17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
[ CourseWikia.com ] PluralSight - Secure Coding With OWASP In React 18
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
React 18 is used to build mission critical applications handling sensitive data. This course will teach you how to implement the highest level of security requirements and defenses recommended by OWASP in your React 18 applications.
Are you ready to enhance your skills in web security? This course, Secure Coding with OWASP in React 18, is tailor-made for intermediate learners who want to excel in web security. You'll learn advanced methods to set up robust, high-level security defenses in your React 18 web applications. We start with an intensive look at one common type of attack: cross-site scripting (XSS). We'll break down each XSS attack vector and teach you how to secure your web applications, using plenty of practical, -based examples. Then, we'll discuss the major vulnerabilities that can affect web applications. You'll learn the theory behind each one, and how to add protective systems to a sample web application, using detailed nstrations. Finally, we'll study the OWASP Top 10, examining each threat closely. Even though only some of these threats are directly related to React 18 development, it's crucial to understand all of them so you can design effective threat mitigation controls.
Homepage
If You Need More Stuff, kindly Visit and Support Us -->> https://FreeCourseWeb.com
Get More Tutorials and Support Us -->> https://DevCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/01. Intro.mp4
4.6 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/01. Intro.vtt
3.8 KB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/02. View Source.mp4
7.8 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/02. View Source.vtt
5 KB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/03. Cross-site Request Forgery.mp4
11.1 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/03. Cross-site Request Forgery.vtt
6.6 KB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/04. Handling Raw Data.mp4
5.5 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/04. Handling Raw Data.vtt
4.1 KB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/05. Insecure Client-side Logging.mp4
6.1 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/05. Insecure Client-side Logging.vtt
4.3 KB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/06. Insecure Native Dom Access.mp4
1.9 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/06. Insecure Native Dom Access.vtt
1.6 KB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/07. Lazy Loading.mp4
6.9 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/07. Lazy Loading.vtt
4.7 KB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/08. Server-side Rendering.mp4
4.6 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/08. Server-side Rendering.vtt
3.3 KB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/09. The Zip Slip Attack.mp4
3.8 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/09. The Zip Slip Attack.vtt
3.2 KB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/10. Summary.mp4
4.8 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/10. Summary.vtt
3.9 KB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/11. Course Summary.mp4
4.3 MB
~Get Your Files Here !/03. Fixing Web Application Vulnerabilities/11. Course Summary.vtt
3.8 KB
~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4
4.7 MB
~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt
2.1 KB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/1. Intro.mp4
9 MB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/1. Intro.vtt
6.5 KB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/2. Reflected Cross-site Scripting.mp4
13.5 MB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/2. Reflected Cross-site Scripting.vtt
8.8 KB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/3. Stored Cross-site Scripting.mp4
9.8 MB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/3. Stored Cross-site Scripting.vtt
6.2 KB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/4. Cookie Theft Cross-site Scripting.mp4
7.7 MB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/4. Cookie Theft Cross-site Scripting.vtt
4.9 KB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/5. Credit Card Theft.mp4
8.5 MB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/5. Credit Card Theft.vtt
6.4 KB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/6. Site Defacement.mp4
5 MB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/6. Site Defacement.vtt
4.2 KB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/7. Form Action Overriding.mp4
4.9 MB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/7. Form Action Overriding.vtt
4 KB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/8. Summary.mp4
4.4 MB
~Get Your Files Here !/2. Preventing Cross-Site Scripting (XSS) Attacks/8. Summary.vtt