TorBT - Torrents and Magnet Links Search Engine

[ DevCourseWeb.com ] Udemy - Secure Coding and Design Best Practices in Java

File Name
Size
Get Bonus Downloads Here.url
182 B
~Get Your Files Here !/1. Course Introduction/1. Introduction to the Course.mp4
16 MB
~Get Your Files Here !/2. On Boarding/1. Introduction to Secure Coding.mp4
8.2 MB
~Get Your Files Here !/2. On Boarding/2. Scope.mp4
3.6 MB
~Get Your Files Here !/2. On Boarding/3. Who Should Buy.mp4
3.8 MB
~Get Your Files Here !/2. On Boarding/4. Resources.html
174 B
~Get Your Files Here !/3. Secure Design/1. What Are Secure Design Principles.mp4
14 MB
~Get Your Files Here !/3. Secure Design/10. Work Factor.mp4
4.9 MB
~Get Your Files Here !/3. Secure Design/11. Compromise Recording.mp4
7.1 MB
~Get Your Files Here !/3. Secure Design/12. Wrok Factor.mp4
7.7 MB
~Get Your Files Here !/3. Secure Design/2. Economy of mechanism.mp4
11 MB
~Get Your Files Here !/3. Secure Design/3. Fail Safe Defaults.mp4
8.1 MB
~Get Your Files Here !/3. Secure Design/4. Complete Mediation.mp4
8.0 MB
~Get Your Files Here !/3. Secure Design/5. Open Design.mp4
4.2 MB
~Get Your Files Here !/3. Secure Design/6. Least Privilege.mp4
3.6 MB
~Get Your Files Here !/3. Secure Design/7. Psychological Acceptability.mp4
8.5 MB
~Get Your Files Here !/3. Secure Design/8. Separation of Privilege.mp4
8.1 MB
~Get Your Files Here !/3. Secure Design/9. Least Common Mechanism.mp4
9.6 MB
~Get Your Files Here !/4. Secure Coding Practices/1. Introduction.mp4
8.2 MB
~Get Your Files Here !/4. Secure Coding Practices/10. Demo Sensitive Data Protection.mp4
22 MB
~Get Your Files Here !/4. Secure Coding Practices/11. Relying on Trusted Components.mp4
5.5 MB
~Get Your Files Here !/4. Secure Coding Practices/12. Relying on Trusted Components Demo Java.mp4
23 MB
~Get Your Files Here !/4. Secure Coding Practices/13. Serialization and Deserialization.mp4
5.6 MB
~Get Your Files Here !/4. Secure Coding Practices/14. Serialization and Deserialization Demo - Java.mp4
44 MB
~Get Your Files Here !/4. Secure Coding Practices/15. Precise Logging And Monitoring.mp4
5.1 MB
~Get Your Files Here !/4. Secure Coding Practices/16. Precise Logging And Monitoring Demo - Java.mp4
12 MB
~Get Your Files Here !/4. Secure Coding Practices/17. Server Side Request Validations.mp4
7.6 MB
~Get Your Files Here !/4. Secure Coding Practices/18. Injection And inclusion.mp4
9.1 MB
~Get Your Files Here !/4. Secure Coding Practices/19. Demo Injection.mp4
49 MB
~Get Your Files Here !/4. Secure Coding Practices/2. Strong Authentication.mp4
4.1 MB
~Get Your Files Here !/4. Secure Coding Practices/20. Other Things to be careful About.mp4
9.1 MB
~Get Your Files Here !/4. Secure Coding Practices/21. Summary.html
3.0 kB
~Get Your Files Here !/4. Secure Coding Practices/3. Strong Authentication Demo.mp4
74 MB
~Get Your Files Here !/4. Secure Coding Practices/4. Strong Authentication Measures.mp4
4.8 MB
~Get Your Files Here !/4. Secure Coding Practices/5. Access Control.mp4
20 MB
~Get Your Files Here !/4. Secure Coding Practices/6. Demo Importance of Secured Access Control.mp4
32 MB
~Get Your Files Here !/4. Secure Coding Practices/7. Secure Configuration.mp4
4.7 MB
~Get Your Files Here !/4. Secure Coding Practices/8. Demo Secure Configuration - Java.mp4
33 MB
~Get Your Files Here !/4. Secure Coding Practices/9. Sensitive Data Protection.mp4
6.1 MB
~Get Your Files Here !/5. Understanding Risks - OWASP-TOP-10/1. OWASP 10.mp4
9.2 MB
~Get Your Files Here !/5. Understanding Risks - OWASP-TOP-10/2. OWASP Link.html
438 B
~Get Your Files Here !/5. Understanding Risks - OWASP-TOP-10/3. OWASP 10 - Demo.mp4
76 MB
~Get Your Files Here !/6. Security Management/1. Setting up Product Development Model and Lifecycle.mp4
12 MB
~Get Your Files Here !/6. Security Management/2. Analysis of written code.mp4
2.1 MB
~Get Your Files Here !/6. Security Management/3. Analysis of written code Helper Tools.html
2.9 kB
~Get Your Files Here !/6. Security Management/4. Corrections in Code or design.mp4
1.6 MB
~Get Your Files Here !/6. Security Management/5. Timely vulnerability checkups and Security Trainings.mp4
2.8 MB
~Get Your Files Here !/6. Security Management/6. OWASP Dependency Check.html
2.1 kB
~Get Your Files Here !/6. Security Management/7. Summary.mp4
2.8 MB
~Get Your Files Here !/7. Course Summary and Thank you/1. Course Summary and Thank you.html
104 B
~Get Your Files Here !/Bonus Resources.txt
386 B