Theme
light
black
autumn
business
lemonade
halloween
18+
TV
Movies
Movies libraries
Dub/Dual Audio
Anime
Anime libraries
Dub/Dual Audio
Subbed
Raw
Games
PC
Mac
Linux
Android
Softwares
Windows
Mac
Android
Music
MP3
Lossless
Album
Video
Other
Audio
Video
Image
Document
Program
Android
DiskImage
Source Code
Database
Archive
Theme
light
black
autumn
business
lemonade
halloween
Advertise here
Torrents Search Engine
Search Any Type Of Torrents
Search
Torrent Details
Hacking Web Applications Security Penetration Testing for Today's DevOps and Cloud Environments
Category:
Other
Size:
1.89 GB
Seeders:
3
Leechers:
9
Downloads:
59
Uploaded:
May 11, 2023
Torrent
Magnet
Files
Trackers
Info
Hacking Web Applications Security Penetration Testing for Today's DevOps and Cloud Environments
Lesson 6 Exploiting Injection-Based Vulnerabilities
005. 6.4 Exploiting SQL Injection Vulnerabilities.mp4
- 122.47 MB
004. 6.3 Understanding SQL Injection.mp4
- 25.67 MB
003. 6.2 Exploiting Command Injection Vulnerabilities.mp4
- 15.15 MB
002. 6.1 Understanding Command Injection.mp4
- 14.71 MB
007. 6.6 Exploiting XML Injection Vulnerabilities.mp4
- 13.22 MB
008. 6.7 Mitigating Injection Vulnerabilities.mp4
- 12.22 MB
006. 6.5 Understanding XML Injection.mp4
- 8.84 MB
001. Learning objectives.mp4
- 6.39 MB
005. 6.4 Exploiting SQL Injection Vulnerabilities en.srt
- 27.14 KB
004. 6.3 Understanding SQL Injection en.srt
- 6.6 KB
003. 6.2 Exploiting Command Injection Vulnerabilities en.srt
- 3.66 KB
007. 6.6 Exploiting XML Injection Vulnerabilities en.srt
- 3.53 KB
008. 6.7 Mitigating Injection Vulnerabilities en.srt
- 2.92 KB
002. 6.1 Understanding Command Injection en.srt
- 2.17 KB
006. 6.5 Understanding XML Injection en.srt
- 1.03 KB
001. Learning objectives en.srt
- 789 B
Lesson 5 Authentication and Session Management Vulnerabilities
002. 5.1 Understanding Authentication Schemes in Web Applications and Related Vulnerabilities.mp4
- 106.36 MB
003. 5.2 Exploring Session Management Mechanisms and Related Vulnerabilities.mp4
- 69.86 MB
001. Learning objectives.mp4
- 4.98 MB
002. 5.1 Understanding Authentication Schemes in Web Applications and Related Vulnerabilities en.srt
- 26.27 KB
003. 5.2 Exploring Session Management Mechanisms and Related Vulnerabilities en.srt
- 14.45 KB
001. Learning objectives en.srt
- 581 B
Lesson 8 Exploiting Weak Cryptographic Implementations
002. 8.1 Introducing Cryptography, Encryption, and Hashing Protocols.mp4
- 103.51 MB
003. 8.2 Identifying Common Flaws in Data Storage and Transmission.mp4
- 49.96 MB
004. 8.3 Surveying Examples of Crypto-based Attacks and Vulnerabilities.mp4
- 22.24 MB
005. 8.4 Mitigating Flaws in Cryptographic Implementations.mp4
- 14.99 MB
001. Learning objectives.mp4
- 7.27 MB
002. 8.1 Introducing Cryptography, Encryption, and Hashing Protocols en.srt
- 27.38 KB
003. 8.2 Identifying Common Flaws in Data Storage and Transmission en.srt
