File | Size |
---|
1 - Introduction/01 - The importance of security.mp4 | 20.40 MB |
2 - 1. Security Overview/02 - What is security.mp4 | 17.18 MB |
2 - 1. Security Overview/03 - Why security matters.mp4 | 12.29 MB |
2 - 1. Security Overview/04 - What is a hacker.mp4 | 18.48 MB |
2 - 1. Security Overview/05 - Threat models.mp4 | 19.93 MB |
2 - 1. Security Overview/06 - Total security is unachievable.mp4 | 16.80 MB |
3 - 2. General Security Principles/07 - Least privilege.mp4 | 22.02 MB |
3 - 2. General Security Principles/08 - Simple is more secure.mp4 | 17.32 MB |
3 - 2. General Security Principles/09 - Never trust users.mp4 | 19.75 MB |
3 - 2. General Security Principles/10 - Expect the unexpected.mp4 | 11.53 MB |
3 - 2. General Security Principles/11 - Defense in depth.mp4 | 22.03 MB |
3 - 2. General Security Principles/12 - Security through obscurity.mp4 | 23.32 MB |
3 - 2. General Security Principles/13 - Deny lists and allow lists.mp4 | 20.38 MB |
3 - 2. General Security Principles/14 - Map exposure points and data passageways.mp4 | 19.14 MB |
4 - 3. Filter Input, Control Output/15 - Regulate requests.mp4 | 24.53 MB |
4 - 3. Filter Input, Control Output/16 - Validate input.mp4 | 22.16 MB |
4 - 3. Filter Input, Control Output/17 - Sanitize data.mp4 | 37.40 MB |
4 - 3. Filter Input, Control Output/18 - Label variables.mp4 | 6.24 MB |
4 - 3. Filter Input, Control Output/19 - Keep code private.mp4 | 14.74 MB |
4 - 3. Filter Input, Control Output/20 - Keep credentials private.mp4 | 23.81 MB |
4 - 3. Filter Input, Control Output/21 - Keep error messages vague.mp4 | 14.11 MB |
4 - 3. Filter Input, Control Output/22 - Smart logging.mp4 | 18.20 MB |
5 - 4. The Most Common Attacks/23 - Types of credential attacks.mp4 | 29.38 MB |
5 - 4. The Most Common Attacks/24 - Strong passwords.mp4 | 28.09 MB |
5 - 4. The Most Common Attacks/25 - URL manipulation and insecure direct object reference (IDOR).mp4 | 26.29 MB |
5 - 4. The Most Common Attacks/26 - SQL injection.mp4 | 33.19 MB |
5 - 4. The Most Common Attacks/27 - Cross-site scripting (XSS).mp4 | 34.34 MB |
5 - 4. The Most Common Attacks/28 - Cross-site request forgery (CSRF).mp4 | 25.93 MB |
5 - 4. The Most Common Attacks/29 - Cross-site request protections.mp4 | 22.75 MB |
5 - 4. The Most Common Attacks/30 - Cookie visibility and theft.mp4 | 27.13 MB |
5 - 4. The Most Common Attacks/31 - Session hijacking.mp4 | 33.96 MB |
5 - 4. The Most Common Attacks/32 - Session fixation.mp4 | 17.88 MB |
5 - 4. The Most Common Attacks/33 - Remote code execution.mp4 | 14.69 MB |
5 - 4. The Most Common Attacks/34 - File upload abuse.mp4 | 13.70 MB |
5 - 4. The Most Common Attacks/35 - Denial of service.mp4 | 29.32 MB |
6 - Conclusion/36 - Next steps.mp4 | 13.96 MB |
AhLaN.txt | 175.00 B |
Seed Me!!.png | 42.05 kB |