FILENAME | SIZE |  | 1. Introduction/1. Angular Security Course Helicopter View.mp4 | 7.8 MB |
 | 1. Introduction/1. Angular Security Course Helicopter View.vtt | 2.5 KB |
 | 1. Introduction/2. The Typescript Jumpstart Ebook.html | 6 KB |
 | 1. Introduction/2.1 Typescript_Jumpstart_Book_Udemy.pdf.pdf | 757.6 KB |
 | 1. Introduction/3. Installing Git, Node, NPM and Choosing an IDE.mp4 | 14.5 MB |
 | 1. Introduction/3. Installing Git, Node, NPM and Choosing an IDE.vtt | 5 KB |
 | 1. Introduction/4. Installing The Lessons Code - Learn Why Its Essential To Use NPM 5.mp4 | 14.8 MB |
 | 1. Introduction/4. Installing The Lessons Code - Learn Why Its Essential To Use NPM 5.vtt | 7 KB |
 | 1. Introduction/5. How To Run Node In TypeScript With Hot Reloading.mp4 | 8.1 MB |
 | 1. Introduction/5. How To Run Node In TypeScript With Hot Reloading.vtt | 71.9 MB |
 | 1. Introduction/6. Guided Tour Of The Sample Application.mp4 | 15 MB |
 | 1. Introduction/6. Guided Tour Of The Sample Application.vtt | 7.5 KB |
 | 10. Conclusion/1. Other Courses.mp4 | 29.4 MB |
 | 10. Conclusion/1. Other Courses.vtt | 2.9 KB |
 | 10. Conclusion/2. Bonus Lecture.html | 4.3 KB |
 | 10. Conclusion/3. Conclusion and Key Takeaways.mp4 | 167 MB |
 | 10. Conclusion/3. Conclusion and Key Takeaways.vtt | 10.4 KB |
 | 2. Sign Up Service - Initial Client and Server-Side Implementation/1. Client Side Authentication Service - API Design.mp4 | 11.2 MB |
 | 2. Sign Up Service - Initial Client and Server-Side Implementation/1. Client Side Authentication Service - API Design.vtt | 5.9 KB |
 | 2. Sign Up Service - Initial Client and Server-Side Implementation/2. Client Authentication Service - Design and Implementation.mp4 | 22.2 MB |
 | 2. Sign Up Service - Initial Client and Server-Side Implementation/2. Client Authentication Service - Design and Implementation.vtt | 11 KB |
 | 2. Sign Up Service - Initial Client and Server-Side Implementation/3. The New Angular HTTP Client - Doing a POST Call To The Server.mp4 | 14.8 MB |
 | 2. Sign Up Service - Initial Client and Server-Side Implementation/3. The New Angular HTTP Client - Doing a POST Call To The Server.vtt | 7.2 KB |
 | 2. Sign Up Service - Initial Client and Server-Side Implementation/4. User Sign Up Server-Side Implementation in Express.mp4 | 21.6 MB |
 | 2. Sign Up Service - Initial Client and Server-Side Implementation/4. User Sign Up Server-Side Implementation in Express.vtt | 10.8 KB |
 | 3. Password Storage - Hashing and Salting/1. Introduction To Cryptographic Hashes - A Running Demo.mp4 | 14.4 MB |
 | 3. Password Storage - Hashing and Salting/1. Introduction To Cryptographic Hashes - A Running Demo.vtt | 7 KB |
 | 3. Password Storage - Hashing and Salting/2. Some Interesting Properties Of Hashing Functions - Validating Passwords.mp4 | 13.2 MB |
 | 3. Password Storage - Hashing and Salting/2. Some Interesting Properties Of Hashing Functions - Validating Passwords.vtt | 7.6 KB |
 | 3. Password Storage - Hashing and Salting/3. Learn Offline Dictionary Attacks - Why Use Cryptographic Salting.mp4 | 17.7 MB |
 | 3. Password Storage - Hashing and Salting/3. Learn Offline Dictionary Attacks - Why Use Cryptographic Salting.vtt | 9.7 KB |
 | 3. Password Storage - Hashing and Salting/4. Password Key Derivation Functions and The Node Crypto Module.mp4 | 14.4 MB |
 | 3. Password Storage - Hashing and Salting/4. Password Key Derivation Functions and The Node Crypto Module.vtt | 6.7 KB |
 | 3. Password Storage - Hashing and Salting/5. Using the Argon 2 Hashing Function In Our Sign Up Backend Service.mp4 | 22.6 MB |
 | 3. Password Storage - Hashing and Salting/5. Using the Argon 2 Hashing Function In Our Sign Up Backend Service.vtt | 10.2 KB |
