[DesireCourse.Com] Udemy - Angular 7 Security Masterclass (With FREE E-Book)

Torrent Details

[DesireCourse.Com] Udemy - Angular 7 Security Masterclass (with FREE E-Book)[DesireCourse.Com] Udemy - Angular 7 Security Masterclass (with FREE E-Book)

NAME
[DesireCourse.Com] Udemy - Angular 7 Security Masterclass (with FREE E-Book).torrent
CATEGORY
Other
INFOHASH
27ea961f9cca627d7116f3f3348a4b9e4bc4077e
SIZE
1.3 GB in 99 files
ADDED
Uploaded on 14-04-2019 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

Angular 7 Security Masterclass (With FREE E-Book)

Practical Guide to Angular 6 Security – Add Authentication / Authorization (from scratch) to an Angular 6 / Node App

For More Courses Visit: https://desirecourse.com

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
1. Introduction/1. Angular Security Course Helicopter View.mp47.8 MB
1. Introduction/1. Angular Security Course Helicopter View.vtt2.5 KB
1. Introduction/2. The Typescript Jumpstart Ebook.html6 KB
1. Introduction/2.1 Typescript_Jumpstart_Book_Udemy.pdf.pdf757.6 KB
1. Introduction/3. Installing Git, Node, NPM and Choosing an IDE.mp414.5 MB
1. Introduction/3. Installing Git, Node, NPM and Choosing an IDE.vtt5 KB
1. Introduction/4. Installing The Lessons Code - Learn Why Its Essential To Use NPM 5.mp414.8 MB
1. Introduction/4. Installing The Lessons Code - Learn Why Its Essential To Use NPM 5.vtt7 KB
1. Introduction/5. How To Run Node In TypeScript With Hot Reloading.mp48.1 MB
1. Introduction/5. How To Run Node In TypeScript With Hot Reloading.vtt71.9 MB
1. Introduction/6. Guided Tour Of The Sample Application.mp415 MB
1. Introduction/6. Guided Tour Of The Sample Application.vtt7.5 KB
10. Conclusion/1. Other Courses.mp429.4 MB
10. Conclusion/1. Other Courses.vtt2.9 KB
10. Conclusion/2. Bonus Lecture.html4.3 KB
10. Conclusion/3. Conclusion and Key Takeaways.mp4167 MB
10. Conclusion/3. Conclusion and Key Takeaways.vtt10.4 KB
2. Sign Up Service - Initial Client and Server-Side Implementation/1. Client Side Authentication Service - API Design.mp411.2 MB
2. Sign Up Service - Initial Client and Server-Side Implementation/1. Client Side Authentication Service - API Design.vtt5.9 KB
2. Sign Up Service - Initial Client and Server-Side Implementation/2. Client Authentication Service - Design and Implementation.mp422.2 MB
2. Sign Up Service - Initial Client and Server-Side Implementation/2. Client Authentication Service - Design and Implementation.vtt11 KB
2. Sign Up Service - Initial Client and Server-Side Implementation/3. The New Angular HTTP Client - Doing a POST Call To The Server.mp414.8 MB
2. Sign Up Service - Initial Client and Server-Side Implementation/3. The New Angular HTTP Client - Doing a POST Call To The Server.vtt7.2 KB
2. Sign Up Service - Initial Client and Server-Side Implementation/4. User Sign Up Server-Side Implementation in Express.mp421.6 MB
2. Sign Up Service - Initial Client and Server-Side Implementation/4. User Sign Up Server-Side Implementation in Express.vtt10.8 KB
3. Password Storage - Hashing and Salting/1. Introduction To Cryptographic Hashes - A Running Demo.mp414.4 MB
3. Password Storage - Hashing and Salting/1. Introduction To Cryptographic Hashes - A Running Demo.vtt7 KB
3. Password Storage - Hashing and Salting/2. Some Interesting Properties Of Hashing Functions - Validating Passwords.mp413.2 MB
3. Password Storage - Hashing and Salting/2. Some Interesting Properties Of Hashing Functions - Validating Passwords.vtt7.6 KB
3. Password Storage - Hashing and Salting/3. Learn Offline Dictionary Attacks - Why Use Cryptographic Salting.mp417.7 MB
3. Password Storage - Hashing and Salting/3. Learn Offline Dictionary Attacks - Why Use Cryptographic Salting.vtt9.7 KB
