Udemy - Secure coding in Java with Web Application Examples
Udemy - Secure coding in Java with Web Application Examples
Secure coding in Java with Web Application Examples https://DevCourseWeb.com Published 06/2022 Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz Language: English | Size: 2.4 GB | Duration: 20 lectures • 6h 16m Learn the most common vulnerabilities and how to avoid them with Online Shop Web Application Example in Java What you'll learn Secure Coding Practices with Java Examples How to produce secure code for Java Web Application Security Guidelines and Standards The most common security threats and vulnerabilities Threat modelling How to build efficient process in your team to create Secure Design OWASP Top 10 2021 OWASP Top 10 2017 OWASP API Security Guidelines Practical tips and trics Real-life examples of vulnerabilities and prevention of vulnerabilities Requirements Basic understanding of how Web works Knowledge of one of the programming languages for web development Description From this course, you can learn Secure Coding in Java.
38
Other /Tutorials
2.5 GB
[ DevCourseWeb.com ] Udemy - Secure coding in Java with Web Application Examples
Get Bonus Downloads Here.url (0.2 KB)
~Get Your Files Here !
1. Introduction
1. Communication plan.mp4 (49.1 MB)
1. Communication plan.srt (6.2 KB)
1.1 Facebook of the Tutor.html (0.1 KB)
1.10 Youtube channel with free lessons and blog.html (0.1 KB)
1.2 Facebook Page with Udemy Coupons from Learn IT University.html (0.1 KB)
1.3 Instagram of the Tutor.html (0.1 KB)
1.4 IT-Bulls Company Official Website.html (0.1 KB)
1.5 Learn IT University Website.html (0.1 KB)
1.6 LinkedIn of the Tutor.html (0.1 KB)
1.7 LinkedIn IT-Bulls company - official page.html (0.1 KB)
1.8 Patreon account of the Tutor.html (0.1 KB)
1.9 Telegram Channel with Latest News, coupons and important information.html (0.2 KB)
2. Unlimited access to 'Learn IT' application for students.mp4 (44.5 MB)
2. Unlimited access to 'Learn IT' application for students.srt (4.5 KB)
2.1 Learn IT application in Play Market.html (0.1 KB)
2.2 Page where you can generate FREE bonus code for your self to remove limits in Application.html (0.1 KB)
10. A082021-Software and Data Integrity Failures
1. Software & Data Integrity Failures.mp4 (104.2 MB)
1. Software & Data Integrity Failures.srt (19.1 KB)
11. A092021-Security Logging and Monitoring Failures
1. Security Logging & Monitoring Failures.mp4 (135.1 MB)
1. Security Logging & Monitoring Failures.srt (25.9 KB)
1.1 Computer Security Incident Handling Guide.html (0.1 KB)
12. A102021-Server-Side Request Forgery
1. Server-Side Request Forgery (SSRF).mp4 (123.0 MB)
1. Server-Side Request Forgery (SSRF).srt (26.6 KB)
13. Bonus Section
1. Bonus Lesson.mp4 (37.1 MB)
1. Bonus Lesson.srt (4.3 KB)
1.1 Facebook Page with Udemy Coupons from Learn IT University.html (0.1 KB)
1.10 Public profile of Tutor with list of all courses - Andrii Piatakha.html (0.1 KB)
1.11 Support me on Patreon by getting access to EXCLUSIVE content.html (0.1 KB)
1.12 Telegram Channel with Latest News and important information.html (0.2 KB)
1.13 Youtube channel with free lessons and blog.html (0.1 KB)
1.2 Facebook Andrii Piatakha.html (0.1 KB)
1.3 Free book about AI by Andrii Piatakha (sci-fi).html (0.1 KB)
1.4 Instagram Andrii Piatakha.html (0.1 KB)
1.5 IT-Bulls Company Official Website.html (0.1 KB)
1.6 Java Course From zero to first job.html (0.2 KB)
1.7 Learn IT University Official Website.html (0.1 KB)
1.8 LinkedIn Andrii PIatakha.html (0.1 KB)
1.9 LinkedIn IT-Bulls company - official page.html (0.1 KB)
2. OWASP Top 10
1. OWASP Top 10 Overview.mp4 (119.2 MB)
1. OWASP Top 10 Overview.srt (22.4 KB)
1.1 Common Weakness Enumeration (CWE) - official website.html (0.1 KB)
3. A012021-Broken Access Control
1. Broken Access Control.mp4 (310.9 MB)
1. Broken Access Control.srt (43.8 KB)
1.1 Source code examples from the lesson.html (0.2 KB)
4. A022021-Cryptographic Failures
1. Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).mp4 (93.6 MB)
1. Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).srt (15.7 KB)
2. Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).mp4 (137.7 MB)
2. Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).srt (23.3 KB)
2.1 Source code examples from the lesson.html (0.2 KB)
3. Cryptography Failures (Examples, Password Encryption, Hashing, Salting).mp4 (154.2 MB)
3. Cryptography Failures (Examples, Password Encryption, Hashing, Salting).srt (21.5 KB)
3.1 Source code examples from the lesson.html (0.2 KB)
5. A032021-Injection
1. Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).mp4 (111.7 MB)
1. Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).srt (18.9 KB)
1.1 Source code examples from the lesson.html (0.2 KB)
2. Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).mp4 (126.6 MB)
2. Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).srt (18.7 KB)
2.1 Source code examples from the lesson.html (0.2 KB)
3. Injection (XPath Injection, Log Injection, Input Validation).mp4 (88.7 MB)
3. Injection (XPath Injection, Log Injection, Input Validation).srt (18.4 KB)
3.1 Source code examples from the lesson.html (0.2 KB)
6. A042021-Insecure Design
1. Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).mp4 (102.2 MB)
1. Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).srt (23.5 KB)
2. Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).mp4 (129.1 MB)
2. Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).srt (28.6 KB)
7. A052021-Security Misconfiguration
1. Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).mp4 (98.5 MB)
1. Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).srt (22.5 KB)
1.1 NIST 800-123 - Guide to General Server Security.html (0.1 KB)
1.2 NIST 800-207 - Zero Trust Architecture.html (0.1 KB)
2. Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).mp4 (192.6 MB)
2. Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).srt (32.1 KB)
2.1 NIST 800-123 - Guide to General Server Security.html (0.1 KB)
2.2 NIST 800-207 - Zero Trust Architecture.html (0.1 KB)
8. A062021-Vulnerable and Outdated Components
1. Vulnerable & Outdated Components.mp4 (178.8 MB)
1. Vulnerable & Outdated Components.srt (26.9 KB)
1.1 Dependency check plugin.html (0.1 KB)
1.2 pom.xml from the lesson with OWASP plugin.html (0.1 KB)
9. A072021-Identification and Authentication Failures
1. Identification & Authentication Failures.mp4 (202.9 MB)
1. Identification & Authentic
files
2022-07-02 10:02:16
English
Seeders : 8 , Leechers : 5
Development Udemy
Udemy - Secure coding in Java with Web Application Examples
udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
Back