17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Programming Foundations - Web Security (2023)
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Level: Beginner | Genre: eLearning | Language: English
Security is a paramount concern when you’re developing websites, but what motivates hackers, what are their most common methods of attack, and most importantly, what can you do to foil their efforts? In this course, instructor Kevin Skoglund details the techniques and mindset that you need to craft solutions for these web security challenges. Learn the eight fundamental principles that underlie all security efforts, the importance of filtering input and controlling output, and how to defend against the most common types of attack. This course can help you, as a developer, to secure your clients’ websites, and offers a great introduction for anyone who wants to learn more about web security.
If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com
Get More Tutorials and Support Us -->> https://FreeCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/01 - Introduction/01 - The importance of security.mp4
4.6 MB
~Get Your Files Here !/01 - Introduction/01 - The importance of security.srt
1.6 KB
~Get Your Files Here !/02 - 1. Security Overview/01 - What is security.mp4
6.7 MB
~Get Your Files Here !/02 - 1. Security Overview/01 - What is security.srt
4.4 KB
~Get Your Files Here !/02 - 1. Security Overview/02 - Why security matters.mp4
7.2 MB
~Get Your Files Here !/02 - 1. Security Overview/02 - Why security matters.srt
4.5 KB
~Get Your Files Here !/02 - 1. Security Overview/03 - What is a hacker.mp4
9.6 MB
~Get Your Files Here !/02 - 1. Security Overview/03 - What is a hacker.srt
7.8 KB
~Get Your Files Here !/02 - 1. Security Overview/04 - Threat models.mp4
8.8 MB
~Get Your Files Here !/02 - 1. Security Overview/04 - Threat models.srt
6.4 KB
~Get Your Files Here !/02 - 1. Security Overview/05 - Total security is unachievable.mp4
7.6 MB
~Get Your Files Here !/02 - 1. Security Overview/05 - Total security is unachievable.srt
5.2 KB
~Get Your Files Here !/03 - 2. General Security Principles/01 - Least privilege.mp4
9.7 MB
~Get Your Files Here !/03 - 2. General Security Principles/01 - Least privilege.srt
6.9 KB
~Get Your Files Here !/03 - 2. General Security Principles/02 - Simple is more secure.mp4
7.1 MB
~Get Your Files Here !/03 - 2. General Security Principles/02 - Simple is more secure.srt
5.3 KB
~Get Your Files Here !/03 - 2. General Security Principles/03 - Never trust users.mp4
8.4 MB
~Get Your Files Here !/03 - 2. General Security Principles/03 - Never trust users.srt
6.4 KB
~Get Your Files Here !/03 - 2. General Security Principles/04 - Expect the unexpected.mp4
4.9 MB
~Get Your Files Here !/03 - 2. General Security Principles/04 - Expect the unexpected.srt
4.4 KB
~Get Your Files Here !/03 - 2. General Security Principles/05 - Defense in depth.mp4
8.4 MB
~Get Your Files Here !/03 - 2. General Security Principles/05 - Defense in depth.srt
6.7 KB
~Get Your Files Here !/03 - 2. General Security Principles/06 - Resilience.mp4
12.8 MB
~Get Your Files Here !/03 - 2. General Security Principles/06 - Resilience.srt
8.9 KB
~Get Your Files Here !/03 - 2. General Security Principles/07 - Security through obscurity.mp4
12.1 MB
~Get Your Files Here !/03 - 2. General Security Principles/07 - Security through obscurity.srt
8 KB
~Get Your Files Here !/03 - 2. General Security Principles/08 - Deny-listing and allow-listing.mp4
8.1 MB
~Get Your Files Here !/03 - 2. General Security Principles/08 - Deny-listing and allow-listing.srt
5.6 KB
~Get Your Files Here !/03 - 2. General Security Principles/09 - Map exposure points and data passageways.mp4
8.9 MB
~Get Your Files Here !/03 - 2. General Security Principles/09 - Map exposure points and data passageways.srt
6.7 KB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/01 - Regulate requests.mp4
9 MB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/01 - Regulate requests.srt
6.9 KB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/02 - Validate input.mp4
8.3 MB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/02 - Validate input.srt
7.5 KB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/03 - Sanitize data.mp4
15.3 MB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/03 - Sanitize data.srt
11 KB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/04 - Label variables.mp4
2.6 MB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/04 - Label variables.srt
2.4 KB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/05 - Keep code private.mp4
6.2 MB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/05 - Keep code private.srt
4.6 KB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/06 - Keep credentials private.mp4
11.2 MB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/06 - Keep credentials private.srt
9.5 KB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/07 - Keep error messages vague.mp4
5.9 MB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/07 - Keep error messages vague.srt
4.4 KB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/08 - Smart logging.mp4
8.4 MB
~Get Your Files Here !/04 - 3. Filter Input, Control Output/08 - Smart logging.srt
6.3 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/01 - Types of credential attacks.mp4
13.1 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/01 - Types of credential attacks.srt
9.6 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/02 - Strong passwords.mp4
11.3 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/02 - Strong passwords.srt
7.8 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/03 - URL manipulation and Insecure Direct Object Reference (IDOR).mp4
9.5 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/03 - URL manipulation and Insecure Direct Object Reference (IDOR).srt
8.7 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/04 - SQL injection.mp4
12.9 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/04 - SQL injection.srt
11.7 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/05 - Cross-Site Scripting (XSS).mp4
14.9 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/05 - Cross-Site Scripting (XSS).srt
11.8 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/06 - Cross-Site Request Forgery (CSRF).mp4
11.6 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/06 - Cross-Site Request Forgery (CSRF).srt
8.1 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/07 - Cross-Site Request protections.mp4
9.6 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/07 - Cross-Site Request protections.srt
7.1 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/08 - Cookie visibility and theft.mp4
11 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/08 - Cookie visibility and theft.srt
9.1 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/09 - Session hijacking.mp4
13.7 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/09 - Session hijacking.srt
10 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/10 - Session fixation.mp4
7.4 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/10 - Session fixation.srt
6.4 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/11 - Remote system execution.mp4
5.6 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/11 - Remote system execution.srt
4.1 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/12 - File upload abuse.mp4
6.1 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/12 - File upload abuse.srt
6 KB
~Get Your Files Here !/05 - 4. The Most Common Attacks/13 - Denial of service.mp4
13.1 MB
~Get Your Files Here !/05 - 4. The Most Common Attacks/13 - Denial of service.srt
9.4 KB
~Get Your Files Here !/06 - Conclusion/01 - Next steps.mp4
6.7 MB
~Get Your Files Here !/06 - Conclusion/01 - Next steps.srt