Udemy - OWASP Mobile Top 10 - Vulnerabilities to Avoid
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size1.3 GB
- Uploaded Byfreecoursewb
- Downloads46
- Last checkedNov. 17th '23
- Date uploadedNov. 16th '23
- Seeders 9
- Leechers18
Infohash : 1C3D97C4870334BFEF9A8F5502E037B179828540
OWASP Mobile Top 10 - Vulnerabilities to Avoid
https://DevCourseWeb.com
Published 11/2023
Created by Pack Of Coders - POC
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 50 Lectures ( 2h 17m ) | Size: 1.3 GB
Skills Necessary to Understand the Most Critical Mobile Application Security Risks
What you'll learn
Mobile OWASP Top 10 2023 Coverage
Details on Each Vulnerability and Strategies for Prevention
Learn to Threat Mode Each of the Mobile Applications Vulnerabilities
Identify Best Practices for Secure Mobile Application Design and Coding
Learn to Integrate Security into the Mobile Development Life Cycle
Concepts to Support Building Secure iOS and Android Applications
Find Out How to Apply Best Practices to Detect Vulnerabilities
Requirements
All Levels
Files:
[ DevCourseWeb.com ] Udemy - OWASP Mobile Top 10 - Vulnerabilities to Avoid- Get Bonus Downloads Here.url (0.2 KB) ~Get Your Files Here ! 1. Introduction
- 1. Introduction.mp4 (10.2 MB)
- 2. Course Content and Structure.mp4 (17.3 MB)
- 3. Lesson Quiz and Resources.mp4 (3.3 MB)
- 4. Ethics.mp4 (1.9 MB)
- 5. OWASP Mobile Top 10 - Overview.mp4 (29.4 MB)
- 1. OWASP Mobile #8 Insufficient Cryptography.mp4 (7.1 MB)
- 1.1 Course Notes - Insufficient Cryptography.pdf (52.7 KB)
- 2. Describing the Vulnerability.mp4 (29.0 MB)
- 3. Threat Modeling.mp4 (21.1 MB)
- 4. Detection and Prevention.mp4 (40.5 MB)
- 5. Quiz - Insufficient Cryptography.html (0.1 KB)
- 1. OWASP Mobile #9 Insecure Data Storage.mp4 (10.3 MB)
- 1.1 Course Notes - Insecure Data Storage.pdf (60.8 KB)
- 2. Describing the Vulnerability.mp4 (26.2 MB)
- 3. Threat Modeling.mp4 (21.0 MB)
- 4. Detection and Prevention.mp4 (53.6 MB)
- 5. Quiz - Insecure Data Storage.html (0.1 KB)
- 1. OWASP Mobile #10 Insufficient Binary Protections.mp4 (10.8 MB)
- 1.1 Course Notes - Insufficient Binary Protections.pdf (52.3 KB)
- 2. Describing the Vulnerability.mp4 (26.1 MB)
- 3. Threat Modeling.mp4 (32.9 MB)
- 4. Detection and Prevention.mp4 (38.4 MB)
- 5. Quiz - Insufficient Binary Protections.html (0.1 KB)
- 1. Conclusion.mp4 (17.2 MB)
- 1. Secure Software Development.mp4 (16.1 MB)
- 2. Addressing Risk.mp4 (72.2 MB)
- 3. Developing Threat Models.mp4 (18.1 MB)
- 4. Encryption 101.mp4 (49.3 MB)
- 1. OWASP Mobile #1 Insecure Authentication Authorization.mp4 (6.0 MB)
- 1.1 Course Notes - Insecure Authentication Authorization.pdf (73.5 KB)
- 2. Describing the Vulnerability.mp4 (27.8 MB)
- 3. Threat Modeling.mp4 (26.6 MB)
- 4. Detection and Prevention.mp4 (53.8 MB)
- 5. Quiz - Insecure Authentication Authorization.html (0.1 KB)
- 1. OWASP Mobile #2 Insecure Communication.mp4 (7.3 MB)
- 1.1 Course Notes - Insecure Communication.pdf (58.5 KB)
- 2. Describing the Vulnerability.mp4 (42.3 MB)
- 3. Threat Modeling.mp4 (20.7 MB)
- 4. Detection and Prevention.mp4 (32.4 MB)
- 5. Quiz - Insecure Communication.html (0.1 KB)
- 1. OWASP Mobile #3 Inadequate Supply Chain Security.mp4 (8.8 MB)
- 1.1 Course Notes - Inadequate Supply Chain Security.pdf (59.0 KB)
- 2. Describing the Vulnerability.mp4 (30.0 MB)
- 3. Threat Modeling.mp4 (15.6 MB)
- 4. Detection and Prevention.mp4 (31.9 MB)
- 5. Quiz - Inadequate Supply Chain Security.html (0.1 KB)
- 1. OWASP Mobile #4 Inadequate Privacy Controls.mp4 (8.3 MB)
- 1.1 Course Notes - Inadequate Privacy Controls.pdf (64.9 KB)
- 2. Describing the Vulnerability.mp4 (39.9 MB)
- 3. Threat Modeling.mp4 (36.1 MB)
- 4. Detection and Prevention.mp4 (42.5 MB)
- 5. Quiz - Inadequate Privacy Controls.html (0.1 KB)
- 1. OWASP Mobile #5 Improper Credential Use.mp4 (8.3 MB)
- 1.1 Course Notes - Improper Credential Usage.pdf (65.8 KB)
- 2. Describing the Vulnerability.mp4 (37.1 MB)
- 3. Threat Modeling.mp4 (17.9 MB)
- 4. Detection and Prevention.mp4 (34.8 MB)
- 5. Quiz - Improper Credential Use.html (0.1 KB)
- 1. OWASP Mobile #6 Insufficient Input Output Validation.mp4 (9.6 MB)
- 1.1 Course Notes - Insufficient IO Validation.pdf (55.2 KB)
- 2. Describing the Vulnerability.mp4 (34.6 MB)
- 3. Threat Modeling.mp4 (29.9 MB)
- 4. Detection and Prevention.mp4 (42.1 MB)
- 5. Quiz - Insufficient Input Output Validation.html (0.1 KB)
- 1. OWASP Mobile #7 Security Misconfiguration.mp4 (9.8 MB)
- 1.1 Course Notes - Security Misconfiguration.pdf (60.1 KB)
- 2. Describing the Vulnerability.mp4 (39.6 MB)
- 3. Threat Modeling.mp4 (17.1 MB)
- 4. Detection and Prevention.mp4 (42.8 MB)
- 5. Quiz - Security Misconfiguration.html (0.1 KB)
- Bonus Resources.txt (0.4 KB)
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- http://tracker.foreverpirates.co:80/announce
- udp://tracker.cyberia.is:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://9.rarbg.to:2780/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://open.stealth.si:80/announce
- udp://9.rarbg.to:2900/announce
- udp://9.rarbg.me:2720/announce
- udp://opentor.org:2710/announce