23 OCT 2025 - We are back! If you have been following us over the last few years, you will know that the last 2 months have been rough. We website was practically not loading. Sorry for the mess. We are back though and everything should run smoothly now. New servers. Updated domains. And new owners. We invite you all to start uploading torrents again!
TORRENT DETAILS
Udemy - OWASP Mobile Top 10 - Vulnerabilities To Avoid
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Published 11/2023 Created by Pack Of Coders - POC MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 50 Lectures ( 2h 17m ) | Size: 1.3 GB
Skills Necessary to Understand the Most Critical Mobile Application Security Risks
What you'll learn Mobile OWASP Top 10 2023 Coverage Details on Each Vulnerability and Strategies for Prevention Learn to Threat Mode Each of the Mobile Applications Vulnerabilities Identify Best Practices for Secure Mobile Application Design and Coding Learn to Integrate Security into the Mobile Development Life Cycle Concepts to Support Building Secure iOS and Android Applications Find Out How to Apply Best Practices to Detect Vulnerabilities
Requirements All Levels
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. Introduction/1. Introduction.mp4
10.2 MB
~Get Your Files Here !/1. Introduction/2. Course Content and Structure.mp4
17.3 MB
~Get Your Files Here !/1. Introduction/3. Lesson Quiz and Resources.mp4
3.3 MB
~Get Your Files Here !/1. Introduction/4. Ethics.mp4
1.9 MB
~Get Your Files Here !/1. Introduction/5. OWASP Mobile Top 10 - Overview.mp4
29.4 MB
~Get Your Files Here !/10. Insufficient Cryptography/1. OWASP Mobile #8 Insufficient Cryptography.mp4
7.1 MB
~Get Your Files Here !/10. Insufficient Cryptography/1.1 Course Notes - Insufficient Cryptography.pdf
52.7 KB
~Get Your Files Here !/10. Insufficient Cryptography/2. Describing the Vulnerability.mp4
29 MB
~Get Your Files Here !/10. Insufficient Cryptography/3. Threat Modeling.mp4
21.1 MB
~Get Your Files Here !/10. Insufficient Cryptography/4. Detection and Prevention.mp4
40.5 MB
~Get Your Files Here !/10. Insufficient Cryptography/5. Quiz - Insufficient Cryptography.html
127 B
~Get Your Files Here !/11. Insecure Data Storage/1. OWASP Mobile #9 Insecure Data Storage.mp4
10.3 MB
~Get Your Files Here !/11. Insecure Data Storage/1.1 Course Notes - Insecure Data Storage.pdf
60.8 KB
~Get Your Files Here !/11. Insecure Data Storage/2. Describing the Vulnerability.mp4
26.2 MB
~Get Your Files Here !/11. Insecure Data Storage/3. Threat Modeling.mp4
21 MB
~Get Your Files Here !/11. Insecure Data Storage/4. Detection and Prevention.mp4
53.6 MB
~Get Your Files Here !/11. Insecure Data Storage/5. Quiz - Insecure Data Storage.html
127 B
~Get Your Files Here !/12. Insufficient Binary Protections/1. OWASP Mobile #10 Insufficient Binary Protections.mp4
10.8 MB
~Get Your Files Here !/12. Insufficient Binary Protections/1.1 Course Notes - Insufficient Binary Protections.pdf
52.3 KB
~Get Your Files Here !/12. Insufficient Binary Protections/2. Describing the Vulnerability.mp4
26.1 MB
~Get Your Files Here !/12. Insufficient Binary Protections/3. Threat Modeling.mp4
32.9 MB
~Get Your Files Here !/12. Insufficient Binary Protections/4. Detection and Prevention.mp4
38.4 MB
~Get Your Files Here !/12. Insufficient Binary Protections/5. Quiz - Insufficient Binary Protections.html
127 B
~Get Your Files Here !/13. Course Summary and Conclusion/1. Conclusion.mp4
17.2 MB
~Get Your Files Here !/2. Foundation Security Concepts/1. Secure Software Development.mp4
16.1 MB
~Get Your Files Here !/2. Foundation Security Concepts/2. Addressing Risk.mp4
72.2 MB
~Get Your Files Here !/2. Foundation Security Concepts/3. Developing Threat Models.mp4
18.1 MB
~Get Your Files Here !/2. Foundation Security Concepts/4. Encryption 101.mp4
49.3 MB
~Get Your Files Here !/3. Insecure Authentication Authorization/1. OWASP Mobile #1 Insecure Authentication Authorization.mp4
6 MB
~Get Your Files Here !/3. Insecure Authentication Authorization/1.1 Course Notes - Insecure Authentication Authorization.pdf
73.5 KB
