17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Udemy - Secure Coding In Java With Web Application Examples
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Learn the most common vulnerabilities and how to avoid them with Online Shop Web Application Example in Java
What you'll learn
Secure Coding Practices with Java Examples
How to produce secure code for Java Web Application
Security Guidelines and Standards
The most common security threats and vulnerabilities
Threat modelling
How to build efficient process in your team to create Secure Design
OWASP Top 10 2021
OWASP Top 10 2017
OWASP API Security Guidelines
Practical tips and trics
Real-life examples of vulnerabilities and prevention of vulnerabilities
Requirements
Basic understanding of how Web works
Knowledge of one of the programming languages for web development
Description
From this course, you can learn Secure Coding in Java.
If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com
Get More Tutorials and Support Us -->> https://FreeCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. Introduction/1. Communication plan.mp4
49.1 MB
~Get Your Files Here !/1. Introduction/1. Communication plan.srt
6.2 KB
~Get Your Files Here !/1. Introduction/1.1 Facebook of the Tutor.html
101 B
~Get Your Files Here !/1. Introduction/1.10 Youtube channel with free lessons and blog.html
94 B
~Get Your Files Here !/1. Introduction/1.2 Facebook Page with Udemy Coupons from Learn IT University.html
104 B
~Get Your Files Here !/1. Introduction/1.3 Instagram of the Tutor.html
103 B
~Get Your Files Here !/1. Introduction/1.4 IT-Bulls Company Official Website.html
82 B
~Get Your Files Here !/1. Introduction/1.5 Learn IT University Website.html
93 B
~Get Your Files Here !/1. Introduction/1.6 LinkedIn of the Tutor.html
105 B
~Get Your Files Here !/1. Introduction/1.7 LinkedIn IT-Bulls company - official page.html
103 B
~Get Your Files Here !/1. Introduction/1.8 Patreon account of the Tutor.html
100 B
~Get Your Files Here !/1. Introduction/1.9 Telegram Channel with Latest News, coupons and important information.html
157 B
~Get Your Files Here !/1. Introduction/2. Unlimited access to 'Learn IT' application for students.mp4
44.5 MB
~Get Your Files Here !/1. Introduction/2. Unlimited access to 'Learn IT' application for students.srt
4.5 KB
~Get Your Files Here !/1. Introduction/2.1 Learn IT application in Play Market.html
145 B
~Get Your Files Here !/1. Introduction/2.2 Page where you can generate FREE bonus code for your self to remove limits in Application.html
114 B
~Get Your Files Here !/10. A082021-Software and Data Integrity Failures/1. Software & Data Integrity Failures.mp4
104.2 MB
~Get Your Files Here !/10. A082021-Software and Data Integrity Failures/1. Software & Data Integrity Failures.srt
19.1 KB
~Get Your Files Here !/11. A092021-Security Logging and Monitoring Failures/1. Security Logging & Monitoring Failures.mp4
135.1 MB
~Get Your Files Here !/11. A092021-Security Logging and Monitoring Failures/1. Security Logging & Monitoring Failures.srt
25.9 KB
~Get Your Files Here !/11. A092021-Security Logging and Monitoring Failures/1.1 Computer Security Incident Handling Guide.html
135 B
~Get Your Files Here !/12. A102021-Server-Side Request Forgery/1. Server-Side Request Forgery (SSRF).mp4
123 MB
~Get Your Files Here !/12. A102021-Server-Side Request Forgery/1. Server-Side Request Forgery (SSRF).srt
26.6 KB
~Get Your Files Here !/13. Bonus Section/1. Bonus Lesson.mp4
37.1 MB
~Get Your Files Here !/13. Bonus Section/1. Bonus Lesson.srt
4.3 KB
~Get Your Files Here !/13. Bonus Section/1.1 Facebook Page with Udemy Coupons from Learn IT University.html
104 B
~Get Your Files Here !/13. Bonus Section/1.10 Public profile of Tutor with list of all courses - Andrii Piatakha.html
104 B
~Get Your Files Here !/13. Bonus Section/1.11 Support me on Patreon by getting access to EXCLUSIVE content.html
100 B
~Get Your Files Here !/13. Bonus Section/1.12 Telegram Channel with Latest News and important information.html
157 B
~Get Your Files Here !/13. Bonus Section/1.13 Youtube channel with free lessons and blog.html
94 B
~Get Your Files Here !/13. Bonus Section/1.2 Facebook Andrii Piatakha.html
101 B
~Get Your Files Here !/13. Bonus Section/1.3 Free book about AI by Andrii Piatakha (sci-fi).html
103 B
~Get Your Files Here !/13. Bonus Section/1.4 Instagram Andrii Piatakha.html
103 B
~Get Your Files Here !/13. Bonus Section/1.5 IT-Bulls Company Official Website.html
81 B
~Get Your Files Here !/13. Bonus Section/1.6 Java Course From zero to first job.html
163 B
~Get Your Files Here !/13. Bonus Section/1.7 Learn IT University Official Website.html
93 B
~Get Your Files Here !/13. Bonus Section/1.8 LinkedIn Andrii PIatakha.html
105 B
~Get Your Files Here !/13. Bonus Section/1.9 LinkedIn IT-Bulls company - official page.html
