Programming Foundations - Web Security (2023)

Torrent Details


Programming Foundations - Web Security <span style=color:#777>(2023)</span>

NAME
Programming Foundations - Web Security (2023).torrent
CATEGORY
Other
INFOHASH
d48815b9d54ad926cdeb95f794bc4c2e461aaa32
SIZE
338 MB in 75 files
ADDED
Uploaded on 17-08-2023 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

[ DevCourseWeb.com ] Programming Foundations: Web Security (2023)



If You Need More Stuff, kindly Visit and Support Us -->> https://DevCourseWeb.com







Released: 08/2023

Duration: 2h 11m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 338 MB

Level: Beginner | Genre: eLearning | Language: English



Security is a paramount concern when you’re developing websites, but what motivates hackers, what are their most common methods of attack, and most importantly, what can you do to foil their efforts? In this course, instructor Kevin Skoglund details the techniques and mindset that you need to craft solutions for these web security challenges. Learn the eight fundamental principles that underlie all security efforts, the importance of filtering input and controlling output, and how to defend against the most common types of attack. This course can help you, as a developer, to secure your clients’ websites, and offers a great introduction for anyone who wants to learn more about web security.



Homepage



https://www.linkedin.com/learning/programming-foundations-web-security-22680062



If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com



Get More Tutorials and Support Us -->> https://FreeCourseWeb.com



We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...



Image error



Image error

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
~Get Your Files Here !/01 - Introduction/01 - The importance of security.mp44.6 MB
~Get Your Files Here !/01 - Introduction/01 - The importance of security.srt1.6 KB
~Get Your Files Here !/02 - 1. Security Overview/01 - What is security.mp46.7 MB
~Get Your Files Here !/02 - 1. Security Overview/01 - What is security.srt4.4 KB
~Get Your Files Here !/02 - 1. Security Overview/02 - Why security matters.mp47.2 MB
~Get Your Files Here !/02 - 1. Security Overview/02 - Why security matters.srt4.5 KB
~Get Your Files Here !/02 - 1. Security Overview/03 - What is a hacker.mp49.6 MB
~Get Your Files Here !/02 - 1. Security Overview/03 - What is a hacker.srt7.8 KB
~Get Your Files Here !/02 - 1. Security Overview/04 - Threat models.mp48.8 MB
~Get Your Files Here !/02 - 1. Security Overview/04 - Threat models.srt6.4 KB
~Get Your Files Here !/02 - 1. Security Overview/05 - Total security is unachievable.mp47.6 MB
~Get Your Files Here !/02 - 1. Security Overview/05 - Total security is unachievable.srt5.2 KB
~Get Your Files Here !/03 - 2. General Security Principles/01 - Least privilege.mp49.7 MB
~Get Your Files Here !/03 - 2. General Security Principles/01 - Least privilege.srt6.9 KB
~Get Your Files Here !/03 - 2. General Security Principles/02 - Simple is more secure.mp47.1 MB
~Get Your Files Here !/03 - 2. General Security Principles/02 - Simple is more secure.srt5.3 KB
~Get Your Files Here !/03 - 2. General Security Principles/03 - Never trust users.mp48.4 MB
~Get Your Files Here !/03 - 2. General Security Principles/03 - Never trust users.srt6.4 KB
~Get Your Files Here !/03 - 2. General Security Principles/04 - Expect the unexpected.mp44.9 MB
~Get Your Files Here !/03 - 2. General Security Principles/04 - Expect the unexpected.srt4.4 KB
~Get Your Files Here !/03 - 2. General Security Principles/05 - Defense in depth.mp48.4 MB
~Get Your Files Here !/03 - 2. General Security Principles/05 - Defense in depth.srt6.7 KB
~Get Your Files Here !/03 - 2. General Security Principles/06 - Resilience.mp412.8 MB
~Get Your Files Here !/03 - 2. General Security Principles/06 - Resilience.srt8.9 KB
~Get Your Files Here !/03 - 2. General Security Principles/07 - Security through obscurity.mp412.1 MB
~Get Your Files Here !/03 - 2. General Security Principles/07 - Security through obscurity.srt8 KB
~Get Your Files Here !/03 - 2. General Security Principles/08 - Deny-listing and allow-listing.mp48.1 MB
~Get Your Files Here !/03 - 2. General Security Principles/08 - Deny-listing and allow-listing.srt5.6 KB
~Get Your Files Here !/03 - 2. General Security Principles/09 - Map exposure points and data passageways.mp48.9 MB
~Get Your Files Here !/03 - 2. General Security Principles/09 - Map exposure points and data passageways.srt6.7 KB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/01 - Regulate requests.mp49 MB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/01 - Regulate requests.srt6.9 KB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/02 - Validate input.mp48.3 MB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/02 - Validate input.srt7.5 KB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/03 - Sanitize data.mp415.3 MB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/03 - Sanitize data.srt11 KB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/04 - Label variables.mp42.6 MB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/04 - Label variables.srt2.4 KB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/05 - Keep code private.mp46.2 MB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/05 - Keep code private.srt4.6 KB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/06 - Keep credentials private.mp411.2 MB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/06 - Keep credentials private.srt9.5 KB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/07 - Keep error messages vague.mp45.9 MB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/07 - Keep error messages vague.srt4.4 KB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/08 - Smart logging.mp48.4 MB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/08 - Smart logging.srt6.3 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/01 - Types of credential attacks.mp413.1 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/01 - Types of credential attacks.srt9.6 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/02 - Strong passwords.mp411.3 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/02 - Strong passwords.srt7.8 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/03 - URL manipulation and Insecure Direct Object Reference (IDOR).mp49.5 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/03 - URL manipulation and Insecure Direct Object Reference (IDOR).srt8.7 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/04 - SQL injection.mp412.9 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/04 - SQL injection.srt11.7 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/05 - Cross-Site Scripting (XSS).mp414.9 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/05 - Cross-Site Scripting (XSS).srt11.8 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/06 - Cross-Site Request Forgery (CSRF).mp411.6 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/06 - Cross-Site Request Forgery (CSRF).srt8.1 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/07 - Cross-Site Request protections.mp49.6 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/07 - Cross-Site Request protections.srt7.1 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/08 - Cookie visibility and theft.mp411 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/08 - Cookie visibility and theft.srt9.1 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/09 - Session hijacking.mp413.7 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/09 - Session hijacking.srt10 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/10 - Session fixation.mp47.4 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/10 - Session fixation.srt6.4 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/11 - Remote system execution.mp45.6 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/11 - Remote system execution.srt4.1 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/12 - File upload abuse.mp46.1 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/12 - File upload abuse.srt6 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/13 - Denial of service.mp413.1 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/13 - Denial of service.srt9.4 KB
~Get Your Files Here !/06 - Conclusion/01 - Next steps.mp46.7 MB
~Get Your Files Here !/06 - Conclusion/01 - Next steps.srt4.5 KB
~Get Your Files Here !/Bonus Resources.txt386 B

Alternative Torrents for 'Programming Foundations Security'.

There are no alternative torrents found.