- 9.07 KB
004. 8.3 Surveying Examples of Crypto-based Attacks and Vulnerabilities en.srt
- 5.29 KB
005. 8.4 Mitigating Flaws in Cryptographic Implementations en.srt
- 3.39 KB
001. Learning objectives en.srt
- 770 B
Lesson 4 Reconnaissance and Profiling Web Applications
009. 4.8 Introducing the Burp Suite.mp4
- 84.33 MB
004. 4.3 Exploring Shodan, Maltego, Recon-NG, SpiderFoot, and TheHarvester.mp4
- 78.5 MB
011. 4.10 Introducing OpenVAS.mp4
- 41.07 MB
010. 4.9 Introducing OWASP Zed Application Proxy (ZAP).mp4
- 34.73 MB
002. 4.1 Understanding Passive vs. Active Reconnaissance.mp4
- 32.08 MB
006. 4.5 Surveying Web Crawlers and Directory Brute Force.mp4
- 24.29 MB
003. 4.2 Using Search Engines and Public Information.mp4
- 23.76 MB
005. 4.4 Exploring CMS and Framework Identification.mp4
- 19.81 MB
008. 4.7 Introducing Nikto.mp4
- 16.92 MB
001. Learning objectives.mp4
- 10.46 MB
007. 4.6 Understanding How Web Application Scanners Work.mp4
- 9.46 MB
009. 4.8 Introducing the Burp Suite en.srt
- 25.89 KB
004. 4.3 Exploring Shodan, Maltego, Recon-NG, SpiderFoot, and TheHarvester en.srt
- 19.84 KB
011. 4.10 Introducing OpenVAS en.srt
- 13.68 KB
003. 4.2 Using Search Engines and Public Information en.srt
- 5.36 KB
006. 4.5 Surveying Web Crawlers and Directory Brute Force en.srt
- 5.02 KB
010. 4.9 Introducing OWASP Zed Application Proxy (ZAP) en.srt
- 4.97 KB
005. 4.4 Exploring CMS and Framework Identification en.srt
- 4.76 KB
002. 4.1 Understanding Passive vs. Active Reconnaissance en.srt
- 4.6 KB
008. 4.7 Introducing Nikto en.srt
- 3.67 KB
007. 4.6 Understanding How Web Application Scanners Work en.srt
- 1.95 KB
001. Learning objectives en.srt
- 1.23 KB
Lesson 3 Build Your Own Web Application Lab
002. 3.1 Exploring Kali Linux.mp4
- 83.14 MB
009. 3.8 Understanding Cyber Ranges and Capture the Flag Events.mp4
- 21.35 MB
008. 3.7 Understanding Web Application Proxies.mp4
- 17.31 MB
007. 3.6 Exploring the Web Security Dojo.mp4
- 17.26 MB
006. 3.5 Surveying Hackazon.mp4
- 15.89 MB
005. 3.4 Surveying WebGoat.mp4
- 10.69 MB
001. Learning objectives.mp4
- 9.37 MB
003. 3.2 Introducing Vulnerable Applications.mp4
- 9.09 MB
004. 3.3 Surveying DVWA.mp4
- 8.77 MB
002. 3.1 Exploring Kali Linux en.srt
- 21.82 KB
008. 3.7 Understanding Web Application Proxies en.srt
- 4.87 KB
007. 3.6 Exploring the Web Security Dojo en.srt
- 4.28 KB
005. 3.4 Surveying WebGoat en.srt
- 4 KB
009. 3.8 Understanding Cyber Ranges and Capture the Flag Events en.srt
- 3.51 KB
006. 3.5 Surveying Hackazon en.srt
- 3.34 KB
004. 3.3 Surveying DVWA en.srt
- 3.18 KB
003. 3.2 Introducing Vulnerable Applications en.srt
- 1.58 KB
001. Learning objectives en.srt
- 1.13 KB
Lesson 11 Additional Web Application Security Vulnerabilities and Attacks
003. 11.2 Exploiting Insecure Direct Object References and Path Traversal.mp4
- 47.69 MB
005. 11.4 Fuzzing Web Applications.mp4
- 47.36 MB
