Oreilly - Secure Operations and Protections, 2nd Edition

seeders: 5 leechers: 3 updated: 1 year ago
Added 1 year ago by freecoursewb in Other
Downloaded 5 times.
1337x.to
Oreilly - Secure Operations and Protections, 2nd Edition

Torrent Contents Size: 1.3 GB

Oreilly - Secure Operations and Protections, 2nd Edition
▼ show more 77 files
001. Learning objectives.en.srt
SRT
614.4 B
001. Learning objectives.mp4
MP4
2.5 MB
001. Secure Operations and Protections Introduction.en.srt
SRT
1.1 KB
001. Secure Operations and Protections Introduction.mp4
MP4
3.3 MB
001. Secure Operations and Protections Summary.en.srt
SRT
409.6 B
001. Secure Operations and Protections Summary.mp4
MP4
1.3 MB
002. 1.1 Log ingestion Part 1.en.srt
SRT
48.8 KB
002. 1.1 Log ingestion Part 1.mp4
MP4
101.1 MB
002. 2.1 Standardize processes.en.srt
SRT
12.7 KB
002. 2.1 Standardize processes.mp4
MP4
32.8 MB
002. 3.1 Cross-site scripting.en.srt
SRT
4.1 KB
002. 3.1 Cross-site scripting.mp4
MP4
11.8 MB
002. 4.1 Compensating controls.en.srt
SRT
2.9 KB
002. 4.1 Compensating controls.mp4
MP4
7.2 MB
003. 1.2 Log ingestion Part 2.en.srt
SRT
54.8 KB
003. 1.2 Log ingestion Part 2.mp4
MP4
112.4 MB
003. 2.2 Streamline operations.en.srt
SRT
6.9 KB
003. 2.2 Streamline operations.mp4
MP4
18.3 MB
003. 3.2 Overflow vulnerabilities.en.srt
SRT
5.8 KB
003. 3.2 Overflow vulnerabilities.mp4
MP4
17.1 MB
003. 4.2 Control types.en.srt
SRT
10.7 KB
003. 4.2 Control types.mp4
MP4
23 MB
004. 1.3 Operating system (OS) concepts.en.srt
SRT
22.1 KB
004. 1.3 Operating system (OS) concepts.mp4
MP4
49.6 MB
004. 2.3 Technology and tool integration.en.srt
SRT
22.4 KB
004. 2.3 Technology and tool integration.mp4
MP4
83.1 MB
004. 3.3 Data poisoning.en.srt
SRT
6.3 KB
004. 3.3 Data poisoning.mp4
MP4
16.1 MB
004. 4.3 Patching and configuration management.en.srt
SRT
7.4 KB
004. 4.3 Patching and configuration management.mp4
MP4
14.8 MB
005. 1.4 Infrastructure concepts.en.srt
SRT
23.3 KB
005. 1.4 Infrastructure concepts.mp4
MP4
85.1 MB
005. 3.4 Broken access control.en.srt
SRT
6.4 KB
005. 3.4 Broken access control.mp4
MP4
16.4 MB
005. 4.4 Maintenance windows.en.srt
SRT
7.2 KB
005. 4.4 Maintenance windows.mp4
MP4
19.7 MB
006. 1.5 Network architecture.en.srt
SRT
22.9 KB
006. 1.5 Network architecture.mp4
MP4
47.8 MB
006. 3.5 Cryptographic failures.en.srt
SRT
7.9 KB
006. 3.5 Cryptographic failures.mp4
MP4
22.7 MB
006. 4.5 Exceptions.en.srt
SRT
7.4 KB
006. 4.5 Exceptions.mp4
MP4
14.6 MB
007. 1.6 Identity and access management.en.srt
SRT
42 KB
007. 1.6 Identity and access management.mp4
MP4
114.7 MB
007. 3.6 Injection flaws.en.srt
SRT
6 KB
007. 3.6 Injection flaws.mp4
MP4
16.7 MB
007. 4.6 Risk management principles.en.srt
SRT
13.1 KB
007. 4.6 Risk management principles.mp4
MP4
31.6 MB
008. 1.7 Encryption.en.srt
SRT
33.8 KB
008. 1.7 Encryption.mp4
MP4
72.5 MB
008. 3.7 Cross-site request forgery.en.srt
SRT
6.1 KB
008. 3.7 Cross-site request forgery.mp4
MP4
17.3 MB
008. 4.7 Policies, governance, and service-level objectives (SLOs).en.srt
SRT
3.6 KB
008. 4.7 Policies, governance, and service-level objectives (SLOs).mp4
MP4
8.9 MB
009. 1.8 Sensitive data protection.en.srt
SRT
8.7 KB
009. 1.8 Sensitive data protection.mp4
MP4
21 MB
009. 3.8 Directory traversal.en.srt
SRT
7.5 KB
009. 3.8 Directory traversal.mp4
MP4
19.4 MB
009. 4.8 Prioritization and escalation.en.srt
SRT
4.5 KB
009. 4.8 Prioritization and escalation.mp4
MP4
10.6 MB
010. 3.9 Insecure design.en.srt
SRT
4.8 KB
010. 3.9 Insecure design.mp4
MP4
14.8 MB
010. 4.9 Attack surface management.en.srt
SRT
6.6 KB
010. 4.9 Attack surface management.mp4
MP4
23.4 MB
011. 3.10 Security misconfiguration.en.srt
SRT
2.4 KB
011. 3.10 Security misconfiguration.mp4
MP4
6.3 MB
011. 4.10 Secure coding best practices.en.srt
SRT
16.3 KB
011. 4.10 Secure coding best practices.mp4
MP4
37.4 MB
012. 3.11 End-of-life or outdated components.en.srt
SRT
5.4 KB
012. 3.11 End-of-life or outdated components.mp4
MP4
13.7 MB
012. 4.11 Secure software development life cycle (SDLC).en.srt
SRT
15.1 KB
012. 4.11 Secure software development life cycle (SDLC).mp4
MP4
31.7 MB
013. 3.12 Identification and authentication failures.en.srt
SRT
9.4 KB
013. 3.12 Identification and authentication failures.mp4
MP4
26.1 MB
013. 4.12 Threat modeling.en.srt
SRT
17.4 KB
013. 4.12 Threat modeling.mp4
MP4
41.6 MB
014. 3.13 Server-side request forgery.en.srt
SRT
3.6 KB
014. 3.13 Server-side request forgery.mp4
MP4
11.7 MB
015. 3.14 Remote code execution.en.srt
SRT
6.8 KB
015. 3.14 Remote code execution.mp4
MP4
19.4 MB
016. 3.15 Privilege escalation.en.srt
SRT
9.5 KB
016. 3.15 Privilege escalation.mp4
MP4
25.1 MB
017. 3.16 Local file inclusion (LFI)remote file inclusion (RFI).en.srt
SRT
4.1 KB
017. 3.16 Local file inclusion (LFI)remote file inclusion (RFI).mp4
MP4
11.4 MB
Bonus Resources.txt
TXT
409.6 B
Get Bonus Downloads Here.url
URL
204.8 B

Description

Related Torrents

Location

Trackers

Tracker name
udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
udp://tracker.opentrackr.org:1337/announce
http://tracker.openbittorrent.com:80/announce
udp://opentracker.i2p.rocks:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://coppersurfer.tk:6969/announce
udp://tracker.zer0day.to:1337/announce
Torrent hash: