TorBT - Torrents and Magnet Links Search Engine
Udemy - Software Architecture and Clean Code Design in OOP (11.2024)
- Date: 2026-03-19
- Size: 20 GB
- Files: 398
File Name
Size
01. Introduction/01. Communication plan.mp4
12 MB
01. Introduction/01. Communication plan.vtt
5.5 kB
01. Introduction/02. Unlimited access to 'Learn IT' application for students.mp4
7.6 MB
01. Introduction/02. Unlimited access to 'Learn IT' application for students.vtt
4.1 kB
01. Introduction/03. Tips to Improve Your Course Taking Experience.html
1.9 kB
01. Introduction/external-links/01. Facebook-of-the-Tutor.url
66 B
01. Introduction/external-links/01. Facebook-Page-with-Udemy-Coupons-from-Learn-IT-University.url
69 B
01. Introduction/external-links/01. Instagram-of-the-Tutor.url
68 B
01. Introduction/external-links/01. IT-Bulls-Company-Official-Web-Site.url
47 B
01. Introduction/external-links/01. LinkedIn-IT-Bulls-company-official-page.url
68 B
01. Introduction/external-links/01. LinkedIn-of-the-Tutor.url
70 B
01. Introduction/external-links/01. Patreon-account-of-the-Tutor.url
65 B
01. Introduction/external-links/01. Telegram-Channel-with-Latest-News-coupons-and-important-information.url
122 B
01. Introduction/external-links/02. Learn-IT-application-in-Play-Market.url
110 B
01. Introduction/external-links/02. Page-where-you-can-generate-FREE-bonus-code-for-your-self-to-remove-limits-in-Application.url
79 B
02. SOLID Principles/01. SOLID principles overview & Single Responsibility Principle.mp4
59 MB
02. SOLID Principles/01. SOLID principles overview & Single Responsibility Principle.vtt
9.1 kB
02. SOLID Principles/02. Open Closed Principle.mp4
60 MB
02. SOLID Principles/02. Open Closed Principle.vtt
9.4 kB
02. SOLID Principles/03. Liskov Substitution Principle.mp4
42 MB
02. SOLID Principles/03. Liskov Substitution Principle.vtt
6.1 kB
02. SOLID Principles/04. Interface Segregation Principle.mp4
35 MB
02. SOLID Principles/04. Interface Segregation Principle.vtt
5.8 kB
02. SOLID Principles/05. Dependency Inversion Principle.mp4
52 MB
02. SOLID Principles/05. Dependency Inversion Principle.vtt
7.1 kB
02. SOLID Principles/external-links/01. Source-code-All-examples-from-the-lecture.url
134 B
02. SOLID Principles/external-links/02. Source-code-All-examples-from-the-lecture.url
134 B
02. SOLID Principles/external-links/03. Source-code-All-examples-from-the-lecture.url
134 B
02. SOLID Principles/external-links/04. Source-code-All-examples-from-the-lecture.url
134 B
02. SOLID Principles/external-links/05. Source-code-All-examples-from-the-lecture.url
134 B
03 - PRACTICE Coding exercises to practice SOLID principles/001 Single Responsibility Principle User Registration and Authentication Refactoring Exercise.html
12 kB
03 - PRACTICE Coding exercises to practice SOLID principles/002 Open Closed Principle Shape Refactoring Challenge.html
11 kB
03 - PRACTICE Coding exercises to practice SOLID principles/003 Liskov Substitution Principle Square and Rectangle Refactoring Challenge.html
9.4 kB
03 - PRACTICE Coding exercises to practice SOLID principles/004 Interface Segregation Principle Worker Refactoring Challenge.html
10 kB
03 - PRACTICE Coding exercises to practice SOLID principles/005 Dependency Inversion Principle Car-Engine Refactoring Challenge.html
8.5 kB
04. Object-oriented Architecture, Clean Code Design (Advanced)/001 Single Responsibility Principle User Registration and Authentication Refactoring Exercise.html
12 kB
04. Object-oriented Architecture, Clean Code Design (Advanced)/002 Open Closed Principle Shape Refactoring Challenge.html
11 kB
04. Object-oriented Architecture, Clean Code Design (Advanced)/003 Liskov Substitution Principle Square and Rectangle Refactoring Challenge.html
9.4 kB
04. Object-oriented Architecture, Clean Code Design (Advanced)/004 Interface Segregation Principle Worker Refactoring Challenge.html
10 kB
04. Object-oriented Architecture, Clean Code Design (Advanced)/005 Dependency Inversion Principle Car-Engine Refactoring Challenge.html
8.5 kB
04. Object-oriented Architecture, Clean Code Design (Advanced)/01. Clean Code Architecture, Coupling & Cohesion.mp4
87 MB
04. Object-oriented Architecture, Clean Code Design (Advanced)/01. Clean Code Architecture, Coupling & Cohesion.vtt
26 kB
04. Object-oriented Architecture, Clean Code Design (Advanced)/02. Tell, Don’t Ask Pricniple & Data Structures.mp4
96 MB
04. Object-oriented Architecture, Clean Code Design (Advanced)/02. Tell, Don’t Ask Pricniple & Data Structures.vtt
26 kB
04. Object-oriented Architecture, Clean Code Design (Advanced)/03. Law of Demeter.mp4
40 MB
04. Object-oriented Architecture, Clean Code Design (Advanced)/03. Law of Demeter.vtt
12 kB
04. Object-oriented Architecture, Clean Code Design (Advanced)/04. KISS Principle in OOP.mp4
185 MB
04. Object-oriented Architecture, Clean Code Design (Advanced)/04. KISS Principle in OOP.vtt
30 kB
04. Object-oriented Architecture, Clean Code Design (Advanced)/05. YAGNI Principle in OOP.mp4
165 MB
04. Object-oriented Architecture, Clean Code Design (Advanced)/05. YAGNI Principle in OOP.vtt
28 kB
04. Object-oriented Architecture, Clean Code Design (Advanced)/06. DRY Principle in OOP Part 1.mp4
137 MB
04. Object-oriented Architecture, Clean Code Design (Advanced)/06. DRY Principle in OOP Part 1.vtt
20 kB
04. Object-oriented Architecture, Clean Code Design (Advanced)/07. DRY Principle in OOP Part 2 - Practice.mp4
101 MB
04. Object-oriented Architecture, Clean Code Design (Advanced)/07. DRY Principle in OOP Part 2 - Practice.vtt
13 kB
04. Object-oriented Architecture, Clean Code Design (Advanced)/08. Packaging Pricniples p.1 Cohesion Principles.mp4
72 MB
04. Object-oriented Architecture, Clean Code Design (Advanced)/08. Packaging Pricniples p.1 Cohesion Principles.vtt
30 kB
04. Object-oriented Architecture, Clean Code Design (Advanced)/09. Packaging Pricniples p.2 Coupling Principles and Others.mp4
121 MB
04. Object-oriented Architecture, Clean Code Design (Advanced)/09. Packaging Pricniples p.2 Coupling Principles and Others.vtt
31 kB
04. Object-oriented Architecture, Clean Code Design (Advanced)/external-links/04. Source-code-examples-shown-in-the-lesson.url
131 B
04. Object-oriented Architecture, Clean Code Design (Advanced)/external-links/05. Source-code-examples-shown-in-the-lesson.url
132 B
04. Object-oriented Architecture, Clean Code Design (Advanced)/external-links/07. Source-code-examples-shown-in-the-lesson.url
130 B
05. GoF Design Patterns of Software Architecture in OOP/01. GoF Patterns Overview.mp4
55 MB
05. GoF Design Patterns of Software Architecture in OOP/01. GoF Patterns Overview.vtt
17 kB
05. GoF Design Patterns of Software Architecture in OOP/02. Creational Patterns.mp4
237 MB
05. GoF Design Patterns of Software Architecture in OOP/02. Creational Patterns.vtt
38 kB
05. GoF Design Patterns of Software Architecture in OOP/03. Structural Patterns, p.1.mp4
188 MB
05. GoF Design Patterns of Software Architecture in OOP/03. Structural Patterns, p.1.vtt
36 kB
05. GoF Design Patterns of Software Architecture in OOP/04. Structural Patterns, p.2.mp4
166 MB
05. GoF Design Patterns of Software Architecture in OOP/04. Structural Patterns, p.2.vtt
25 kB
05. GoF Design Patterns of Software Architecture in OOP/05. Behevioral Patterns, p.1.mp4
237 MB
05. GoF Design Patterns of Software Architecture in OOP/05. Behevioral Patterns, p.1.vtt
38 kB
05. GoF Design Patterns of Software Architecture in OOP/06. Behevioral Patterns, p.2.mp4
247 MB
05. GoF Design Patterns of Software Architecture in OOP/06. Behevioral Patterns, p.2.vtt
38 kB
05. GoF Design Patterns of Software Architecture in OOP/07. Behevioral Patterns, p.3.mp4
189 MB
05. GoF Design Patterns of Software Architecture in OOP/07. Behevioral Patterns, p.3.vtt
25 kB
05. GoF Design Patterns of Software Architecture in OOP/external-links/02. Source-code-of-all-examples-from-the-lesson.url
142 B
05. GoF Design Patterns of Software Architecture in OOP/external-links/04. Source-code-of-all-examples-from-the-lesson.url
142 B
05. GoF Design Patterns of Software Architecture in OOP/external-links/05. Source-code-of-all-examples-from-the-lesson.url
142 B
05. GoF Design Patterns of Software Architecture in OOP/external-links/06. Source-code-of-all-examples-from-the-lesson.url
142 B
05. GoF Design Patterns of Software Architecture in OOP/external-links/07. Source-code-of-all-examples-from-the-lesson.url
142 B
06. TDD, BDD & ATTD/01. Test-driven development Theory.mp4
99 MB
06. TDD, BDD & ATTD/01. Test-driven development Theory.vtt
29 kB
06. TDD, BDD & ATTD/02. BDD & ATTD.mp4
66 MB
06. TDD, BDD & ATTD/02. BDD & ATTD.vtt
20 kB
06. TDD, BDD & ATTD/03. TDD, BDD & ATTD - Practice.mp4
73 MB
06. TDD, BDD & ATTD/03. TDD, BDD & ATTD - Practice.vtt
18 kB
07. Databases Architecture from Scratch/01. About this section.html
785 B
07. Databases Architecture from Scratch/02. Databases Overview - Part 1.mp4
120 MB
07. Databases Architecture from Scratch/02. Databases Overview - Part 1.vtt
28 kB
07. Databases Architecture from Scratch/03. Databases Overview - Part 2.mp4
109 MB
07. Databases Architecture from Scratch/03. Databases Overview - Part 2.vtt
26 kB
07. Databases Architecture from Scratch/04. MySQL Overview & Installation (including Workbench Installation).mp4
115 MB
07. Databases Architecture from Scratch/04. MySQL Overview & Installation (including Workbench Installation).vtt
24 kB
07. Databases Architecture from Scratch/05. Relational Databases Basic Concepts.mp4
134 MB
07. Databases Architecture from Scratch/05. Relational Databases Basic Concepts.vtt
30 kB
07. Databases Architecture from Scratch/06. Create Schema & Table Naming, Collation, Engines, Types, Column Properties.mp4
236 MB
07. Databases Architecture from Scratch/06. Create Schema & Table Naming, Collation, Engines, Types, Column Properties.vtt
41 kB
07. Databases Architecture from Scratch/07. Database Modelling & Design Conceptual, Logical and Physical Data Models.mp4
114 MB
07. Databases Architecture from Scratch/07. Database Modelling & Design Conceptual, Logical and Physical Data Models.vtt
28 kB
07. Databases Architecture from Scratch/08. Referential Integrity Foreign Key Constraint & Cascading Operations.mp4
154 MB
07. Databases Architecture from Scratch/08. Referential Integrity Foreign Key Constraint & Cascading Operations.vtt
23 kB
07. Databases Architecture from Scratch/09. Indexes in Databases.mp4
107 MB
07. Databases Architecture from Scratch/09. Indexes in Databases.vtt
26 kB
07. Databases Architecture from Scratch/10. Database Normalization & Denormalization.mp4
174 MB
07. Databases Architecture from Scratch/10. Database Normalization & Denormalization.vtt
36 kB
07. Databases Architecture from Scratch/external-links/04. How-to-Install-MySQL-on-MacOS.url
93 B
07. Databases Architecture from Scratch/external-links/04. Microsoft-MySQL-Installer.url
68 B
08. Web Application Design Patterns/01. DAO (Data Access Object) Design Pattern.mp4
137 MB
08. Web Application Design Patterns/01. DAO (Data Access Object) Design Pattern.vtt
20 kB
08. Web Application Design Patterns/02. MVC Design Pattern.mp4
73 MB
08. Web Application Design Patterns/02. MVC Design Pattern.vtt
16 kB
08. Web Application Design Patterns/03. Layered Architecture.mp4
120 MB
08. Web Application Design Patterns/03. Layered Architecture.vtt
28 kB
08. Web Application Design Patterns/external-links/01. Source-code-example-from-the-lesson.url
126 B
08. Web Application Design Patterns/external-links/02. Source-code-of-Controller.url
197 B
08. Web Application Design Patterns/external-links/02. Source-code-of-Model.url
215 B
08. Web Application Design Patterns/external-links/02. Source-code-of-View.url
168 B
08. Web Application Design Patterns/external-links/03. Source-code-of-application-from-the-lesson-with-layered-architecture.url
89 B
09. ===== Exam DAO, Database, JDBC, SQL ======/01. Exam task review and solution.mp4
188 MB
09. ===== Exam DAO, Database, JDBC, SQL ======/01. Exam task review and solution.vtt
21 kB
09. ===== Exam DAO, Database, JDBC, SQL ======/external-links/01. Homework-description-and-reference-to-the-solution.url
122 B
10. ===== Exam MVC & Layered Architecture =====/01. Task Overview.mp4
203 MB
10. ===== Exam MVC & Layered Architecture =====/01. Task Overview.vtt
24 kB
10. ===== Exam MVC & Layered Architecture =====/02. Solution Overview Part 1.mp4
329 MB
10. ===== Exam MVC & Layered Architecture =====/02. Solution Overview Part 1.vtt
28 kB
10. ===== Exam MVC & Layered Architecture =====/03. Solution Overview Part 2.mp4
201 MB
10. ===== Exam MVC & Layered Architecture =====/03. Solution Overview Part 2.vtt
19 kB
10. ===== Exam MVC & Layered Architecture =====/04. Solution Overview Part 3.mp4
150 MB
10. ===== Exam MVC & Layered Architecture =====/04. Solution Overview Part 3.vtt
11 kB
10. ===== Exam MVC & Layered Architecture =====/external-links/01. Exam-task-description-and-reference-to-the-solution.url
122 B
11. Connection Pooling/01. Connection Pooling DBCP, C3P0, HikariCP & Tomcat Connection Pool with JNDI.mp4
220 MB
11. Connection Pooling/01. Connection Pooling DBCP, C3P0, HikariCP & Tomcat Connection Pool with JNDI.vtt
30 kB
11. Connection Pooling/external-links/01. Documentation-for-attributes-of-connection-pooling-in-Tomcat.url
81 B
11. Connection Pooling/external-links/01. Homework-task-and-source-code-of-the-solution.url
122 B
12. Secure Software Architecture and Secure Coding/01. OWASP Top 10 Overview.mp4
112 MB
12. Secure Software Architecture and Secure Coding/01. OWASP Top 10 Overview.vtt
19 kB
12. Secure Software Architecture and Secure Coding/02. Broken Access Control.mp4
317 MB
12. Secure Software Architecture and Secure Coding/02. Broken Access Control.vtt
38 kB
12. Secure Software Architecture and Secure Coding/03. Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).mp4
86 MB
12. Secure Software Architecture and Secure Coding/03. Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).vtt
14 kB
12. Secure Software Architecture and Secure Coding/04. Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).mp4
100 MB
12. Secure Software Architecture and Secure Coding/04. Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).vtt
20 kB
12. Secure Software Architecture and Secure Coding/05. Cryptography Failures (Examples, Password Encryption, Hashing, Salting).mp4
138 MB
12. Secure Software Architecture and Secure Coding/05. Cryptography Failures (Examples, Password Encryption, Hashing, Salting).vtt
19 kB
12. Secure Software Architecture and Secure Coding/06. Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).mp4
100 MB
12. Secure Software Architecture and Secure Coding/06. Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).vtt
16 kB
12. Secure Software Architecture and Secure Coding/07. Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).mp4
92 MB
12. Secure Software Architecture and Secure Coding/07. Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).vtt
16 kB
12. Secure Software Architecture and Secure Coding/08. Injection (XPath Injection, Log Injection, Input Validation).mp4
74 MB
12. Secure Software Architecture and Secure Coding/08. Injection (XPath Injection, Log Injection, Input Validation).vtt
16 kB
12. Secure Software Architecture and Secure Coding/09. Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).mp4
95 MB
12. Secure Software Architecture and Secure Coding/09. Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).vtt
20 kB
12. Secure Software Architecture and Secure Coding/10. Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).mp4
52 MB
12. Secure Software Architecture and Secure Coding/10. Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).vtt
24 kB
12. Secure Software Architecture and Secure Coding/11. Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).mp4
93 MB
12. Secure Software Architecture and Secure Coding/11. Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).vtt
20 kB
12. Secure Software Architecture and Secure Coding/12. Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).mp4
175 MB
12. Secure Software Architecture and Secure Coding/12. Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).vtt
27 kB
12. Secure Software Architecture and Secure Coding/13. Vulnerable & Outdated Components.mp4
181 MB
12. Secure Software Architecture and Secure Coding/13. Vulnerable & Outdated Components.vtt
23 kB
12. Secure Software Architecture and Secure Coding/14. Identification & Authentication Failures.mp4
192 MB
12. Secure Software Architecture and Secure Coding/14. Identification & Authentication Failures.vtt
33 kB
12. Secure Software Architecture and Secure Coding/15. Software & Data Integrity Failures.mp4
99 MB
12. Secure Software Architecture and Secure Coding/15. Software & Data Integrity Failures.vtt
17 kB
12. Secure Software Architecture and Secure Coding/16. Security Logging & Monitoring Failures.mp4
126 MB
12. Secure Software Architecture and Secure Coding/16. Security Logging & Monitoring Failures.vtt
22 kB
12. Secure Software Architecture and Secure Coding/17. Server-Side Request Forgery (SSRF).mp4
115 MB
12. Secure Software Architecture and Secure Coding/17. Server-Side Request Forgery (SSRF).vtt
23 kB
12. Secure Software Architecture and Secure Coding/18. OWASP API Security Project & OWASP API Security Top 10 2023.html
8.9 kB
12. Secure Software Architecture and Secure Coding/19. Broken Object Level Authorization - Part 1.mp4
152 MB
12. Secure Software Architecture and Secure Coding/19. Broken Object Level Authorization - Part 1.vtt
17 kB
12. Secure Software Architecture and Secure Coding/20. Broken Object Level Authorization - Part 2 (Practice).mp4
62 MB
12. Secure Software Architecture and Secure Coding/20. Broken Object Level Authorization - Part 2 (Practice).vtt
13 kB
12. Secure Software Architecture and Secure Coding/21. Broken Object Level Authorization - Part 3 (Zero-Trust, UUIDs).mp4
199 MB
12. Secure Software Architecture and Secure Coding/21. Broken Object Level Authorization - Part 3 (Zero-Trust, UUIDs).vtt
23 kB
12. Secure Software Architecture and Secure Coding/22. Broken Authentication - Part 1 (Basics, Impact, Types of Attacks).mp4
68 MB
12. Secure Software Architecture and Secure Coding/22. Broken Authentication - Part 1 (Basics, Impact, Types of Attacks).vtt
20 kB
12. Secure Software Architecture and Secure Coding/23. Broken Authentication - Part 2 (Case Studies, OAuth, OpenID).mp4
199 MB
12. Secure Software Architecture and Secure Coding/23. Broken Authentication - Part 2 (Case Studies, OAuth, OpenID).vtt
22 kB
12. Secure Software Architecture and Secure Coding/24. Broken Authentication - P.3 - (Practice, JWT Tokens, Timing Attacks).mp4
253 MB
12. Secure Software Architecture and Secure Coding/24. Broken Authentication - P.3 - (Practice, JWT Tokens, Timing Attacks).vtt
30 kB
12. Secure Software Architecture and Secure Coding/25. Broken Object Property Level Authorization - Part 1.mp4
164 MB
12. Secure Software Architecture and Secure Coding/25. Broken Object Property Level Authorization - Part 1.vtt
23 kB
12. Secure Software Architecture and Secure Coding/26. Broken Object Property Level Authorization - Part 2 (Practice).mp4
158 MB
12. Secure Software Architecture and Secure Coding/26. Broken Object Property Level Authorization - Part 2 (Practice).vtt
18 kB
12. Secure Software Architecture and Secure Coding/27. Unrestricted Resource Consumption - Part 1.mp4
228 MB
12. Secure Software Architecture and Secure Coding/27. Unrestricted Resource Consumption - Part 1.vtt
31 kB
12. Secure Software Architecture and Secure Coding/28. Unrestricted Resource Consumption - Part 2 (Practice).mp4
96 MB
12. Secure Software Architecture and Secure Coding/28. Unrestricted Resource Consumption - Part 2 (Practice).vtt
11 kB
12. Secure Software Architecture and Secure Coding/29. Broken Function Level Authorization - Part 1.mp4
156 MB
12. Secure Software Architecture and Secure Coding/29. Broken Function Level Authorization - Part 1.vtt
22 kB
12. Secure Software Architecture and Secure Coding/30. Broken Function Level Authorization - Part 2 (Practice).mp4
70 MB
12. Secure Software Architecture and Secure Coding/30. Broken Function Level Authorization - Part 2 (Practice).vtt
9.6 kB
12. Secure Software Architecture and Secure Coding/31. Unrestricted Access to Sensitive Business Flows - Part 1.mp4
181 MB
12. Secure Software Architecture and Secure Coding/31. Unrestricted Access to Sensitive Business Flows - Part 1.vtt
23 kB
12. Secure Software Architecture and Secure Coding/32. Unrestricted Access to Sensitive Business Flows - Part 2.mp4
213 MB
12. Secure Software Architecture and Secure Coding/32. Unrestricted Access to Sensitive Business Flows - Part 2.vtt
29 kB
12. Secure Software Architecture and Secure Coding/33. Unrestricted Access to Sensitive Business Flows - Part 3 (Practice).mp4
84 MB
12. Secure Software Architecture and Secure Coding/33. Unrestricted Access to Sensitive Business Flows - Part 3 (Practice).vtt
12 kB
12. Secure Software Architecture and Secure Coding/34. Server Side Request Forgery - SSRF (OWASP 2023 Updates).html
6.0 kB
12. Secure Software Architecture and Secure Coding/35. Security Misconfiguration (OWASP 2023 Updates).html
3.9 kB
12. Secure Software Architecture and Secure Coding/36. Improper Inventory Management - Part 1.mp4
234 MB
12. Secure Software Architecture and Secure Coding/36. Improper Inventory Management - Part 1.vtt
30 kB
12. Secure Software Architecture and Secure Coding/37. Improper Inventory Management - Part 2 (Practice).mp4
86 MB
12. Secure Software Architecture and Secure Coding/37. Improper Inventory Management - Part 2 (Practice).vtt
13 kB
12. Secure Software Architecture and Secure Coding/38. Unsafe Consumption of APIs - Part 1.mp4
142 MB
12. Secure Software Architecture and Secure Coding/38. Unsafe Consumption of APIs - Part 1.vtt
34 kB
12. Secure Software Architecture and Secure Coding/39. Unsafe Consumption of APIs - Part 2 (Practice).mp4
73 MB
12. Secure Software Architecture and Secure Coding/39. Unsafe Consumption of APIs - Part 2 (Practice).vtt
11 kB
12. Secure Software Architecture and Secure Coding/external-links/01. Common-Weakness-Enumeration-CWE-official-website.url
58 B
12. Secure Software Architecture and Secure Coding/external-links/02. Source-code-examples-from-the-lesson.url
178 B
12. Secure Software Architecture and Secure Coding/external-links/04. Source-code-examples-from-the-lesson.url
177 B
12. Secure Software Architecture and Secure Coding/external-links/05. Source-code-examples-from-the-lesson.url
177 B
12. Secure Software Architecture and Secure Coding/external-links/06. Source-code-examples-from-the-lesson.url
184 B
12. Secure Software Architecture and Secure Coding/external-links/07. Source-code-examples-from-the-lesson.url
184 B
12. Secure Software Architecture and Secure Coding/external-links/08. Source-code-examples-from-the-lesson.url
184 B
12. Secure Software Architecture and Secure Coding/external-links/11. NIST-800-123-Guide-to-General-Server-Security.url
103 B
12. Secure Software Architecture and Secure Coding/external-links/11. NIST-800-207-Zero-Trust-Architecture.url
99 B
12. Secure Software Architecture and Secure Coding/external-links/12. NIST-800-123-Guide-to-General-Server-Security.url
103 B
12. Secure Software Architecture and Secure Coding/external-links/12. NIST-800-207-Zero-Trust-Architecture.url
99 B
12. Secure Software Architecture and Secure Coding/external-links/13. Dependency-check-plugin.url
99 B
12. Secure Software Architecture and Secure Coding/external-links/13. pom.xml-from-the-lesson-with-OWASP-plugin.url
109 B
12. Secure Software Architecture and Secure Coding/external-links/16. Computer-Security-Incident-Handling-Guide.url
100 B
12. Secure Software Architecture and Secure Coding/external-links/20. Source-code-examples-from-the-lesson.url
137 B
12. Secure Software Architecture and Secure Coding/external-links/24. Source-code-examples-from-the-lesson.url
137 B
12. Secure Software Architecture and Secure Coding/external-links/26. Source-code-examples-from-the-lesson.url
180 B
12. Secure Software Architecture and Secure Coding/external-links/28. Source-code-examples-from-the-lesson.url
178 B
12. Secure Software Architecture and Secure Coding/external-links/30. Source-code-examples-from-the-lesson.url
179 B
12. Secure Software Architecture and Secure Coding/external-links/33. Source-code-examples-from-the-lesson.url
180 B
12. Secure Software Architecture and Secure Coding/external-links/37. Source-code-examples-from-the-lesson.url
178 B
12. Secure Software Architecture and Secure Coding/external-links/39. Source-code-examples-from-the-lesson.url
178 B
13. Logging in Java/01. Logging in Java Part 1 (Logging theory, Logging Levels, Java Logging Framework).mp4
243 MB
13. Logging in Java/01. Logging in Java Part 1 (Logging theory, Logging Levels, Java Logging Framework).vtt
31 kB
13. Logging in Java/02. Logging in Java Part 2 (Log4J, Logback, SLF4J).mp4
297 MB
13. Logging in Java/02. Logging in Java Part 2 (Log4J, Logback, SLF4J).vtt
31 kB
13. Logging in Java/external-links/01. java.util.logging-package-official-documentation.url
128 B
13. Logging in Java/external-links/01. Source-code-examples-from-the-lesson.url
178 B
13. Logging in Java/external-links/02. Log4J-2-Official-documentation-about-Appenders.url
84 B
13. Logging in Java/external-links/02. Log4J-2-Official-Documentation-about-Layouts.url
82 B
13. Logging in Java/external-links/02. Logback-configuration-documentation.url
74 B
13. Logging in Java/external-links/02. Source-code-examples-from-the-lesson.url
178 B
14. Cybersecurity Comprehensive Security Practices for Developers/01. Introduction to Cybersecurity p.1 - Overview of current cyber threat landscape.mp4
58 MB
14. Cybersecurity Comprehensive Security Practices for Developers/01. Introduction to Cybersecurity p.1 - Overview of current cyber threat landscape.vtt
9.5 kB
