OWASP Top 10 Web Application Security Risks for ASP.NET

seeders: 0
leechers: 0
Added on January 16, 2016 by chmosamain Other > Tutorials
Torrent verified.



OWASP Top 10 Web Application Security Risks for ASP.NET (Size: 2.09 GB)
 Exercide Files.zip360.95 MB
 3 - Who's doing the hacking.mp414.42 MB
 4 - OWASP and the Top 10.mp414.24 MB
 5 - Applying security in depth.mp48.15 MB
 2 - Who's getting hacked.mp46.77 MB
 1 - Introduction.mp41.31 MB
 3 - Demo - Anatomy of an attack.mp435.42 MB
 12 - Demo - Injection through stored procedures.mp424.64 MB
 10 - Demo - Whitelisting untrusted data.mp419.56 MB
 13 - Demo - Injection automation with Havij.mp417.92 MB
 7 - Demo - The principle of least privilege.mp417.75 MB
 11 - Demo - Entity Framework's SQL parameterisation.mp416.12 MB
 8 - Demo - Inline SQL parameterisation.mp415.58 MB
 9 - Demo - Stored procedure parameterisation.mp410.02 MB
 14 - Summary.mp47.22 MB
 2 - OWASP overview and risk rating.mp45.87 MB
 11 - Demo - ASP NET reequest validation.mp463.64 MB
 7 - Demo - Implementing output encoding.mp425.56 MB
 4 - Risk in practice - My Space and Samy.mp424.55 MB
 12 - Demo - Reflective versus persistent XSS.mp417.43 MB
 3 - Demo - Anatomy of an attacker.mp416.73 MB
 13 - Demo - Native browser defences.mp413.62 MB
 8 - Demo - Output encoding in web forms.mp412.37 MB
 10 - Demo - Whitelisting allowable values.mp411.37 MB
 15 - Summary.mp410.06 MB
 6 - Output encoding concepts.mp49.03 MB
 8 - Demo - Leveraging ASP NET membership provider for authentication.mp417.4 MB
 7 - Demo - Securely configuring session persistence.mp49.93 MB
 11 - Other broken authentication patterns.mp46.78 MB
 4 - Risk in practice - Apples's session fixation.mp46.33 MB
 12 - Summary.mp45.71 MB
 6 - The risk of session persistence in the URL versus cookies.mp45.53 MB
 10 - Siding versus fixed forms timeout.mp45.35 MB
 9 - Customising session and forms timeouts to minimise risk windows.mp45.19 MB
 3 - Demo - Anatomy of an attack.mp44.61 MB
 2 - OWASP overview and risk rating.mp43.64 MB
 8 - Demo - Building an indirect reference map.mp442.84 MB
 6 - Demo - Implementing access controls.mp420.01 MB
 3 - Demo - Anatomy of an attack.mp416.52 MB
 7 - Understanding indirect reference maps.mp410.62 MB
 4 - Risk in practice - Citibank.mp410.52 MB
 5 - Understanding direct object references.mp410.43 MB
 9 - Obfuscation via random surrogate keys.mp44.28 MB
 10 - Summary.mp43.66 MB
 2 - OWASP overview and risk rating.mp43.37 MB
 1 - Introduction.mp41.34 MB
 5 - What make a CSRF attack possible.mp433.22 MB
 7 - Demo - Implementing an anti-frogery token in MVC.mp418.47 MB
 8 - Demo - Web forms approach to anti-frogery tokens.mp417.49 MB
 4 - Risk in practice - Compromised Brazillian modems.mp417.42 MB
 3 - Demo - Anatomy of an attack.mp414.33 MB
 9 - CSRF fallacies and browser defences.mp48.56 MB
 10 - Summary.mp46.74 MB
 6 - Understanding anti-frogery tokens.mp46.42 MB
 2 - OWASP overview and risk rating.mp46.33 MB
 1 - Introduction.mp42.09 MB
 5 - Demo - Correctly configuring custom errors.mp439.63 MB
 9 - Demo - Using config transforms to apply secure configurations.mp432.6 MB
 8 - Demo - Encrypting sensitive parts of the web-config.mp428.78 MB
 3 - Demo - Anatomy of an attack.mp425.88 MB
 7 - Demo - Keeping frameworks currrent with NuGet.mp422.17 MB
 6 - Demo - Securing web forms tracing.mp420.83 MB
 4 - Risk in practice - ELMAH.mp417.06 MB