3. Password Storage - Hashing and Salting/4. Password Key Derivation Functions and The Node Crypto Module.mp414.4 MB
3. Password Storage - Hashing and Salting/4. Password Key Derivation Functions and The Node Crypto Module.vtt6.7 KB
3. Password Storage - Hashing and Salting/5. Using the Argon 2 Hashing Function In Our Sign Up Backend Service.mp422.6 MB
3. Password Storage - Hashing and Salting/5. Using the Argon 2 Hashing Function In Our Sign Up Backend Service.vtt10.2 KB
3. Password Storage - Hashing and Salting/6. How To Implement a Password Policy.mp413.6 MB
3. Password Storage - Hashing and Salting/6. How To Implement a Password Policy.vtt6.2 KB
3. Password Storage - Hashing and Salting/7. Displaying Client-Side Password Validation Errors - What's Next.mp416.6 MB
3. Password Storage - Hashing and Salting/7. Displaying Client-Side Password Validation Errors - What's Next.vtt7.7 KB
4. User Session Management/1. Switch Branches And User Session Management Section Introduction.mp415.6 MB
4. User Session Management/1. Switch Branches And User Session Management Section Introduction.vtt8.8 KB
4. User Session Management/10. An Ancient Vulnerability - JSON Hijacking, Securing REST Endpoint.mp421.7 MB
4. User Session Management/10. An Ancient Vulnerability - JSON Hijacking, Securing REST Endpoint.vtt11.7 KB
4. User Session Management/11. Implementing Logout - Destroying The User Session.mp420.8 MB
4. User Session Management/11. Implementing Logout - Destroying The User Session.vtt9.7 KB
4. User Session Management/12. User Login - Step-by-Step Implementation.mp417.3 MB
4. User Session Management/12. User Login - Step-by-Step Implementation.vtt9 KB
4. User Session Management/13. Finish Login Functionality and Section Conclusion.mp424.8 MB
4. User Session Management/13. Finish Login Functionality and Section Conclusion.vtt12.3 KB
4. User Session Management/2. Node Util Promisify - How to Convert Callback Based APIs to Promise-based.mp410.9 MB
4. User Session Management/2. Node Util Promisify - How to Convert Callback Based APIs to Promise-based.vtt5.7 KB
4. User Session Management/3. Introduction To Node Async Await - Creating a User Session Id.mp418.6 MB
4. User Session Management/3. Introduction To Node Async Await - Creating a User Session Id.vtt9.9 KB
4. User Session Management/4. Modeling a User Session - Classes Or Interfaces.mp414.5 MB
4. User Session Management/4. Modeling a User Session - Classes Or Interfaces.vtt8.2 KB
4. User Session Management/5. Browser Cookies - How To Use Them For User Session Management.mp420.4 MB
4. User Session Management/5. Browser Cookies - How To Use Them For User Session Management.vtt9.9 KB
4. User Session Management/6. Attack Scenario - User Identity Theft Attack Using A Third-Party Server.mp412.2 MB
4. User Session Management/6. Attack Scenario - User Identity Theft Attack Using A Third-Party Server.vtt6.2 KB
4. User Session Management/7. How To Better Protect The Session Id Using HTTP Only Cookies.mp46.9 MB
4. User Session Management/7. How To Better Protect The Session Id Using HTTP Only Cookies.vtt3.3 KB
4. User Session Management/8. HTTPS Secure Cookies - Running the Angular CLI in HTTPS Mode.mp412.6 MB
4. User Session Management/8. HTTPS Secure Cookies - Running the Angular CLI in HTTPS Mode.vtt6.4 KB
4. User Session Management/9. Client-Side User Session Management - Retrieve User Data From Session.mp425.5 MB
4. User Session Management/9. Client-Side User Session Management - Retrieve User Data From Session.vtt12.6 KB
5. Introduction To JSON Web Tokens/1. JSON Web Tokens - Section Introduction.mp49.5 MB
5. Introduction To JSON Web Tokens/1. JSON Web Tokens - Section Introduction.vtt5.4 KB
5. Introduction To JSON Web Tokens/2. Creating Your First JWT - What Does It Look Like.mp44.8 MB
