PluralSight – MUwS, PHA, Vulnerabilities: A Walk through on What Not to Do-JGTiSO
English | Size: 340.16 MB
Category: Tutorial
Droidcon SF 2019 | MUwS, PHA, Vulnerabilities: A Walk through on What Not to Do | Salvador Mandujano [Read more…]
Get Yourself a Better Life! Free eLearning Download
PluralSight – MUwS, PHA, Vulnerabilities: A Walk through on What Not to Do-JGTiSO
English | Size: 340.16 MB
Category: Tutorial
Pluralsight – Mitigating Security Vulnerabilities on Google Cloud Platform-BOOKWARE-KNiSO
English | Size: 489.44 MB
Category: Tutorial
Pluralsight – Eliminating Security Vulnerabilities with NPM Audit
English | Size: 159.74 MB
Category: E-learning | Security | others
Security is critical to any production application, but it can be difficult to identify security vulnerabilities. In this course, Eliminating Security Vulnerabilities with NPM Audit, you will gain an in-depth understanding of how to use npm audit to resolve security vulnerabilities in your JavaScript applications. First, you will see how to run audits and discover what vulnerabilities you have. Next, you will run the audit fix command to fix those vulnerabilities. Finally, you will explore how to deal with vulnerabilities that don’t have published fixes. When you are finished with this course, you will have the skills and knowledge of npm audit needed to keep your applications free of known security vulnerabilities. [Read more…]
Packt Publishing – Web Security – Common Vulnerabilities And Their Mitigation
English | Size: 9.59 GB
Category: Tutorial
Coat your website with armor, protect yourself against the most common threats and vulnerabilities. Understand, with examples, how common security attacks work and how to mitigate them. Learn secure practices to keep your website users safe. Let’s parse that. How do common security attacks work?: This course walks you through an entire range of web application security attacks, XSS, XSRF, Session Hijacking, Direct Object Reference and a whole lot more. How do we mitigate them?: Mitigating security risks is a web developer’s core job. Learn by example how you can prevent script injection, use secure tokens to mitigate XSRF, manage sessions and cookies, sanitize and validate input, manage credentials safely using hashing and encryption etc. What secure practices to follow?: See what modern browsers have to offer for protection and risk mitigation, how you can limit the surface area you expose in your site. [Read more…]
Finding vulnerabilities with Burp suite and using more features
English | Size: 103 MB
Category: Tutorial
Pluralsight – Threats, Attacks, and Vulnerabilities for CompTIA Security+
English | Size: 422.18 MB
Category: Tutorial
Packt Publishing – Finding and Exploiting Hidden Vulnerabilities
English | Size: 764.89 MB
Category: Tutorial
Courses focused on teaching Vulnerability Assessment and Penetration Testing sometimes miss out on essential elements such as documentation. Keeping this in mind, the course module has been developed to help you understand the process of VAPT step by step. So here you’ll learn how to perform vulnerability assessments using well-known softwares such as Nessus and OpenVas. [Read more…]