Udemy Secure coding in Java with Web Application Examples
4.5 GB | 00:35:21 | mp4 | 1920X1080 | 16:9
Genre:eLearning |
Language:
English
Files Included :
1 - Communication plan (75.41 MB)
2 - Unlimited access to Learn IT application for students (66.13 MB)
19 - Software Data Integrity Failures (137.11 MB)
20 - Security Logging Monitoring Failures (167.57 MB)
21 - Logging in Java Part 1 Logging theory Logging Levels Java Logging Framework (372.47 MB)
22 - Logging in Java Part 2 Log4J Logback SLF4J (434.12 MB)
23 - ServerSide Request Forgery SSRF (163.02 MB)
25 - API12023 Broken Object Level Authorization Part 1 (203.23 MB)
26 - API12023 Broken Object Level Authorization Part 2 Practice (93.76 MB)
27 - API12023 Broken Object Level Authorization Part 3 ZeroTrust UUIDs (260.55 MB)
29 - Bonus Lesson (47.06 MB)
5 - OWASP Top 10 Overview (145.76 MB)
6 - Broken Access Control (459.29 MB)
7 - Cryptography Failures Theory Sensitive Data Data Breach Types of Failures (115.84 MB)
8 - Cryptography Failures Practical Examples SQL Injections TLSSSL HTTPS (90.15 MB)
9 - Cryptography Failures Examples Password Encryption Hashing Salting (207.97 MB)
10 - Injection Overview Fuzzing CWEs Impact Injection Types Command Injection (147.9 MB)
11 - Injection Cross Site Scripting Types of XSS SQL JPA NoSQL Injections (145.81 MB)
12 - Injection XPath Injection Log Injection Input Validation (103.81 MB)
13 - Insecure Design Overivew CWEs Shift Left Security Threat Modeling Manifesto (136.63 MB)
14 - Insecure Design Secure Design Process Security Controls Metrics Examples (149.97 MB)
15 - Security Misconfiguration Overview CWEs Types Reallife attacks (127.67 MB)
16 - Security Misconfiguration Hardening Zero Trust Defense in Depth Practice (259.03 MB)
17 - Vulnerable Outdated Components (240.75 MB)
18 - Identification Authentication Failures (257.89 MB)
[center]
Screenshot
[/center]
Коментарии
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.