Details for this torrent 

Udemy - Pentesting and Securing Web Applications Ethical Hacking
Type:
Other > Other
Files:
84
Size:
4.58 GiB (4915470872 Bytes)
Uploaded:
2020-12-02 17:06:10 GMT
By:
tuts756
Seeders:
0
Leechers:
0
Comments
0  

Info Hash:
6942EE8EF65157F76BDBD5CB32EF3A65023A433D




(Problems with magnets links are fixed by upgrading your torrent client!)
Description

Computer security is one of the biggest job gaps in history, with a shortage of 3.5 million skilled workers needing to tackle a problem estimated to be worth $6 trillion. This is one of the biggest opportunities in history.

When I was at university I did a lot of security courses and to be honest I was pretty frustrated at how they were taught. The concepts and their importance captured my imagination but I knew it could be taught in a better way… so I created a few YouTube videos on the topic. They were very well received… So well received that after a few years working in industry I decided to make this course.

This course covers all the topics of several of my courses at university. It’s not long, it’s light hearted, and doesn’t feel dense… but all the content is there.
Who this course is for:

    University students studying computer science or a related field
    Tinkerers wanting to ensure their apps are secure
    Employees wanting to improve the cyber security of their firm
    Developers interested in learning security

Requirements

    Ability to write programs
    Basic knowledge of a programming language
    (Not required) Preferably have written a mobile or web app before

Last Updated 11/2020

[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/3. Security Mindset/1. Security Mindset.mp4412.71 MiB
TutsNode.com.txt63 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/1. Be Ethical. Never Hack..mp411.1 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/1. Be Ethical. Never Hack..srt781 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/2. Never Hack.html168 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/3. Injection Intro.mp4190.2 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/3. Injection Intro.srt14.22 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/4. SQL Injection.mp4251.6 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/4. SQL Injection.srt19.96 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/5. XML Injection.mp4114.27 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/5. XML Injection.srt8.56 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/6. Library Bloat.mp453.35 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/6. Library Bloat.srt3.64 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/7. Cross Site Scripting (XSS).mp4115.01 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/7. Cross Site Scripting (XSS).srt9.09 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/8. Injection Defense.mp4129.41 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/8. Injection Defense.srt9.96 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/9. Do I need to worry about injection here.html168 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/1. Injection/10. Pentesting using injection.html172 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/1. Common Terms.mp4145.45 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/1. Common Terms.srt10.84 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/2. Phishing.mp466.82 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/2. Phishing.srt5.41 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/3. Ethics & Legality.mp4130.62 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/3. Ethics & Legality.srt10.02 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/4. Basics.mp480.65 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/4. Basics.srt6.15 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/5. Attack Surface.mp4152.67 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/5. Attack Surface.srt10.77 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/6. 0 days.mp475.34 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/6. 0 days.srt6.09 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/7. Brute Force.mp4206.14 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/7. Brute Force.srt15.37 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/8. Misconceptions.mp495.77 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/8. Misconceptions.srt7.76 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/2. Core Knowledge/9. Core Knowledge Quiz.html168 B
[TGx]Downloaded from torrentgalaxy.to .txt585 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/3. Security Mindset/1. Security Mindset.srt28.81 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/4. Client Side and Server Side/1. Client and Server Side.mp4152.98 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/4. Client Side and Server Side/1. Client and Server Side.srt10.84 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/4. Client Side and Server Side/2. Client and Server Side Quiz.html168 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/5. Authentication and Access Control/1. Authentication and Access Control.mp4142.23 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/5. Authentication and Access Control/1. Authentication and Access Control.srt11.88 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/5. Authentication and Access Control/2. Authentication and Access Control Quiz.html168 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/1. What is a Cryptographic Hash.mp442.1 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/1. What is a Cryptographic Hash.srt3.06 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/2. How is Hashing Useful.mp493.49 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/2. How is Hashing Useful.srt6.38 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/3. Hash Attacks.mp4183.6 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/3. Hash Attacks.srt11.24 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/4. Cryptographic Hash Defense.mp467.54 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/4. Cryptographic Hash Defense.srt5.39 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/5. Encryption.mp4160.17 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/5. Encryption.srt12.06 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/6. Cryptography/6. Cryptography Quiz.html168 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/7. Cross Site Request Forgery/1. Cross Site Request Forgery.mp4150.44 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/7. Cross Site Request Forgery/1. Cross Site Request Forgery.srt11.14 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/7. Cross Site Request Forgery/2. CSRF Quiz.html168 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/8. Deployment/1. DDoS - Distributed Denial of Service.mp4180.81 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/8. Deployment/1. DDoS - Distributed Denial of Service.srt13.25 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/8. Deployment/2. Configuration.mp4198.32 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/8. Deployment/2. Configuration.srt14.99 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/8. Deployment/3. Passwords.mp4124.07 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/8. Deployment/3. Passwords.srt10.5 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/8. Deployment/4. Deployment Quiz.html168 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/9. External Packages/1. External Packages.mp4219 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/9. External Packages/1. External Packages.srt17.07 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/9. External Packages/2. Implement or Import.mp491.09 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/9. External Packages/2. Implement or Import.srt7.61 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/9. External Packages/3. External Packages Quiz.html168 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/10. Monitoring and Response/1. Shocking Figures.mp463.01 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/10. Monitoring and Response/1. Shocking Figures.srt5.76 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/10. Monitoring and Response/2. Identifying an Attack.mp4107.23 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/10. Monitoring and Response/2. Identifying an Attack.srt9.28 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/10. Monitoring and Response/3. Honeypots.mp428.37 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/10. Monitoring and Response/3. Honeypots.srt2.72 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/10. Monitoring and Response/4. Breach Response and Defense.mp4117.65 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/10. Monitoring and Response/4. Breach Response and Defense.srt9.9 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/10. Monitoring and Response/5. Monitoring and Response Quiz.html168 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/10. Monitoring and Response/6. Create a Breach Response Plan.html172 B
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/11. Conclusion/1. OWASP Top 10.mp4326.19 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/11. Conclusion/1. OWASP Top 10.srt25.58 KiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/11. Conclusion/2. Conclusion.mp48.03 MiB
[TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking)/11. Conclusion/2. Conclusion.srt685 B