 10 - Demo - Enabling retail mode on the server.mp414.44 MB
 11 - Summary.mp48.58 MB
 2 - OWASP overview and risk rating.mp46.12 MB
 1 - Introduction.mp42.24 MB
 3 - Demo - Anatomy of an attack.mp460.06 MB
 6 - Understanding salt and brute force attacks.mp434.09 MB
 7 - Slowing down hashes with new Membership Provider.mp426.52 MB
 5 - Understanding password storage and hashing.mp425.1 MB
 11 - Demo - Symmetric encryption using DPAPI.mp423.49 MB
 4 - Risk in practice - ABC passwords.mp417.99 MB
 8 - Other stronger hashing implemenetations.mp415 MB
 12 - Whats not cryptographic.mp414.6 MB
 9 - Things to consider when choosing a hashing implementations.mp414.02 MB
 13 - Summary.mp412.03 MB
 7 - Demo - Role based authorisation with the ASP NET Role Provider.mp429.23 MB
 4 - Risk in practice - Apple AT&T leak.mp421.11 MB
 6 - Demo - Access controls in ASP NET part 2 - The authorize attribute.mp421.1 MB
 5 - Demo - Access controls in ASP NET part 1 - web-config locations.mp419.61 MB
 8 - Other access controls risk and misconceptions.mp418.41 MB
 9 - Summary.mp412.35 MB
 2 - OWASP overview and risk rating.mp45.97 MB
 3 - Demo - Anatomy of an attack.mp45.88 MB
 1 - Introduction.mp41.71 MB
 3 - Demo - Anatomy of an attackmp4.mp438.73 MB
 5 - Demo - Understanding secure cookies and froms authentication.mp437.48 MB
 6 - Demo - Securing other cookies in ASP NET.mp436.45 MB
 4 - Risk in practice - Tunisian ISPs.mp428.8 MB
 9 - Demo - Mixed mode HTTPS.mp421.13 MB
 7 - Demo - Forcing web forms to use HTTPS.mp419.51 MB
 12 - Other HTTPS considerations.mp416.68 MB
 11 - Other insufficient HTTPS patterns.mp416.38 MB
 13 - Summary.mp414.94 MB
 10 - HTTP strict transport security.mp413.26 MB
 3 - Demo - Anatomy of an attack.mp418.78 MB
 7 - Demo - implementing referrer checking.mp418.42 MB
 6 - Demo - implementing a whitelist.mp416.74 MB
 4 - Risk in practice - US government websites.mp414.05 MB
 5 - Understanding the value of unvalidated redirects to attackers.mp412.13 MB
 2 - OWASP overview and risk rating.mp49.84 MB
 8 - Other issues with the unvalidated redirect riskmp4.mp48.11 MB
 9 - Summary.mp46.43 MB
 1 - Introduction.mp41.79 MB


Description

OWASP Top 10 Web Application Security Risks for ASP.NET

This course introduces the OWASP Top 10 Most Critical Web Application Security Risks including how to demonstrate and mitigate them in ASP.NET.


Description :-
Web applications today are being hacked with alarming regularity by hacktivists, online criminals and nation states. Very frequently, it is the same prevalent security risks being exploited which is why the Open Web Application Security Project (OWASP) developed their list of Top 10 Most Critical Web Application Security Risks to help developers build more secure software. This course helps developers apply the Top 10 in ASP.NET using both web forms and MVC by walking through an overview of the risk, demonstrating how it can be exploited in .NET and then delving into the various approaches available to mitigate it by applying security in depth.

Exercise Files :-
Learn by doing. Use hands-on exercise files to follow along with the course and practice concepts as you’re watching them. Sign up now to enhance your training.

Course Link : https://www.pluralsight.com/...t-application-security-risks

HD : Yes

Sharing Widget


Download torrent
2.09 GB
seeders:0
leechers:0
OWASP Top 10 Web Application Security Risks for ASP.NET