[ ] Udemy - Secure coding in Java with Web Application Examples
- 收录时间:2022-12-07 20:38:49
- 文件大小:2GB
- 下载次数:1
- 最近下载:2022-12-07 20:38:49
- 磁力链接:
-
文件列表
- ~Get Your Files Here !/3. A012021-Broken Access Control/1. Broken Access Control.mp4 311MB
- ~Get Your Files Here !/9. A072021-Identification and Authentication Failures/1. Identification & Authentication Failures.mp4 203MB
- ~Get Your Files Here !/7. A052021-Security Misconfiguration/2. Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).mp4 193MB
- ~Get Your Files Here !/8. A062021-Vulnerable and Outdated Components/1. Vulnerable & Outdated Components.mp4 179MB
- ~Get Your Files Here !/4. A022021-Cryptographic Failures/3. Cryptography Failures (Examples, Password Encryption, Hashing, Salting).mp4 154MB
- ~Get Your Files Here !/4. A022021-Cryptographic Failures/2. Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).mp4 138MB
- ~Get Your Files Here !/11. A092021-Security Logging and Monitoring Failures/1. Security Logging & Monitoring Failures.mp4 135MB
- ~Get Your Files Here !/6. A042021-Insecure Design/2. Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).mp4 129MB
- ~Get Your Files Here !/5. A032021-Injection/2. Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).mp4 127MB
- ~Get Your Files Here !/12. A102021-Server-Side Request Forgery/1. Server-Side Request Forgery (SSRF).mp4 123MB
- ~Get Your Files Here !/2. OWASP Top 10/1. OWASP Top 10 Overview.mp4 119MB
- ~Get Your Files Here !/5. A032021-Injection/1. Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).mp4 112MB
- ~Get Your Files Here !/10. A082021-Software and Data Integrity Failures/1. Software & Data Integrity Failures.mp4 104MB
- ~Get Your Files Here !/6. A042021-Insecure Design/1. Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).mp4 102MB
- ~Get Your Files Here !/7. A052021-Security Misconfiguration/1. Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).mp4 99MB
- ~Get Your Files Here !/4. A022021-Cryptographic Failures/1. Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).mp4 94MB
- ~Get Your Files Here !/5. A032021-Injection/3. Injection (XPath Injection, Log Injection, Input Validation).mp4 89MB
- ~Get Your Files Here !/1. Introduction/1. Communication plan.mp4 49MB
- ~Get Your Files Here !/1. Introduction/2. Unlimited access to 'Learn IT' application for students.mp4 44MB
- ~Get Your Files Here !/13. Bonus Section/1. Bonus Lesson.mp4 37MB
- ~Get Your Files Here !/3. A012021-Broken Access Control/1. Broken Access Control.srt 44KB
- ~Get Your Files Here !/9. A072021-Identification and Authentication Failures/1. Identification & Authentication Failures.srt 38KB
- ~Get Your Files Here !/7. A052021-Security Misconfiguration/2. Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).srt 32KB
- ~Get Your Files Here !/6. A042021-Insecure Design/2. Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).srt 29KB
- ~Get Your Files Here !/8. A062021-Vulnerable and Outdated Components/1. Vulnerable & Outdated Components.srt 27KB
- ~Get Your Files Here !/12. A102021-Server-Side Request Forgery/1. Server-Side Request Forgery (SSRF).srt 27KB
- ~Get Your Files Here !/11. A092021-Security Logging and Monitoring Failures/1. Security Logging & Monitoring Failures.srt 26KB
- ~Get Your Files Here !/6. A042021-Insecure Design/1. Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).srt 23KB
- ~Get Your Files Here !/4. A022021-Cryptographic Failures/2. Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).srt 23KB
- ~Get Your Files Here !/7. A052021-Security Misconfiguration/1. Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).srt 23KB
- ~Get Your Files Here !/2. OWASP Top 10/1. OWASP Top 10 Overview.srt 22KB
- ~Get Your Files Here !/4. A022021-Cryptographic Failures/3. Cryptography Failures (Examples, Password Encryption, Hashing, Salting).srt 22KB
- ~Get Your Files Here !/10. A082021-Software and Data Integrity Failures/1. Software & Data Integrity Failures.srt 19KB
- ~Get Your Files Here !/5. A032021-Injection/1. Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).srt 19KB
- ~Get Your Files Here !/5. A032021-Injection/2. Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).srt 19KB
- ~Get Your Files Here !/5. A032021-Injection/3. Injection (XPath Injection, Log Injection, Input Validation).srt 18KB
- ~Get Your Files Here !/4. A022021-Cryptographic Failures/1. Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).srt 16KB
