4 - Intro
4 - Module2-Lectire-1-Intro-to-top-10.pptx
5 - JSON Web Token Authentication Flow
6 - Broken Object Level Authorization
7 - Broken Object Level Authorization Identify Fix handson
8 - Broken Authentication
9 - Broken Authentication Identify Fix handson
10 - Broken Object Property Level Authorization Intro
11 - Broken Object Property Level Authorization Identify Fix handson
12 - Unrestricted Resource Consumption Intro
14 - Broken Function Level Authorization Intro
15 - Broken Function Level Authorization Identify Fix handson
16 - Unrestricted Access to Sensitive Business Flows Intro
17 - Unrestricted Access to Sensitive Business Flows Identify Fix handson
18 - Server Side Request Forgery SSRF Intro
19 - Server Side Request Forgery SSRF Identify Fix hands on
20 - Security Misconfiguration Intro
21 - Security Misconfiguration Identify Fix hands on
22 - Improper Inventory Managment Intro
23 - Improper Inventory Managment Identify Fix hands on
24 - Unsafe Consumption of APIs Intro
25 - Unsafe Consumption of APIs Identify Fix hands on