| Please note that this page does not hosts or makes available any of the listed filenames. You
                        cannot download any of those files from here. | 
                    
                        | [TGx]Downloaded from torrentgalaxy.to .txt | 585B | 
                    
                        | 0 | 185.07KB | 
                    
                        | 1 | 176.22KB | 
                    
                        | 1. Areas of Misconfiguration.mp4 | 3.33MB | 
                    
                        | 1. Areas of Misconfiguration.vtt | 3.28KB | 
                    
                        | 1. Authentication Components.mp4 | 3.96MB | 
                    
                        | 1. Authentication Components.vtt | 3.82KB | 
                    
                        | 1. Course Overview.mp4 | 3.16MB | 
                    
                        | 1. Course Overview.vtt | 2.17KB | 
                    
                        | 1. Data Sensitivity.mp4 | 2.19MB | 
                    
                        | 1. Data Sensitivity.vtt | 2.56KB | 
                    
                        | 1. Secure Coding and the OWASP Top 10.mp4 | 3.11MB | 
                    
                        | 1. Secure Coding and the OWASP Top 10.vtt | 3.19KB | 
                    
                        | 1. Understanding Authorization.mp4 | 3.12MB | 
                    
                        | 1. Understanding Authorization.vtt | 3.11KB | 
                    
                        | 1. Understanding Cross-Site Scripting.mp4 | 3.06MB | 
                    
                        | 1. Understanding Cross-Site Scripting.vtt | 3.17KB | 
                    
                        | 1. Understanding Deserialization.mp4 | 2.91MB | 
                    
                        | 1. Understanding Deserialization.vtt | 2.87KB | 
                    
                        | 1. Understanding Injection Flaws.mp4 | 2.63MB | 
                    
                        | 1. Understanding Injection Flaws.vtt | 2.53KB | 
                    
                        | 1. Understanding Known Vulnerabilities.mp4 | 8.77MB | 
                    
                        | 1. Understanding Known Vulnerabilities.vtt | 5.31KB | 
                    
                        | 1. Understanding Logging and Monitoring.mp4 | 7.80MB | 
                    
                        | 1. Understanding Logging and Monitoring.vtt | 8.42KB | 
                    
                        | 1. XXE Attacks.mp4 | 6.67MB | 
                    
                        | 1. XXE Attacks.vtt | 6.33KB | 
                    
                        | 10 | 58.39KB | 
                    
                        | 11 | 76.30KB | 
                    
                        | 12 | 233.86KB | 
                    
                        | 13 | 146.90KB | 
                    
                        | 14 | 130.59KB | 
                    
                        | 15 | 204.42KB | 
                    
                        | 16 | 41.04KB | 
                    
                        | 17 | 84.08KB | 
                    
                        | 18 | 162.44KB | 
                    
                        | 19 | 46.68KB | 
                    
                        | 2 | 23.98KB | 
                    
                        | 2. Access Control with Role-based Access.mp4 | 5.95MB | 
                    
                        | 2. Access Control with Role-based Access.vtt | 6.56KB | 
                    
                        | 2. Areas of Data Exposure.mp4 | 9.19MB | 
                    
                        | 2. Areas of Data Exposure.vtt | 8.40KB | 
                    
                        | 2. Attacking and Defending SQL Injection.mp4 | 5.62MB | 
                    
                        | 2. Attacking and Defending SQL Injection.vtt | 5.77KB | 
                    
                        | 2. Common Misconfigurations.mp4 | 4.65MB | 
                    
                        | 2. Common Misconfigurations.vtt | 4.15KB | 
                    
                        | 2. Demo - Detecting Known Vulnerabilities.mp4 | 8.36MB | 
                    
                        | 2. Demo - Detecting Known Vulnerabilities.vtt | 6.02KB | 
                    
                        | 2. Demo - Logging Authentication Actions.mp4 | 11.36MB | 
                    
                        | 2. Demo - Logging Authentication Actions.vtt | 6.10KB | 
                    
                        | 2. Demo - XXE Attack and Defense.mp4 | 7.46MB | 
                    
                        | 2. Demo - XXE Attack and Defense.vtt | 4.29KB | 
                    
                        | 2. Handling Passwords.mp4 | 3.56MB | 
                    
                        | 2. Handling Passwords.vtt | 3.75KB | 
                    
                        | 2. Secure Coding Guidelines.mp4 | 8.12MB | 
                    
                        | 2. Secure Coding Guidelines.vtt | 8.99KB | 
                    
