Lynda - Programming Foundations - Web Security [AhLaN]
- 收录时间:2020-07-29 03:38:44
- 文件大小:772MB
- 下载次数:33
- 最近下载:2021-01-17 18:29:15
- 磁力链接:
-
文件列表
- 4 - 3. Filter Input, Control Output/17 - Sanitize data.mp4 37MB
- 5 - 4. The Most Common Attacks/27 - Cross-site scripting (XSS).mp4 34MB
- 5 - 4. The Most Common Attacks/31 - Session hijacking.mp4 34MB
- 5 - 4. The Most Common Attacks/26 - SQL injection.mp4 33MB
- 5 - 4. The Most Common Attacks/23 - Types of credential attacks.mp4 29MB
- 5 - 4. The Most Common Attacks/35 - Denial of service.mp4 29MB
- 5 - 4. The Most Common Attacks/24 - Strong passwords.mp4 28MB
- 5 - 4. The Most Common Attacks/30 - Cookie visibility and theft.mp4 27MB
- 5 - 4. The Most Common Attacks/25 - URL manipulation and insecure direct object reference (IDOR).mp4 26MB
- 5 - 4. The Most Common Attacks/28 - Cross-site request forgery (CSRF).mp4 26MB
- 4 - 3. Filter Input, Control Output/15 - Regulate requests.mp4 25MB
- 4 - 3. Filter Input, Control Output/20 - Keep credentials private.mp4 24MB
- 3 - 2. General Security Principles/12 - Security through obscurity.mp4 23MB
- 5 - 4. The Most Common Attacks/29 - Cross-site request protections.mp4 23MB
- 4 - 3. Filter Input, Control Output/16 - Validate input.mp4 22MB
- 3 - 2. General Security Principles/11 - Defense in depth.mp4 22MB
- 3 - 2. General Security Principles/07 - Least privilege.mp4 22MB
- 1 - Introduction/01 - The importance of security.mp4 20MB
- 3 - 2. General Security Principles/13 - Deny lists and allow lists.mp4 20MB
- 2 - 1. Security Overview/05 - Threat models.mp4 20MB
- 3 - 2. General Security Principles/09 - Never trust users.mp4 20MB
- 3 - 2. General Security Principles/14 - Map exposure points and data passageways.mp4 19MB
- 2 - 1. Security Overview/04 - What is a hacker.mp4 18MB
- 4 - 3. Filter Input, Control Output/22 - Smart logging.mp4 18MB
- 5 - 4. The Most Common Attacks/32 - Session fixation.mp4 18MB
- 3 - 2. General Security Principles/08 - Simple is more secure.mp4 17MB
- 2 - 1. Security Overview/02 - What is security.mp4 17MB
- 2 - 1. Security Overview/06 - Total security is unachievable.mp4 17MB
- 4 - 3. Filter Input, Control Output/19 - Keep code private.mp4 15MB
- 5 - 4. The Most Common Attacks/33 - Remote code execution.mp4 15MB
- 4 - 3. Filter Input, Control Output/21 - Keep error messages vague.mp4 14MB
- 6 - Conclusion/36 - Next steps.mp4 14MB
- 5 - 4. The Most Common Attacks/34 - File upload abuse.mp4 14MB
- 2 - 1. Security Overview/03 - Why security matters.mp4 12MB
- 3 - 2. General Security Principles/10 - Expect the unexpected.mp4 12MB
- 4 - 3. Filter Input, Control Output/18 - Label variables.mp4 6MB
- Seed Me!!.png 42KB
- AhLaN.txt 175B