request Forgery/02. Demo- Forging Requests from the Server.mp4
4.34 MB
09. Server-side Request Forgery/02. Demo- Forging Requests from the Server.srt
3.32 KB
09. Server-side Request Forgery/03. SSRF Defenses.mp4
5.22 MB
09. Server-side Request Forgery/03. SSRF Defenses.srt
4.2 KB
10. Security Misconfiguration/01. Misconfiguration and Patching.mp4
5.3 MB
10. Security Misconfiguration/01. Misconfiguration and Patching.srt
4.67 KB
10. Security Misconfiguration/02. HTTP Request Chain Misconfigurations.mp4
3.4 MB
10. Security Misconfiguration/02. HTTP Request Chain Misconfigurations.srt
3.08 KB
10. Security Misconfiguration/03. Server Environment Misconfigurations.mp4
6.5 MB
10. Security Misconfiguration/03. Server Environment Misconfigurations.srt
4.37 KB
10. Security Misconfiguration/04. Misconfiguration in the API and Response Chain.mp4
10.7 MB
10. Security Misconfiguration/04. Misconfiguration in the API and Response Chain.srt
9.61 KB
11. Improper Inventory Management/01. Understanding Improper Inventory Management.mp4
5.97 MB
11. Improper Inventory Management/01. Understanding Improper Inventory Management.srt
4.61 KB
11. Improper Inventory Management/02. Demo- Deprecated Functionality.mp4
4.41 MB
11. Improper Inventory Management/02. Demo- Deprecated Functionality.srt
2.86 KB
11. Improper Inventory Management/03. Attacks and Defenses.mp4
9.17 MB
11. Improper Inventory Management/03. Attacks and Defenses.srt
7.73 KB
12. Unsafe Consumption of APIs/01. Understanding Unsafe Consumption of APIs.mp4
4.04 MB
12. Unsafe Consumption of APIs/01. Understanding Unsafe Consumption of APIs.srt
3.52 KB
12. Unsafe Consumption of APIs/02. API Consumption Attacks.mp4
2.59 MB
12. Unsafe Consumption of APIs/02. API Consumption Attacks.srt
2.38 KB
12. Unsafe Consumption of APIs/03. API Consumption Defenses.mp4
8.59 MB
12. Unsafe Consumption of APIs/03. API Consumption Defenses.srt
7.36 KB
owasp-api-security-top-10.zip
24.28 MB