14. Cybersecurity Comprehensive Security Practices for Developers/02. Introduction to Cybersecurity p.2 - Case Studies, Threat Analysis Models & More.mp4
168 MB
14. Cybersecurity Comprehensive Security Practices for Developers/02. Introduction to Cybersecurity p.2 - Case Studies, Threat Analysis Models & More.vtt
22 kB
14. Cybersecurity Comprehensive Security Practices for Developers/03. Introduction to Cybersecurity p.3 - Security Controls, SDD, SOC.mp4
220 MB
14. Cybersecurity Comprehensive Security Practices for Developers/03. Introduction to Cybersecurity p.3 - Security Controls, SDD, SOC.vtt
26 kB
14. Cybersecurity Comprehensive Security Practices for Developers/04. General Security Tips Writing Code with Safety in Mind.mp4
139 MB
14. Cybersecurity Comprehensive Security Practices for Developers/04. General Security Tips Writing Code with Safety in Mind.vtt
20 kB
14. Cybersecurity Comprehensive Security Practices for Developers/05. Securing Inputs How to Validate and Sanitize Input Data.mp4
147 MB
14. Cybersecurity Comprehensive Security Practices for Developers/05. Securing Inputs How to Validate and Sanitize Input Data.vtt
25 kB
14. Cybersecurity Comprehensive Security Practices for Developers/06. Safeguarding Outputs Effective Encoding for Secure Systems.mp4
82 MB
14. Cybersecurity Comprehensive Security Practices for Developers/06. Safeguarding Outputs Effective Encoding for Secure Systems.vtt
15 kB
14. Cybersecurity Comprehensive Security Practices for Developers/07. Mastering Authentication Best Practices for Managing User Credentials.mp4
120 MB
14. Cybersecurity Comprehensive Security Practices for Developers/07. Mastering Authentication Best Practices for Managing User Credentials.vtt
30 kB
14. Cybersecurity Comprehensive Security Practices for Developers/08. Securing Sessions Preventing Hijacking and Improving Stability.mp4
233 MB
14. Cybersecurity Comprehensive Security Practices for Developers/08. Securing Sessions Preventing Hijacking and Improving Stability.vtt
26 kB
14. Cybersecurity Comprehensive Security Practices for Developers/09. Locking Down Access Implementing Robust Authorization Mechanisms.mp4
236 MB
14. Cybersecurity Comprehensive Security Practices for Developers/09. Locking Down Access Implementing Robust Authorization Mechanisms.vtt
29 kB
14. Cybersecurity Comprehensive Security Practices for Developers/10. Zero Trust Architecture and Modern Authentication.mp4
257 MB
14. Cybersecurity Comprehensive Security Practices for Developers/10. Zero Trust Architecture and Modern Authentication.vtt
29 kB
14. Cybersecurity Comprehensive Security Practices for Developers/11. Encryption Essentials Protecting Data with Cryptography - Part 1.mp4
148 MB
14. Cybersecurity Comprehensive Security Practices for Developers/11. Encryption Essentials Protecting Data with Cryptography - Part 1.vtt
21 kB
14. Cybersecurity Comprehensive Security Practices for Developers/12. Encryption Essentials Protecting Data with Cryptography - Part 2.mp4
190 MB
14. Cybersecurity Comprehensive Security Practices for Developers/12. Encryption Essentials Protecting Data with Cryptography - Part 2.vtt
22 kB
14. Cybersecurity Comprehensive Security Practices for Developers/13. Defending Data Strategies for Protecting Sensitive Information.mp4
186 MB
14. Cybersecurity Comprehensive Security Practices for Developers/13. Defending Data Strategies for Protecting Sensitive Information.vtt
25 kB
14. Cybersecurity Comprehensive Security Practices for Developers/14. Securing Databases Best Practices for Preventing SQL Injection.mp4
176 MB
14. Cybersecurity Comprehensive Security Practices for Developers/14. Securing Databases Best Practices for Preventing SQL Injection.vtt
25 kB
14. Cybersecurity Comprehensive Security Practices for Developers/15. Safe File Handling Preventing File-Based Vulnerabilities.mp4
216 MB
14. Cybersecurity Comprehensive Security Practices for Developers/15. Safe File Handling Preventing File-Based Vulnerabilities.vtt
28 kB
14. Cybersecurity Comprehensive Security Practices for Developers/16. Protecting Communication Channels Ensuring Secure Transmission of Data.mp4
155 MB
14. Cybersecurity Comprehensive Security Practices for Developers/16. Protecting Communication Channels Ensuring Secure Transmission of Data.vtt
23 kB
14. Cybersecurity Comprehensive Security Practices for Developers/17. Hardening System Configurations Reducing Attack Surface.mp4
200 MB
14. Cybersecurity Comprehensive Security Practices for Developers/17. Hardening System Configurations Reducing Attack Surface.vtt
26 kB
14. Cybersecurity Comprehensive Security Practices for Developers/18. Cloud Security Best Practices.mp4
86 MB
14. Cybersecurity Comprehensive Security Practices for Developers/18. Cloud Security Best Practices.vtt
26 kB
14. Cybersecurity Comprehensive Security Practices for Developers/19. Mobile Application Security.mp4
215 MB
14. Cybersecurity Comprehensive Security Practices for Developers/19. Mobile Application Security.vtt
28 kB
15. ===== EXAM TASK OWASP Top 10, Secure Coding & Logging =====/01. Exam Task Description and Solution (with reference to the source code).html
7.2 kB
16. REST Architecture/01. REST Architecture Overview and Key Principles.mp4
87 MB
