![]() |
Udemy Secure coding in Java with Web Application Examples - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Udemy Secure coding in Java with Web Application Examples (/Thread-Udemy-Secure-coding-in-Java-with-Web-Application-Examples) |
Udemy Secure coding in Java with Web Application Examples - AD-TEAM - 08-31-2024 ![]() 4.5 GB | 00:35:21 | mp4 | 1920X1080 | 16:9 Genre:eLearning |Language:English
Files Included :
1 - Communication plan (75.41 MB) 2 - Unlimited access to Learn IT application for students (66.13 MB) 19 - Software Data Integrity Failures (137.11 MB) 20 - Security Logging Monitoring Failures (167.57 MB) 21 - Logging in Java Part 1 Logging theory Logging Levels Java Logging Framework (372.47 MB) 22 - Logging in Java Part 2 Log4J Logback SLF4J (434.12 MB) 23 - ServerSide Request Forgery SSRF (163.02 MB) 25 - API12023 Broken Object Level Authorization Part 1 (203.23 MB) 26 - API12023 Broken Object Level Authorization Part 2 Practice (93.76 MB) 27 - API12023 Broken Object Level Authorization Part 3 ZeroTrust UUIDs (260.55 MB) 29 - Bonus Lesson (47.06 MB) 5 - OWASP Top 10 Overview (145.76 MB) 6 - Broken Access Control (459.29 MB) 7 - Cryptography Failures Theory Sensitive Data Data Breach Types of Failures (115.84 MB) 8 - Cryptography Failures Practical Examples SQL Injections TLSSSL HTTPS (90.15 MB) 9 - Cryptography Failures Examples Password Encryption Hashing Salting (207.97 MB) 10 - Injection Overview Fuzzing CWEs Impact Injection Types Command Injection (147.9 MB) 11 - Injection Cross Site Scripting Types of XSS SQL JPA NoSQL Injections (145.81 MB) 12 - Injection XPath Injection Log Injection Input Validation (103.81 MB) 13 - Insecure Design Overivew CWEs Shift Left Security Threat Modeling Manifesto (136.63 MB) 14 - Insecure Design Secure Design Process Security Controls Metrics Examples (149.97 MB) 15 - Security Misconfiguration Overview CWEs Types Reallife attacks (127.67 MB) 16 - Security Misconfiguration Hardening Zero Trust Defense in Depth Practice (259.03 MB) 17 - Vulnerable Outdated Components (240.75 MB) 18 - Identification Authentication Failures (257.89 MB)
Screenshot
![]() |