Filename | Size |
| ~Get Your Files Here !/01 - Introduction/01 - OWASP Top 10.mp4 | 8.2 MB |
| ~Get Your Files Here !/01 - Introduction/01 - OWASP Top 10.srt | 2.8 KB |
| ~Get Your Files Here !/02 - 1. Broken Access Control/01 - What is broken access control.mp4 | 6.3 MB |
| ~Get Your Files Here !/02 - 1. Broken Access Control/01 - What is broken access control.srt | 3.8 KB |
| ~Get Your Files Here !/02 - 1. Broken Access Control/02 - Example 1 2021 Facebook broken access control vulnerability.mp4 | 6.2 MB |
| ~Get Your Files Here !/02 - 1. Broken Access Control/02 - Example 1 2021 Facebook broken access control vulnerability.srt | 4.1 KB |
| ~Get Your Files Here !/02 - 1. Broken Access Control/03 - Example 2 2021 personal data travel breach.mp4 | 3 MB |
| ~Get Your Files Here !/02 - 1. Broken Access Control/03 - Example 2 2021 personal data travel breach.srt | 2 KB |
| ~Get Your Files Here !/02 - 1. Broken Access Control/04 - Prevention techniques Least privilege.mp4 | 8.1 MB |
| ~Get Your Files Here !/02 - 1. Broken Access Control/04 - Prevention techniques Least privilege.srt | 4.8 KB |
| ~Get Your Files Here !/02 - 1. Broken Access Control/05 - Prevention techniques Record ownership and logging.mp4 | 6.2 MB |
| ~Get Your Files Here !/02 - 1. Broken Access Control/05 - Prevention techniques Record ownership and logging.srt | 4.4 KB |
| ~Get Your Files Here !/02 - 1. Broken Access Control/06 - Prevention techniques Functional access control testing.mp4 | 7.9 MB |
| ~Get Your Files Here !/02 - 1. Broken Access Control/06 - Prevention techniques Functional access control testing.srt | 4.2 KB |
| ~Get Your Files Here !/03 - 2. Cryptographic Failure/01 - What is cryptographic failure.mp4 | 4.1 MB |
| ~Get Your Files Here !/03 - 2. Cryptographic Failure/01 - What is cryptographic failure.srt | 2.7 KB |
| ~Get Your Files Here !/03 - 2. Cryptographic Failure/02 - Example 1 2021 GoDaddy plaintext passwords.mp4 | 4.7 MB |
| ~Get Your Files Here !/03 - 2. Cryptographic Failure/02 - Example 1 2021 GoDaddy plaintext passwords.srt | 3 KB |
| ~Get Your Files Here !/03 - 2. Cryptographic Failure/03 - Example 2 Using a broken or risky cryptographic algorithm.mp4 | 6.7 MB |
| ~Get Your Files Here !/03 - 2. Cryptographic Failure/03 - Example 2 Using a broken or risky cryptographic algorithm.srt | 3.5 KB |
| ~Get Your Files Here !/03 - 2. Cryptographic Failure/04 - Prevention techniques Data classification.mp4 | 8.8 MB |
| ~Get Your Files Here !/03 - 2. Cryptographic Failure/04 - Prevention techniques Data classification.srt | 6.1 KB |
| ~Get Your Files Here !/03 - 2. Cryptographic Failure/05 - Prevention techniques Proper key management.mp4 | 6.2 MB |
| ~Get Your Files Here !/03 - 2. Cryptographic Failure/05 - Prevention techniques Proper key management.srt | 4.1 KB |
| ~Get Your Files Here !/03 - 2. Cryptographic Failure/06 - Prevention techniques Secure protocols.mp4 | 7.9 MB |
| ~Get Your Files Here !/03 - 2. Cryptographic Failure/06 - Prevention techniques Secure protocols.srt | 4.3 KB |
| ~Get Your Files Here !/04 - Conclusion/01 - OWASP Top 10 keep learning.mp4 | 4.7 MB |
| ~Get Your Files Here !/04 - Conclusion/01 - OWASP Top 10 keep learning.srt | 1.3 KB |
| ~Get Your Files Here !/Bonus Resources.txt | 386 B |