Programming Foundations - Web Security (2023)

seeders: 15
leechers: 6
updated:

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 106
  • Language: English

Files

[ DevCourseWeb.com ] Programming Foundations - Web Security (2023)
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 01 - Introduction
    • 01 - The importance of security.mp4 (4.6 MB)
    • 01 - The importance of security.srt (1.6 KB)
    02 - 1. Security Overview
    • 01 - What is security.mp4 (6.7 MB)
    • 01 - What is security.srt (4.4 KB)
    • 02 - Why security matters.mp4 (7.2 MB)
    • 02 - Why security matters.srt (4.5 KB)
    • 03 - What is a hacker.mp4 (9.6 MB)
    • 03 - What is a hacker.srt (7.8 KB)
    • 04 - Threat models.mp4 (8.8 MB)
    • 04 - Threat models.srt (6.4 KB)
    • 05 - Total security is unachievable.mp4 (7.6 MB)
    • 05 - Total security is unachievable.srt (5.2 KB)
    03 - 2. General Security Principles
    • 01 - Least privilege.mp4 (9.7 MB)
    • 01 - Least privilege.srt (6.9 KB)
    • 02 - Simple is more secure.mp4 (7.1 MB)
    • 02 - Simple is more secure.srt (5.3 KB)
    • 03 - Never trust users.mp4 (8.4 MB)
    • 03 - Never trust users.srt (6.4 KB)
    • 04 - Expect the unexpected.mp4 (4.9 MB)
    • 04 - Expect the unexpected.srt (4.4 KB)
    • 05 - Defense in depth.mp4 (8.4 MB)
    • 05 - Defense in depth.srt (6.7 KB)
    • 06 - Resilience.mp4 (12.8 MB)
    • 06 - Resilience.srt (8.9 KB)
    • 07 - Security through obscurity.mp4 (12.1 MB)
    • 07 - Security through obscurity.srt (8.0 KB)
    • 08 - Deny-listing and allow-listing.mp4 (8.1 MB)
    • 08 - Deny-listing and allow-listing.srt (5.6 KB)
    • 09 - Map exposure points and data passageways.mp4 (8.9 MB)
    • 09 - Map exposure points and data passageways.srt (6.7 KB)
    04 - 3. Filter Input, Control Output
    • 01 - Regulate requests.mp4 (9.0 MB)
    • 01 - Regulate requests.srt (6.9 KB)
    • 02 - Validate input.mp4 (8.3 MB)
    • 02 - Validate input.srt (7.5 KB)
    • 03 - Sanitize data.mp4 (15.3 MB)
    • 03 - Sanitize data.srt (11.0 KB)
    • 04 - Label variables.mp4 (2.6 MB)
    • 04 - Label variables.srt (2.4 KB)
    • 05 - Keep code private.mp4 (6.2 MB)
    • 05 - Keep code private.srt (4.6 KB)
    • 06 - Keep credentials private.mp4 (11.2 MB)
    • 06 - Keep credentials private.srt (9.5 KB)
    • 07 - Keep error messages vague.mp4 (5.9 MB)
    • 07 - Keep error messages vague.srt (4.4 KB)
    • 08 - Smart logging.mp4 (8.4 MB)
    • 08 - Smart logging.srt (6.3 KB)
    05 - 4. The Most Common Attacks
    • 01 - Types of credential attacks.mp4 (13.1 MB)
    • 01 - Types of credential attacks.srt (9.6 KB)
    • 02 - Strong passwords.mp4 (11.3 MB)
    • 02 - Strong passwords.srt (7.8 KB)
    • 03 - URL manipulation and Insecure Direct Object Reference (IDOR).mp4 (9.5 MB)
    • 03 - URL manipulation and Insecure Direct Object Reference (IDOR).srt (8.7 KB)
    • 04 - SQL injection.mp4 (12.9 MB)
    • 04 - SQL injection.srt (11.7 KB)
    • 05 - Cross-Site Scripting (XSS).mp4 (14.9 MB)
    • 05 - Cross-Site Scripting (XSS).srt (11.8 KB)
    • 06 - Cross-Site Request Forgery (CSRF).mp4 (11.6 MB)
    • 06 - Cross-Site Request Forgery (CSRF).srt (8.1 KB)
    • 07 - Cross-Site Request protections.mp4 (9.6 MB)
    • 07 - Cross-Site Request protections.srt (7.1 KB)
    • 08 - Cookie visibility and theft.mp4 (11.0 MB)
    • 08 - Cookie visibility and theft.srt (9.1 KB)
    • 09 - Session hijacking.mp4 (13.7 MB)
    • 09 - Session hijacking.srt (10.0 KB)
    • 10 - Session fixation.mp4 (7.4 MB)
    • 10 - Session fixation.srt (6.4 KB)
    • 11 - Remote system execution.mp4 (5.6 MB)
    • 11 - Remote system execution.srt (4.1 KB)
    • 12 - File upload abuse.mp4 (6.1 MB)
    • 12 - File upload abuse.srt (6.0 KB)
    • 13 - Denial of service.mp4 (13.1 MB)
    • 13 - Denial of service.srt (9.4 KB)
    06 - Conclusion
    • 01 - Next steps.mp4 (6.7 MB)
    • 01 - Next steps.srt (4.5 KB)
    • Bonus Resources.txt (0.4 KB)

Description

Programming Foundations: Web Security (2023)



https://DevCourseWeb.com

Released: 08/2023
Duration: 2h 11m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 338 MB
Level: Beginner | Genre: eLearning | Language: English

Security is a paramount concern when you’re developing websites, but what motivates hackers, what are their most common methods of attack, and most importantly, what can you do to foil their efforts? In this course, instructor Kevin Skoglund details the techniques and mindset that you need to craft solutions for these web security challenges. Learn the eight fundamental principles that underlie all security efforts, the importance of filtering input and controlling output, and how to defend against the most common types of attack. This course can help you, as a developer, to secure your clients’ websites, and offers a great introduction for anyone who wants to learn more about web security.

Homepage

https://www.linkedin.com/learning/programming-foundations-web-security-22680062



Download torrent
338.3 MB
seeders:15
leechers:6
Programming Foundations - Web Security (2023)


Trackers

tracker name
udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
µTorrent compatible trackers list

Download torrent
338.3 MB
seeders:15
leechers:6
Programming Foundations - Web Security (2023)


Torrent hash: D48815B9D54AD926CDEB95F794BC4C2E461AAA32