~Get Your Files Here !/3. Insecure Authentication Authorization/2. Describing the Vulnerability.mp4
27.8 MB
~Get Your Files Here !/3. Insecure Authentication Authorization/3. Threat Modeling.mp4
26.6 MB
~Get Your Files Here !/3. Insecure Authentication Authorization/4. Detection and Prevention.mp4
53.8 MB
~Get Your Files Here !/3. Insecure Authentication Authorization/5. Quiz - Insecure Authentication Authorization.html
127 B
~Get Your Files Here !/4. Insecure Communication/1. OWASP Mobile #2 Insecure Communication.mp4
7.3 MB
~Get Your Files Here !/4. Insecure Communication/1.1 Course Notes - Insecure Communication.pdf
58.5 KB
~Get Your Files Here !/4. Insecure Communication/2. Describing the Vulnerability.mp4
42.3 MB
~Get Your Files Here !/4. Insecure Communication/3. Threat Modeling.mp4
20.7 MB
~Get Your Files Here !/4. Insecure Communication/4. Detection and Prevention.mp4
32.4 MB
~Get Your Files Here !/4. Insecure Communication/5. Quiz - Insecure Communication.html
127 B
~Get Your Files Here !/5. Inadequate Supply Chain Security/1. OWASP Mobile #3 Inadequate Supply Chain Security.mp4
8.8 MB
~Get Your Files Here !/5. Inadequate Supply Chain Security/1.1 Course Notes - Inadequate Supply Chain Security.pdf
59 KB
~Get Your Files Here !/5. Inadequate Supply Chain Security/2. Describing the Vulnerability.mp4
30 MB
~Get Your Files Here !/5. Inadequate Supply Chain Security/3. Threat Modeling.mp4
15.6 MB
~Get Your Files Here !/5. Inadequate Supply Chain Security/4. Detection and Prevention.mp4
31.9 MB
~Get Your Files Here !/5. Inadequate Supply Chain Security/5. Quiz - Inadequate Supply Chain Security.html
127 B
~Get Your Files Here !/6. Inadequate Privacy Controls/1. OWASP Mobile #4 Inadequate Privacy Controls.mp4
8.3 MB
~Get Your Files Here !/6. Inadequate Privacy Controls/1.1 Course Notes - Inadequate Privacy Controls.pdf
64.9 KB
~Get Your Files Here !/6. Inadequate Privacy Controls/2. Describing the Vulnerability.mp4
39.9 MB
~Get Your Files Here !/6. Inadequate Privacy Controls/3. Threat Modeling.mp4
36.1 MB
~Get Your Files Here !/6. Inadequate Privacy Controls/4. Detection and Prevention.mp4
42.5 MB
~Get Your Files Here !/6. Inadequate Privacy Controls/5. Quiz - Inadequate Privacy Controls.html
127 B
~Get Your Files Here !/7. Improper Credential Usage/1. OWASP Mobile #5 Improper Credential Use.mp4
8.3 MB
~Get Your Files Here !/7. Improper Credential Usage/1.1 Course Notes - Improper Credential Usage.pdf
65.8 KB
~Get Your Files Here !/7. Improper Credential Usage/2. Describing the Vulnerability.mp4
37.1 MB
~Get Your Files Here !/7. Improper Credential Usage/3. Threat Modeling.mp4
17.9 MB
~Get Your Files Here !/7. Improper Credential Usage/4. Detection and Prevention.mp4
34.8 MB
~Get Your Files Here !/7. Improper Credential Usage/5. Quiz - Improper Credential Use.html
127 B
~Get Your Files Here !/8. Insufficient Input Output Validation/1. OWASP Mobile #6 Insufficient Input Output Validation.mp4
9.6 MB
~Get Your Files Here !/8. Insufficient Input Output Validation/1.1 Course Notes - Insufficient IO Validation.pdf
55.2 KB
~Get Your Files Here !/8. Insufficient Input Output Validation/2. Describing the Vulnerability.mp4
34.6 MB
~Get Your Files Here !/8. Insufficient Input Output Validation/3. Threat Modeling.mp4
29.9 MB
~Get Your Files Here !/8. Insufficient Input Output Validation/4. Detection and Prevention.mp4
42.1 MB
~Get Your Files Here !/8. Insufficient Input Output Validation/5. Quiz - Insufficient Input Output Validation.html
127 B
~Get Your Files Here !/9. Security Misconfiguration/1. OWASP Mobile #7 Security Misconfiguration.mp4
9.8 MB
~Get Your Files Here !/9. Security Misconfiguration/1.1 Course Notes - Security Misconfiguration.pdf
60.1 KB
~Get Your Files Here !/9. Security Misconfiguration/2. Describing the Vulnerability.mp4
39.6 MB
~Get Your Files Here !/9. Security Misconfiguration/3. Threat Modeling.mp4
17.1 MB
~Get Your Files Here !/9. Security Misconfiguration/4. Detection and Prevention.mp4
42.8 MB
~Get Your Files Here !/9. Security Misconfiguration/5. Quiz - Security Misconfiguration.html