16. REST Architecture/01. REST Architecture Overview and Key Principles.vtt
22 kB
16. REST Architecture/02. Naming Convention for RESTful Services.mp4
36 MB
16. REST Architecture/02. Naming Convention for RESTful Services.vtt
18 kB
16. REST Architecture/03. RESTful Service Implementation with Spring MVC.mp4
323 MB
16. REST Architecture/03. RESTful Service Implementation with Spring MVC.vtt
25 kB
16. REST Architecture/04. Review of tools for API testing & Postman Installation.mp4
61 MB
16. REST Architecture/04. Review of tools for API testing & Postman Installation.vtt
15 kB
16. REST Architecture/05. API Testing with Postman.mp4
63 MB
16. REST Architecture/05. API Testing with Postman.vtt
23 kB
16. REST Architecture/external-links/03. Source-code-of-examples-commit-with-changes-.url
131 B
16. REST Architecture/external-links/05. Commit-with-changes.url
131 B
16. REST Architecture/external-links/05. Postman-collections.url
134 B
17. UML Introduction/01. Introduction to UML.mp4
87 MB
17. UML Introduction/01. Introduction to UML.vtt
26 kB
18. Behavioral Diagrams/01. Use Case Diagram.mp4
163 MB
18. Behavioral Diagrams/01. Use Case Diagram.vtt
27 kB
18. Behavioral Diagrams/02. Sequence Diagram.mp4
180 MB
18. Behavioral Diagrams/02. Sequence Diagram.vtt
27 kB
18. Behavioral Diagrams/03. Activity Diagram.mp4
159 MB
18. Behavioral Diagrams/03. Activity Diagram.vtt
25 kB
18. Behavioral Diagrams/04. State Machine Diagram.mp4
64 MB
18. Behavioral Diagrams/04. State Machine Diagram.vtt
27 kB
18. Behavioral Diagrams/05. Communication Diagram (formerly known as Collaboration Diagram).mp4
133 MB
18. Behavioral Diagrams/05. Communication Diagram (formerly known as Collaboration Diagram).vtt
21 kB
18. Behavioral Diagrams/06. Timing Diagram.mp4
151 MB
18. Behavioral Diagrams/06. Timing Diagram.vtt
24 kB
18. Behavioral Diagrams/07. Interaction Overview Diagram.mp4
146 MB
18. Behavioral Diagrams/07. Interaction Overview Diagram.vtt
22 kB
18. Behavioral Diagrams/external-links/01. Diagrams.net-App.url
51 B
18. Behavioral Diagrams/external-links/01. Use-Case-Diagram-from-the-lesson.url
108 B
18. Behavioral Diagrams/external-links/02. Sequence-Diagram-User-Registration.url
108 B
18. Behavioral Diagrams/external-links/03. Activity-Diagram-Order-Processing-Workflow.url
108 B
18. Behavioral Diagrams/external-links/04. State-Machine-Diagram-Online-Shop.url
108 B
18. Behavioral Diagrams/external-links/05. Communication-Diagram-Online-Shop.url
108 B
18. Behavioral Diagrams/external-links/06. Timing-Diagram-Website-Loading.url
108 B
18. Behavioral Diagrams/external-links/07. Interaction-Overview-Diagram-Inspection.url
108 B
19. Structural Diagrams/01. Class Diagram.mp4
274 MB
19. Structural Diagrams/01. Class Diagram.vtt
40 kB
19. Structural Diagrams/02. Object Diagram.mp4
124 MB
19. Structural Diagrams/02. Object Diagram.vtt
19 kB
19. Structural Diagrams/03. Component Diagram.mp4
172 MB
19. Structural Diagrams/03. Component Diagram.vtt
27 kB
19. Structural Diagrams/04. Package Diagram.mp4
94 MB
19. Structural Diagrams/04. Package Diagram.vtt
24 kB
19. Structural Diagrams/05. Deployment Diagram.mp4
165 MB
19. Structural Diagrams/05. Deployment Diagram.vtt
22 kB
19. Structural Diagrams/06. Composite Structure Diagram.mp4
179 MB
19. Structural Diagrams/06. Composite Structure Diagram.vtt
27 kB
19. Structural Diagrams/07. Profile Diagram.mp4
154 MB
19. Structural Diagrams/07. Profile Diagram.vtt
24 kB
19. Structural Diagrams/external-links/01. Class-Diagram-Order-Processing.url
108 B
19. Structural Diagrams/external-links/02. Object-Diagram-Company-Structure.url
108 B
19. Structural Diagrams/external-links/03. Component-Diagram-Order-Processing.url
108 B
19. Structural Diagrams/external-links/04. Package-Diagram-Order-Processing.url
108 B
19. Structural Diagrams/external-links/05. Deployment-Diagram-Example.url
108 B
19. Structural Diagrams/external-links/06. Composite-Structure-Diagram-PC.url
108 B
19. Structural Diagrams/external-links/07. Profile-Diagram-EJB-Profile.url
108 B
20. Metrics & KPIs to Monitor and Control Software Development Process/01. Why this section is in this course and why it is important.html
2.7 kB
20. Metrics & KPIs to Monitor and Control Software Development Process/02. Metric, KPI & OKR.mp4
155 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/02. Metric, KPI & OKR.vtt
26 kB
20. Metrics & KPIs to Monitor and Control Software Development Process/03. RAG Status to Present KPI.html
4.3 kB
20. Metrics & KPIs to Monitor and Control Software Development Process/04. Introduction to Engineering Excellence Metrics & KPIs.mp4
46 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/04. Introduction to Engineering Excellence Metrics & KPIs.vtt
5.6 kB
20. Metrics & KPIs to Monitor and Control Software Development Process/05. Development Metrics & KPIs Tech Debt Ratio & Index, Cyclomatic Complexity.mp4
244 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/05. Development Metrics & KPIs Tech Debt Ratio & Index, Cyclomatic Complexity.vtt
30 kB
20. Metrics & KPIs to Monitor and Control Software Development Process/06. Development Metrics & KPIs Unit Test Related Metrics - Part 1.mp4