                        | 2. Types of Deserialization Vulnerability.mp4 | 5.70MB | 
                    
                        | 2. Types of Deserialization Vulnerability.vtt | 5.55KB | 
                    
                        | 2. Types of XSS.mp4 | 4.68MB | 
                    
                        | 2. Types of XSS.vtt | 4.92KB | 
                    
                        | 20 | 47.54KB | 
                    
                        | 21 | 137.61KB | 
                    
                        | 22 | 235.11KB | 
                    
                        | 23 | 68.25KB | 
                    
                        | 24 | 106.73KB | 
                    
                        | 25 | 36.77KB | 
                    
                        | 26 | 190.21KB | 
                    
                        | 27 | 203.94KB | 
                    
                        | 28 | 178.56KB | 
                    
                        | 29 | 21.81KB | 
                    
                        | 3 | 209.29KB | 
                    
                        | 3. Attacking and Defending Operating System Command Injection.mp4 | 3.55MB | 
                    
                        | 3. Attacking and Defending Operating System Command Injection.vtt | 3.42KB | 
                    
                        | 3. Demo - Correcting Deserialization Issues.mp4 | 11.80MB | 
                    
                        | 3. Demo - Correcting Deserialization Issues.vtt | 7.15KB | 
                    
                        | 3. Demo - Fixing Common Misconfigurations.mp4 | 20.08MB | 
                    
                        | 3. Demo - Fixing Common Misconfigurations.vtt | 8.81KB | 
                    
                        | 3. Demo - Implementing Role-based Access.mp4 | 11.71MB | 
                    
                        | 3. Demo - Implementing Role-based Access.vtt | 7.10KB | 
                    
                        | 3. Demo - Logging Authorization Actions.mp4 | 6.34MB | 
                    
                        | 3. Demo - Logging Authorization Actions.vtt | 4.33KB | 
                    
                        | 3. Demo - Protecting Sensitive Data.mp4 | 11.55MB | 
                    
                        | 3. Demo - Protecting Sensitive Data.vtt | 7.11KB | 
                    
                        | 3. Password Guessing.mp4 | 2.05MB | 
                    
                        | 3. Password Guessing.vtt | 2.05KB | 
                    
                        | 3. XSS Defenses.mp4 | 4.77MB | 
                    
                        | 3. XSS Defenses.vtt | 4.31KB | 
                    
                        | 30 | 94.71KB | 
                    
                        | 31 | 129.91KB | 
                    
                        | 32 | 143.02KB | 
                    
                        | 33 | 195.85KB | 
                    
                        | 34 | 90.47KB | 
                    
                        | 35 | 120.79KB | 
                    
                        | 36 | 172.39KB | 
                    
                        | 37 | 64.26KB | 
                    
                        | 4 | 203.03KB | 
                    
                        | 4. Demo - Defending Against Injection Attacks in Python.mp4 | 8.93MB | 
                    
                        | 4. Demo - Defending Against Injection Attacks in Python.vtt | 7.34KB | 
                    
                        | 4. Demo - Password Guessing Defense.mp4 | 10.33MB | 
                    
                        | 4. Demo - Password Guessing Defense.vtt | 6.44KB | 
                    
                        | 4. Demo - XSS Defenses.mp4 | 11.62MB | 
                    
                        | 4. Demo - XSS Defenses.vtt | 7.84KB | 
                    
                        | 5 | 37.50KB | 
                    
                        | 5. Credential Stuffing.mp4 | 3.23MB | 
                    
                        | 5. Credential Stuffing.vtt | 3.19KB | 
                    
                        | 6 | 131.60KB | 
                    
                        | 6. Demo - Credential Stuffing.mp4 | 12.30MB | 
                    
                        | 6. Demo - Credential Stuffing.vtt | 5.71KB | 
                    
                        | 7 | 206.24KB | 
                    
                        | 7. Demo - Time-based One-time Passwords.mp4 | 16.98MB | 
                    
                        | 7. Demo - Time-based One-time Passwords.vtt | 8.17KB | 
                    
                        | 8 | 148.37KB | 
                    
                        | 8. Further Time-based One-time Password Security.mp4 | 2.58MB | 
                    
                        | 8. Further Time-based One-time Password Security.vtt | 2.62KB | 
                    
                        | 9 | 176.88KB | 
                    
                        | python-secure-coding-playbook.zip | 21.63MB | 
                    
                        | TutsNode.net.txt | 63B |