103 B
~Get Your Files Here !/2. OWASP Top 10/1. OWASP Top 10 Overview.mp4
119.2 MB
~Get Your Files Here !/2. OWASP Top 10/1. OWASP Top 10 Overview.srt
22.4 KB
~Get Your Files Here !/2. OWASP Top 10/1.1 Common Weakness Enumeration (CWE) - official website.html
93 B
~Get Your Files Here !/3. A012021-Broken Access Control/1. Broken Access Control.mp4
310.9 MB
~Get Your Files Here !/3. A012021-Broken Access Control/1. Broken Access Control.srt
43.8 KB
~Get Your Files Here !/3. A012021-Broken Access Control/1.1 Source code examples from the lesson.html
213 B
~Get Your Files Here !/4. A022021-Cryptographic Failures/1. Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).mp4
93.6 MB
~Get Your Files Here !/4. A022021-Cryptographic Failures/1. Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).srt
15.7 KB
~Get Your Files Here !/4. A022021-Cryptographic Failures/2. Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).mp4
137.7 MB
~Get Your Files Here !/4. A022021-Cryptographic Failures/2. Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).srt
23.3 KB
~Get Your Files Here !/4. A022021-Cryptographic Failures/2.1 Source code examples from the lesson.html
212 B
~Get Your Files Here !/4. A022021-Cryptographic Failures/3. Cryptography Failures (Examples, Password Encryption, Hashing, Salting).mp4
154.2 MB
~Get Your Files Here !/4. A022021-Cryptographic Failures/3. Cryptography Failures (Examples, Password Encryption, Hashing, Salting).srt
21.5 KB
~Get Your Files Here !/4. A022021-Cryptographic Failures/3.1 Source code examples from the lesson.html
212 B
~Get Your Files Here !/5. A032021-Injection/1. Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).mp4
111.7 MB
~Get Your Files Here !/5. A032021-Injection/1. Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).srt
18.9 KB
~Get Your Files Here !/5. A032021-Injection/1.1 Source code examples from the lesson.html
219 B
~Get Your Files Here !/5. A032021-Injection/2. Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).mp4
126.6 MB
~Get Your Files Here !/5. A032021-Injection/2. Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).srt
18.7 KB
~Get Your Files Here !/5. A032021-Injection/2.1 Source code examples from the lesson.html
219 B
~Get Your Files Here !/5. A032021-Injection/3. Injection (XPath Injection, Log Injection, Input Validation).mp4
88.7 MB
~Get Your Files Here !/5. A032021-Injection/3. Injection (XPath Injection, Log Injection, Input Validation).srt
18.4 KB
~Get Your Files Here !/5. A032021-Injection/3.1 Source code examples from the lesson.html
219 B
~Get Your Files Here !/6. A042021-Insecure Design/1. Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).mp4
102.2 MB
~Get Your Files Here !/6. A042021-Insecure Design/1. Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).srt
23.5 KB
~Get Your Files Here !/6. A042021-Insecure Design/2. Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).mp4
129.1 MB
~Get Your Files Here !/6. A042021-Insecure Design/2. Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).srt
28.6 KB
~Get Your Files Here !/7. A052021-Security Misconfiguration/1. Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).mp4
98.5 MB
~Get Your Files Here !/7. A052021-Security Misconfiguration/1. Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).srt
22.5 KB
~Get Your Files Here !/7. A052021-Security Misconfiguration/1.1 NIST 800-123 - Guide to General Server Security.html
138 B
~Get Your Files Here !/7. A052021-Security Misconfiguration/1.2 NIST 800-207 - Zero Trust Architecture.html
134 B
~Get Your Files Here !/7. A052021-Security Misconfiguration/2. Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).mp4
192.6 MB
~Get Your Files Here !/7. A052021-Security Misconfiguration/2. Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).srt
32.1 KB
~Get Your Files Here !/7. A052021-Security Misconfiguration/2.1 NIST 800-123 - Guide to General Server Security.html
138 B
~Get Your Files Here !/7. A052021-Security Misconfiguration/2.2 NIST 800-207 - Zero Trust Architecture.html
134 B
~Get Your Files Here !/8. A062021-Vulnerable and Outdated Components/1. Vulnerable & Outdated Components.mp4
178.8 MB
~Get Your Files Here !/8. A062021-Vulnerable and Outdated Components/1. Vulnerable & Outdated Components.srt
26.9 KB
~Get Your Files Here !/8. A062021-Vulnerable and Outdated Components/1.1 Dependency check plugin.html
134 B
~Get Your Files Here !/8. A062021-Vulnerable and Outdated Components/1.2 pom.xml from the lesson with OWASP plugin.html
144 B
~Get Your Files Here !/9. A072021-Identification and Authentication Failures/1. Identification & Authentication Failures.mp4
202.9 MB
~Get Your Files Here !/9. A072021-Identification and Authentication Failures/1. Identification & Authentication Failures.srt