120 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/06. Development Metrics & KPIs Unit Test Related Metrics - Part 1.vtt
17 kB
20. Metrics & KPIs to Monitor and Control Software Development Process/07. Development Metrics & KPIs Unit Test Related Metrics - Part 2.mp4
62 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/07. Development Metrics & KPIs Unit Test Related Metrics - Part 2.vtt
25 kB
20. Metrics & KPIs to Monitor and Control Software Development Process/08. Development Metrics & KPIs Duplicate Code & Commented Code Index.mp4
194 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/08. Development Metrics & KPIs Duplicate Code & Commented Code Index.vtt
26 kB
20. Metrics & KPIs to Monitor and Control Software Development Process/09. Development Metrics & KPIs Code Review Feedback Loop Time & Code Reviews.mp4
173 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/09. Development Metrics & KPIs Code Review Feedback Loop Time & Code Reviews.vtt
26 kB
20. Metrics & KPIs to Monitor and Control Software Development Process/10. Development Metrics & KPIs Rules Compliance Index (RCI) & Violations.mp4
204 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/10. Development Metrics & KPIs Rules Compliance Index (RCI) & Violations.vtt
29 kB
20. Metrics & KPIs to Monitor and Control Software Development Process/11. Development Metrics & KPIs Integration Test Coverage & End-to-End Test Coverage.mp4
204 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/11. Development Metrics & KPIs Integration Test Coverage & End-to-End Test Coverage.vtt
27 kB
21. Code Review Fundamentals/01. Introduction to Code Reviews.mp4
124 MB
21. Code Review Fundamentals/01. Introduction to Code Reviews.vtt
15 kB
21. Code Review Fundamentals/02. Basics of Code Review Process.mp4
169 MB
21. Code Review Fundamentals/02. Basics of Code Review Process.vtt
28 kB
22. Tools, Automation, and Industry Best Practices/01. Tools for Code Review and Code Analysis.mp4
175 MB
22. Tools, Automation, and Industry Best Practices/01. Tools for Code Review and Code Analysis.vtt
27 kB
22. Tools, Automation, and Industry Best Practices/02. Part 1 - Checkstyle Adhering Coding Standards.mp4
120 MB
22. Tools, Automation, and Industry Best Practices/02. Part 1 - Checkstyle Adhering Coding Standards.vtt
17 kB
22. Tools, Automation, and Industry Best Practices/03. Part 2 - Checkstyle Adhering Coding Standards.mp4
64 MB
22. Tools, Automation, and Industry Best Practices/03. Part 2 - Checkstyle Adhering Coding Standards.vtt
16 kB
22. Tools, Automation, and Industry Best Practices/04. PMD Static Code Analysis.mp4
207 MB
22. Tools, Automation, and Industry Best Practices/04. PMD Static Code Analysis.vtt
25 kB
22. Tools, Automation, and Industry Best Practices/external-links/02. All-resources-and-links-for-the-lesson.url
122 B
22. Tools, Automation, and Industry Best Practices/external-links/03. All-resources-and-links-for-the-lesson.url
122 B
22. Tools, Automation, and Industry Best Practices/external-links/04. All-resources-and-links-for-the-lesson.url
122 B
23. Advanced Code Review Strategies/01. Code Review Guidelines & Contribution Policy.mp4
200 MB
23. Advanced Code Review Strategies/01. Code Review Guidelines & Contribution Policy.vtt
28 kB
23. Advanced Code Review Strategies/02. Coding Standards, Code Quality & Consistency.mp4
185 MB
23. Advanced Code Review Strategies/02. Coding Standards, Code Quality & Consistency.vtt
29 kB
23. Advanced Code Review Strategies/03. Provide Feedback like a Pro.mp4
138 MB
23. Advanced Code Review Strategies/03. Provide Feedback like a Pro.vtt
22 kB
23. Advanced Code Review Strategies/04. Security Considerations During Code Review.mp4
50 MB
23. Advanced Code Review Strategies/04. Security Considerations During Code Review.vtt
18 kB
23. Advanced Code Review Strategies/05. Scalability Principles in Code.mp4
110 MB
23. Advanced Code Review Strategies/05. Scalability Principles in Code.vtt
16 kB
23. Advanced Code Review Strategies/external-links/01. All-documents-shared-in-the-lesson.url
110 B
23. Advanced Code Review Strategies/external-links/02. Coding-Standards-and-Guidelines.url
108 B
24. Bonus section/01. Bonus lesson.mp4
11 MB
24. Bonus section/01. Bonus lesson.vtt
3.7 kB
24. Bonus section/external-links/01. Facebook-Andrii-Piatakha.url
66 B
24. Bonus section/external-links/01. Facebook-Page-with-Udemy-Coupons-from-Learn-IT-University.url
69 B
24. Bonus section/external-links/01. Free-book-about-AI-by-Andrii-Piatakha-sci-fi-.url
68 B
24. Bonus section/external-links/01. Instagram-Andrii-Piatakha.url
68 B
24. Bonus section/external-links/01. IT-Bulls-Company-Official-Web-Site.url
46 B
24. Bonus section/external-links/01. Java-Course-From-zero-to-first-job.url
128 B
24. Bonus section/external-links/01. LinkedIn-Andrii-PIatakha.url
70 B
24. Bonus section/external-links/01. LinkedIn-IT-Bulls-company-official-page.url
68 B
24. Bonus section/external-links/01. Public-profile-of-Tutor-with-list-of-all-courses-Andrii-Piatakha.url
69 B
24. Bonus section/external-links/01. Support-me-on-Patreon-by-getting-access-to-EXCLUSIVE-content.url
65 B
24. Bonus section/external-links/01. Telegram-Channel-with-Latest-News-and-important-information.url
122 B