002. 11.1 Understanding the Other Common Security Flaws in Web Applications.mp4
- 25.51 MB
004. 11.3 Surveying Information Disclosure Vulnerabilities.mp4
- 9.81 MB
001. Learning objectives.mp4
- 6.58 MB
005. 11.4 Fuzzing Web Applications en.srt
- 11.44 KB
003. 11.2 Exploiting Insecure Direct Object References and Path Traversal en.srt
- 9.26 KB
002. 11.1 Understanding the Other Common Security Flaws in Web Applications en.srt
- 4.48 KB
004. 11.3 Surveying Information Disclosure Vulnerabilities en.srt
- 1.35 KB
001. Learning objectives en.srt
- 683 B
Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities
009. 7.8 Mitigating XSS and CSRF Vulnerabilities.mp4
- 43.38 MB
008. 7.7 Evading Web Application Security Controls.mp4
- 34.22 MB
005. 7.4 Exploiting DOM-based XSS Vulnerabilities.mp4
- 19.06 MB
004. 7.3 Exploiting Stored XSS Vulnerabilities.mp4
- 14.61 MB
003. 7.2 Exploiting Reflected XSS Vulnerabilities.mp4
- 12.85 MB
007. 7.6 Exploiting CSRF Vulnerabilities.mp4
- 11 MB
001. Learning objectives.mp4
- 8.56 MB
006. 7.5 Understanding Cross-Site Request Forgery (CSRF).mp4
- 8.5 MB
002. 7.1 Introducing XSS.mp4
- 6.92 MB
009. 7.8 Mitigating XSS and CSRF Vulnerabilities en.srt
- 7.53 KB
008. 7.7 Evading Web Application Security Controls en.srt
- 5.1 KB
004. 7.3 Exploiting Stored XSS Vulnerabilities en.srt
- 3.92 KB
005. 7.4 Exploiting DOM-based XSS Vulnerabilities en.srt
- 3.36 KB
003. 7.2 Exploiting Reflected XSS Vulnerabilities en.srt
- 2.78 KB
002. 7.1 Introducing XSS en.srt
- 1.61 KB
006. 7.5 Understanding Cross-Site Request Forgery (CSRF) en.srt
- 1.27 KB
007. 7.6 Exploiting CSRF Vulnerabilities en.srt
- 1.27 KB
001. Learning objectives en.srt
- 1.1 KB
Lesson 2 Overview of Web Applications for Security Professionals
002. 2.1 Understanding the Web Application Protocols.mp4
- 36.37 MB
004. 2.3 Surveying Session Management and Cookies.mp4
- 35.83 MB
008. 2.7 Surveying Docker Containers.mp4
- 30.97 MB
003. 2.2 Exploring the HTTP Request and Response.mp4
- 25.1 MB
006. 2.5 Exploring Cloud Services.mp4
- 21.4 MB
009. 2.8 Introducing Kubernetes.mp4
- 15.63 MB
007. 2.6 Exploring Web Application Frameworks.mp4
- 13.59 MB
005. 2.4 Introducing DevOps.mp4
- 12.83 MB
001. Learning objectives.mp4
- 8.74 MB
002. 2.1 Understanding the Web Application Protocols en.srt
- 16.97 KB
004. 2.3 Surveying Session Management and Cookies en.srt
- 12.22 KB
006. 2.5 Exploring Cloud Services en.srt
- 9.59 KB
008. 2.7 Surveying Docker Containers en.srt
- 9.57 KB
003. 2.2 Exploring the HTTP Request and Response en.srt
- 7.14 KB
007. 2.6 Exploring Web Application Frameworks en.srt
- 6.63 KB
009. 2.8 Introducing Kubernetes en.srt
- 5.09 KB
005. 2.4 Introducing DevOps en.srt
- 4.7 KB
001. Learning objectives en.srt
- 1.12 KB
Lesson 10 Client-side Attacks
003. 10.2 Understanding HTML5 Implementations.mp4
- 36.1 MB
002. 10.1 Surveying the Client-side Code and Storage.mp4
- 27.25 MB