 | 3. Password Storage - Hashing and Salting/6. How To Implement a Password Policy.mp4 | 13.6 MB |
 | 3. Password Storage - Hashing and Salting/6. How To Implement a Password Policy.vtt | 6.2 KB |
 | 3. Password Storage - Hashing and Salting/7. Displaying Client-Side Password Validation Errors - What's Next.mp4 | 16.6 MB |
 | 3. Password Storage - Hashing and Salting/7. Displaying Client-Side Password Validation Errors - What's Next.vtt | 7.7 KB |
 | 4. User Session Management/1. Switch Branches And User Session Management Section Introduction.mp4 | 15.6 MB |
 | 4. User Session Management/1. Switch Branches And User Session Management Section Introduction.vtt | 8.8 KB |
 | 4. User Session Management/10. An Ancient Vulnerability - JSON Hijacking, Securing REST Endpoint.mp4 | 21.7 MB |
 | 4. User Session Management/10. An Ancient Vulnerability - JSON Hijacking, Securing REST Endpoint.vtt | 11.7 KB |
 | 4. User Session Management/11. Implementing Logout - Destroying The User Session.mp4 | 20.8 MB |
 | 4. User Session Management/11. Implementing Logout - Destroying The User Session.vtt | 9.7 KB |
 | 4. User Session Management/12. User Login - Step-by-Step Implementation.mp4 | 17.3 MB |
 | 4. User Session Management/12. User Login - Step-by-Step Implementation.vtt | 9 KB |
 | 4. User Session Management/13. Finish Login Functionality and Section Conclusion.mp4 | 24.8 MB |
 | 4. User Session Management/13. Finish Login Functionality and Section Conclusion.vtt | 12.3 KB |
 | 4. User Session Management/2. Node Util Promisify - How to Convert Callback Based APIs to Promise-based.mp4 | 10.9 MB |
 | 4. User Session Management/2. Node Util Promisify - How to Convert Callback Based APIs to Promise-based.vtt | 5.7 KB |
 | 4. User Session Management/3. Introduction To Node Async Await - Creating a User Session Id.mp4 | 18.6 MB |
 | 4. User Session Management/3. Introduction To Node Async Await - Creating a User Session Id.vtt | 9.9 KB |
 | 4. User Session Management/4. Modeling a User Session - Classes Or Interfaces.mp4 | 14.5 MB |
 | 4. User Session Management/4. Modeling a User Session - Classes Or Interfaces.vtt | 8.2 KB |
 | 4. User Session Management/5. Browser Cookies - How To Use Them For User Session Management.mp4 | 20.4 MB |
 | 4. User Session Management/5. Browser Cookies - How To Use Them For User Session Management.vtt | 9.9 KB |
 | 4. User Session Management/6. Attack Scenario - User Identity Theft Attack Using A Third-Party Server.mp4 | 12.2 MB |
 | 4. User Session Management/6. Attack Scenario - User Identity Theft Attack Using A Third-Party Server.vtt | 6.2 KB |
 | 4. User Session Management/7. How To Better Protect The Session Id Using HTTP Only Cookies.mp4 | 6.9 MB |
 | 4. User Session Management/7. How To Better Protect The Session Id Using HTTP Only Cookies.vtt | 3.3 KB |
 | 4. User Session Management/8. HTTPS Secure Cookies - Running the Angular CLI in HTTPS Mode.mp4 | 12.6 MB |
 | 4. User Session Management/8. HTTPS Secure Cookies - Running the Angular CLI in HTTPS Mode.vtt | 6.4 KB |
 | 4. User Session Management/9. Client-Side User Session Management - Retrieve User Data From Session.mp4 | 25.5 MB |
 | 4. User Session Management/9. Client-Side User Session Management - Retrieve User Data From Session.vtt | 12.6 KB |
 | 5. Introduction To JSON Web Tokens/1. JSON Web Tokens - Section Introduction.mp4 | 9.5 MB |
 | 5. Introduction To JSON Web Tokens/1. JSON Web Tokens - Section Introduction.vtt | 5.4 KB |
 | 5. Introduction To JSON Web Tokens/2. Creating Your First JWT - What Does It Look Like.mp4 | 4.8 MB |
 | 5. Introduction To JSON Web Tokens/2. Creating Your First JWT - What Does It Look Like.vtt | 2.7 KB |
 | 5. Introduction To JSON Web Tokens/3. JSON Web Tokens In a Nutshell.mp4 | 8.9 MB |