5. Introduction To JSON Web Tokens/2. Creating Your First JWT - What Does It Look Like.vtt2.7 KB
5. Introduction To JSON Web Tokens/3. JSON Web Tokens In a Nutshell.mp48.9 MB
5. Introduction To JSON Web Tokens/3. JSON Web Tokens In a Nutshell.vtt5.1 KB
5. Introduction To JSON Web Tokens/4. JSON Web Tokens In Detail - The Header and the Payload.mp418.7 MB
5. Introduction To JSON Web Tokens/4. JSON Web Tokens In Detail - The Header and the Payload.vtt8 KB
5. Introduction To JSON Web Tokens/5. JWT Signature With HS256 - How Does It Work Learn What is an HMAC Code.mp421.3 MB
5. Introduction To JSON Web Tokens/5. JWT Signature With HS256 - How Does It Work Learn What is an HMAC Code.vtt11.1 KB
5. Introduction To JSON Web Tokens/6. JWT Signature With RS256 - Learn The Advantages Compared to HS256.mp418.4 MB
5. Introduction To JSON Web Tokens/6. JWT Signature With RS256 - Learn The Advantages Compared to HS256.vtt10.1 KB
5. Introduction To JSON Web Tokens/7. Creating a JWT User Session - Setting Subject and Expiration.mp47.5 MB
5. Introduction To JSON Web Tokens/7. Creating a JWT User Session - Setting Subject and Expiration.vtt3.9 KB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/1. User Sign Up With JWT - Learn How To Combine Cookies and JWTs.mp420.6 MB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/1. User Sign Up With JWT - Learn How To Combine Cookies and JWTs.vtt10.2 KB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/2. Server-Side User Identification Via a Custom Express Middleware.mp421.7 MB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/2. Server-Side User Identification Via a Custom Express Middleware.vtt11.8 KB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/3. User Retrieval Express Middleware - Error Handling With Async Await.mp46.7 MB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/3. User Retrieval Express Middleware - Error Handling With Async Await.vtt4 KB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/4. Finishing The Implementation Of User Identification Middleware.mp413.5 MB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/4. Finishing The Implementation Of User Identification Middleware.vtt7.6 KB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/5. Backend JWT-based Security Using an Express Middleware.mp415.5 MB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/5. Backend JWT-based Security Using an Express Middleware.vtt8.6 KB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/6. JWT-based Authentication - Section Conclusion and What's Next.mp410.3 MB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/6. JWT-based Authentication - Section Conclusion and What's Next.vtt5.4 KB
7. CSRF - Cross Site Request Forgery/1. Understanding CSRF - Step-by-Step Attack Simulation.mp423.9 MB
7. CSRF - Cross Site Request Forgery/1. Understanding CSRF - Step-by-Step Attack Simulation.vtt12.1 KB
7. CSRF - Cross Site Request Forgery/2. CSRF In Detail - Understanding Attack Limitations.mp418.2 MB
7. CSRF - Cross Site Request Forgery/2. CSRF In Detail - Understanding Attack Limitations.vtt9.2 KB
7. CSRF - Cross Site Request Forgery/3. Implementing the CSRF Double Submit Cookie Defense - Server Implementation.mp433.3 MB
7. CSRF - Cross Site Request Forgery/4. How To Defense Our Application Against CSRF - Client And Server Defenses.mp422 MB
7. CSRF - Cross Site Request Forgery/4. How To Defense Our Application Against CSRF - Client And Server Defenses.vtt11.7 KB
8. JWT-based Authentication With Auth0/1. Auth0 Section Introduction - Using JWTs to Delegate Authentication To 3rd Party.mp414.1 MB

Alternative Torrents for 'DesireCourse.Com Udemy Angular Security Masterclass with FREE EBook'.

There are no alternative torrents found.