- ~Get Your Files Here !/1. Introduction/1. Communication plan.srt 6KB
- ~Get Your Files Here !/1. Introduction/2. Unlimited access to 'Learn IT' application for students.srt 5KB
- ~Get Your Files Here !/13. Bonus Section/1. Bonus Lesson.srt 4KB
- ~Get Your Files Here !/Bonus Resources.txt 386B
- ~Get Your Files Here !/5. A032021-Injection/1.1 Source code examples from the lesson.html 219B
- ~Get Your Files Here !/5. A032021-Injection/2.1 Source code examples from the lesson.html 219B
- ~Get Your Files Here !/5. A032021-Injection/3.1 Source code examples from the lesson.html 219B
- ~Get Your Files Here !/3. A012021-Broken Access Control/1.1 Source code examples from the lesson.html 213B
- ~Get Your Files Here !/4. A022021-Cryptographic Failures/2.1 Source code examples from the lesson.html 212B
- ~Get Your Files Here !/4. A022021-Cryptographic Failures/3.1 Source code examples from the lesson.html 212B
- Get Bonus Downloads Here.url 182B
- ~Get Your Files Here !/13. Bonus Section/1.6 Java Course From zero to first job.html 163B
- ~Get Your Files Here !/1. Introduction/1.9 Telegram Channel with Latest News, coupons and important information.html 157B
- ~Get Your Files Here !/13. Bonus Section/1.12 Telegram Channel with Latest News and important information.html 157B
- ~Get Your Files Here !/1. Introduction/2.1 Learn IT application in Play Market.html 145B
- ~Get Your Files Here !/8. A062021-Vulnerable and Outdated Components/1.2 pom.xml from the lesson with OWASP plugin.html 144B
- ~Get Your Files Here !/7. A052021-Security Misconfiguration/1.1 NIST 800-123 - Guide to General Server Security.html 138B
- ~Get Your Files Here !/7. A052021-Security Misconfiguration/2.1 NIST 800-123 - Guide to General Server Security.html 138B
- ~Get Your Files Here !/11. A092021-Security Logging and Monitoring Failures/1.1 Computer Security Incident Handling Guide.html 135B
- ~Get Your Files Here !/7. A052021-Security Misconfiguration/1.2 NIST 800-207 - Zero Trust Architecture.html 134B
- ~Get Your Files Here !/7. A052021-Security Misconfiguration/2.2 NIST 800-207 - Zero Trust Architecture.html 134B
- ~Get Your Files Here !/8. A062021-Vulnerable and Outdated Components/1.1 Dependency check plugin.html 134B
- ~Get Your Files Here !/1. Introduction/2.2 Page where you can generate FREE bonus code for your self to remove limits in Application.html 114B
- ~Get Your Files Here !/1. Introduction/1.6 LinkedIn of the Tutor.html 105B
- ~Get Your Files Here !/13. Bonus Section/1.8 LinkedIn Andrii PIatakha.html 105B
- ~Get Your Files Here !/1. Introduction/1.2 Facebook Page with Udemy Coupons from Learn IT University.html 104B
- ~Get Your Files Here !/13. Bonus Section/1.1 Facebook Page with Udemy Coupons from Learn IT University.html 104B
- ~Get Your Files Here !/13. Bonus Section/1.10 Public profile of Tutor with list of all courses - Andrii Piatakha.html 104B
- ~Get Your Files Here !/1. Introduction/1.3 Instagram of the Tutor.html 103B
- ~Get Your Files Here !/1. Introduction/1.7 LinkedIn IT-Bulls company - official page.html 103B
- ~Get Your Files Here !/13. Bonus Section/1.3 Free book about AI by Andrii Piatakha (sci-fi).html 103B
- ~Get Your Files Here !/13. Bonus Section/1.4 Instagram Andrii Piatakha.html 103B
- ~Get Your Files Here !/13. Bonus Section/1.9 LinkedIn IT-Bulls company - official page.html 103B
- ~Get Your Files Here !/1. Introduction/1.1 Facebook of the Tutor.html 101B
- ~Get Your Files Here !/13. Bonus Section/1.2 Facebook Andrii Piatakha.html 101B
- ~Get Your Files Here !/1. Introduction/1.8 Patreon account of the Tutor.html 100B
- ~Get Your Files Here !/13. Bonus Section/1.11 Support me on Patreon by getting access to EXCLUSIVE content.html 100B
- ~Get Your Files Here !/1. Introduction/1.10 Youtube channel with free lessons and blog.html 94B
- ~Get Your Files Here !/13. Bonus Section/1.13 Youtube channel with free lessons and blog.html 94B
- ~Get Your Files Here !/1. Introduction/1.5 Learn IT University Website.html 93B
- ~Get Your Files Here !/13. Bonus Section/1.7 Learn IT University Official Website.html 93B
- ~Get Your Files Here !/2. OWASP Top 10/1.1 Common Weakness Enumeration (CWE) - official website.html 93B
- ~Get Your Files Here !/1. Introduction/1.4 IT-Bulls Company Official Website.html 82B
- ~Get Your Files Here !/13. Bonus Section/1.5 IT-Bulls Company Official Website.html 81B