 | 5. Introduction To JSON Web Tokens/3. JSON Web Tokens In a Nutshell.vtt | 5.1 KB |
 | 5. Introduction To JSON Web Tokens/4. JSON Web Tokens In Detail - The Header and the Payload.mp4 | 18.7 MB |
 | 5. Introduction To JSON Web Tokens/4. JSON Web Tokens In Detail - The Header and the Payload.vtt | 8 KB |
 | 5. Introduction To JSON Web Tokens/5. JWT Signature With HS256 - How Does It Work Learn What is an HMAC Code.mp4 | 21.3 MB |
 | 5. Introduction To JSON Web Tokens/5. JWT Signature With HS256 - How Does It Work Learn What is an HMAC Code.vtt | 11.1 KB |
 | 5. Introduction To JSON Web Tokens/6. JWT Signature With RS256 - Learn The Advantages Compared to HS256.mp4 | 18.4 MB |
 | 5. Introduction To JSON Web Tokens/6. JWT Signature With RS256 - Learn The Advantages Compared to HS256.vtt | 10.1 KB |
 | 5. Introduction To JSON Web Tokens/7. Creating a JWT User Session - Setting Subject and Expiration.mp4 | 7.5 MB |
 | 5. Introduction To JSON Web Tokens/7. Creating a JWT User Session - Setting Subject and Expiration.vtt | 3.9 KB |
 | 6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/1. User Sign Up With JWT - Learn How To Combine Cookies and JWTs.mp4 | 20.6 MB |
 | 6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/1. User Sign Up With JWT - Learn How To Combine Cookies and JWTs.vtt | 10.2 KB |
 | 6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/2. Server-Side User Identification Via a Custom Express Middleware.mp4 | 21.7 MB |
 | 6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/2. Server-Side User Identification Via a Custom Express Middleware.vtt | 11.8 KB |
 | 6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/3. User Retrieval Express Middleware - Error Handling With Async Await.mp4 | 6.7 MB |
 | 6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/3. User Retrieval Express Middleware - Error Handling With Async Await.vtt | 4 KB |
 | 6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/4. Finishing The Implementation Of User Identification Middleware.mp4 | 13.5 MB |
 | 6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/4. Finishing The Implementation Of User Identification Middleware.vtt | 7.6 KB |
 | 6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/5. Backend JWT-based Security Using an Express Middleware.mp4 | 15.5 MB |
 | 6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/5. Backend JWT-based Security Using an Express Middleware.vtt | 8.6 KB |
 | 6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/6. JWT-based Authentication - Section Conclusion and What's Next.mp4 | 10.3 MB |
 | 6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/6. JWT-based Authentication - Section Conclusion and What's Next.vtt | 5.4 KB |
 | 7. CSRF - Cross Site Request Forgery/1. Understanding CSRF - Step-by-Step Attack Simulation.mp4 | 23.9 MB |
 | 7. CSRF - Cross Site Request Forgery/1. Understanding CSRF - Step-by-Step Attack Simulation.vtt | 12.1 KB |
 | 7. CSRF - Cross Site Request Forgery/2. CSRF In Detail - Understanding Attack Limitations.mp4 | 18.2 MB |
 | 7. CSRF - Cross Site Request Forgery/2. CSRF In Detail - Understanding Attack Limitations.vtt | 9.2 KB |
 | 7. CSRF - Cross Site Request Forgery/3. Implementing the CSRF Double Submit Cookie Defense - Server Implementation.mp4 | 33.3 MB |
 | 7. CSRF - Cross Site Request Forgery/4. How To Defense Our Application Against CSRF - Client And Server Defenses.mp4 | 22 MB |
 | 7. CSRF - Cross Site Request Forgery/4. How To Defense Our Application Against CSRF - Client And Server Defenses.vtt | 11.7 KB |
 | 8. JWT-based Authentication With Auth0/1. Auth0 Section Introduction - Using JWTs to Delegate Authentication To 3rd Party.mp4 | 14.1 MB |