004. 10.3 Understanding AJAX Implementations.mp4
- 15.04 MB
005. 10.4 Mitigating AJAX, HTML5, and Client-side Vulnerabilities.mp4
- 9.29 MB
001. Learning objectives.mp4
- 4.46 MB
003. 10.2 Understanding HTML5 Implementations en.srt
- 9.5 KB
002. 10.1 Surveying the Client-side Code and Storage en.srt
- 5.69 KB
004. 10.3 Understanding AJAX Implementations en.srt
- 2.62 KB
005. 10.4 Mitigating AJAX, HTML5, and Client-side Vulnerabilities en.srt
- 2.14 KB
001. Learning objectives en.srt
- 450 B
Lesson 1 Introduction to Web Application Penetration Testing
006. 1.5 Exploring What Programming Languages You Should Know.mp4
- 26.3 MB
003. 1.2 Surveying Web Application Penetration Testing Methodologies.mp4
- 22.16 MB
005. 1.4 Exploring How Web Applications Have Evolved Over Time.mp4
- 21.14 MB
004. 1.3 Understanding the Need for Web Application Penetration Testing.mp4
- 14.43 MB
002. 1.1 Understanding Ethical Hacking and Penetration Testing.mp4
- 8.93 MB
001. Learning objectives.mp4
- 8.32 MB
005. 1.4 Exploring How Web Applications Have Evolved Over Time en.srt
- 8.59 KB
003. 1.2 Surveying Web Application Penetration Testing Methodologies en.srt
- 7.78 KB
004. 1.3 Understanding the Need for Web Application Penetration Testing en.srt
- 7.11 KB
006. 1.5 Exploring What Programming Languages You Should Know en.srt
- 5.38 KB
002. 1.1 Understanding Ethical Hacking and Penetration Testing en.srt
- 4.79 KB
001. Learning objectives en.srt
- 1007 B
Lesson 9 Attacking Application Programming Interfaces (APIs)
003. 9.2 Exploring the Tools Used to Test the APIs.mp4
- 23.73 MB
002. 9.1 Understanding the APIs.mp4
- 17.61 MB
001. Learning objectives.mp4
- 3.49 MB
003. 9.2 Exploring the Tools Used to Test the APIs en.srt
- 7.29 KB
002. 9.1 Understanding the APIs en.srt
- 3.18 KB
001. Learning objectives en.srt
- 378 B
Introduction
001. Introduction.mp4
- 19.79 MB
001. Introduction en.srt
- 2.6 KB
Summary
001. Summary.mp4
- 12.85 MB
001. Summary en.srt
- 1.65 KB
Trackers
Seeders
Leechers
Downloads
udp://tracker2.dler.com:80/announce
0
0
0
udp://opentracker.i2p.rocks:6969/announce
0
0
0
udp://tracker.moeking.me:6969/announce
0
0
0
udp://tracker.breizh.pm:6969/announce
0
0
0
udp://www.torrent.eu.org:451/announce
0
0
1
udp://tracker.opentrackr.org:1337/announce
1
0
3
udp://9.rarbg.com:2920/announce
0
0
0
udp://open.stealth.si:80/announce
0
0
0
udp://tracker.monitorit4.me:6969/announce
0
0
0
udp://tracker.leech.ie:1337/announce
0
0
0
udp://p4p.arenabg.com:1337/announce
0
0
0
udp://movies.zsw.ca:6969/announce
0
0
0
udp://tracker.blacksparrowmedia.net:6969/announce
0
0
0
udp://exodus.desync.com:6969/announce
0
0
0
udp://explodie.org:6969/announce
0
0
0
udp://tracker.theoks.net:6969/announce
0
0
0
udp://bt2.archive.org:6969/announce
0
0
0
udp://bt1.archive.org:6969/announce
0
0
0
udp://tracker1.bt.moack.co.kr:80/announce
0
0
0
udp://tracker.dler.com:6969/announce
0
0
0
InfoHash:
E1B17E55B32DE04534DCCF2C1BCFAE4CB7123682
Last updated:
May 11, 2023
File count:
150 B
File Category:
1
Tags:
hacking, applications, security, penetration, testing, today, devops, cloud, environments
Related Torrents
[Epic Web, Kent C. Dodds] Ship Modern Full-Stack Web Applications (2023)
Other
Nov 3, 2023
13.37 GB
4
18
114
Torrent
Magnet
[GigaCourse.Com] Udemy - Building Applications with React 17 and ASP.NET Core 6
Other
Mar 12, 2022
9.5 GB
10
18
248
Torrent
Magnet
Make 10 Advanced Professional Applications in JavaScript
Other
Nov 29, 2022
5.23 GB
10
37
340
Torrent
Magnet
Udemy - BIM Applications for Roads Highways and Transportation Design
Other
Jun 27, 2024
3.94 GB
24
22
377
Torrent
Magnet
Linkedin - Wavelet Analysis Applications with Wolfram Language
Other
Jan 30, 2024
121.57 MB
15
27
408
Torrent
Magnet
[FreeCoursesOnline.Me] CodeCourse - Building Reactive Realtime Applications with Livewire
Other
Feb 12, 2024
2.23 GB
19
21
814
Torrent
Magnet
Intro to IT Operating Systems and Applications Training
Other
Jul 12, 2022
3.95 GB
9
30
194
Torrent
Magnet
[ FreeCourseWeb.com ] Udemy - Audio File Types And Their Specific Applications
Ebook/Course
Apr 27, 2024
516.57 MB
12
23
164
Torrent
Magnet
ChatGPT Mastery Build Deploy and Sell ChatGPT Applications
Other
Mar 10, 2023
4.54 GB
7
15
256
Torrent
Magnet
[ FreeCourseWeb.com ] Linkedin - Full-Stack Web Applications with Rust and Leptos
Other
Mar 4, 2024
169.34 MB
9
11
312
Torrent
Magnet
[ TutGee.com ] Udemy - Practical Recommender Systems For Business Applications
Other
Mar 12, 2022
1.9 GB
9
5
700
Torrent
Magnet
[FreeCourseSite.com] Udemy - Building Applications with React 17 and ASP.NET Core 6
Other
May 27, 2022
9.5 GB
4
9
108
Torrent
Magnet
[ FreeCourseWeb.com ] Apple Certified Support Professional macOS 11 - 4 Applications and Processes
Other
Sep 15, 2021
1.91 GB
8
4
71
Torrent
Magnet
Hacking Web Applications Security Penetration Testing for Today's DevOps and Cloud Environments
Other
May 11, 2023
1.89 GB
3
9
59
Torrent
Magnet
[ FreeCourseWeb.com ] USC.EDU - Microsoft 365 Endpoint Administrator Associate (MD-102) Cert Prep - 4 Manage Applications
Other
Aug 18, 2023
136.58 MB
6
6
121
Torrent
Magnet
Understanding Sentiment Analysis and Its Applications
Other
Mar 20, 2024
134.45 MB
1
11
60
Torrent
Magnet
[FreeCoursesOnline.Me] Linkedin - Full-Stack Web Applications with Rust and Leptos
Other
Feb 24, 2024
169.34 MB
3
8
38
Torrent
Magnet
[ CoursePig.com ] Linkedin - Microsoft Cybersecurity Architect Expert (SC-100) Cert Prep - 4 Design Strategy for Data and Applications
Other
Nov 9, 2022
146.44 MB
5
5
162
Torrent
Magnet
Packaging Applications with Helm for Kubernetes
Other
Nov 23, 2023
384.21 MB
4
6
56
Torrent
Magnet
[ DevCourseWeb.com ] Udemy - Embedded Fun with RISC-V, Part 2 - Embedded Applications
Other
Mar 12, 2022
1.89 GB
6
3
230
Torrent
Magnet
Home
Movies
TV Shows
Anime
Videos
Music
Games
Software
18+
Books