PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links:







Partners
warezload

movieblogarea download
katzdownload

Coursera - Secure Coding Practices Specialization

Category: Courses / Others
Author: AD-TEAM
Date added: 13.06.2023 :08:16
Views: 6
Comments: 0










Description material

Coursera - Secure Coding Practices Specialization


Coursera - Secure Coding Practices Specialization
Language: English | Size:1.9 GB
Genre:eLearning


Files Included :

02 course-introduction.mp4 (15.91 MB)
MP4
03 overview-of-resources-and-tools-for-this-course.mp4 (9.07 MB)
MP4
03 how-to-import-webgoat-into-ide.mp4 (18.1 MB)
MP4
04 how-to-run-webgoat-in-a-docker-container.mp4 (19.33 MB)
MP4
02 cross-site-scripting-xss-part-1.mp4 (21.09 MB)
MP4
03 protecting-against-cross-site-scripting-xss-part-2.mp4 (19.67 MB)
MP4
05 patching-reflected-cross-site-scripting-xss-part-3.mp4 (15.37 MB)
MP4
06 stored-cross-site-scripting-xss.mp4 (37.02 MB)
MP4
07 dangers-of-cross-site-scripting-xss-attacks.mp4 (9.28 MB)
MP4
01 a-note-about-finding-lessons-on-webgoat.mp4 (3.46 MB)
MP4
02 introduction-to-labs-peer-reviewed.mp4 (7.8 MB)
MP4
01 injection-attacks.mp4 (6.76 MB)
MP4
02 tutorial-using-a-proxy-to-intercept-traffic-from-client-to-servers.mp4 (18.17 MB)
MP4
04 sql-syntax-and-basics-putting-on-the-attacker-hat.mp4 (20.02 MB)
MP4
05 solution-to-sql-injection-attacks-sqli.mp4 (19.54 MB)
MP4
06 sql-injection-attacks-evaluation-of-code.mp4 (30.4 MB)
MP4
08 xml-external-entity-xxe-attacks.mp4 (15.7 MB)
MP4
09 demo-of-an-xml-external-entity-xxe-attack-to-gain-remote-code-execution-rce.mp4 (19.48 MB)
MP4
10 evaluation-of-code-xxe-through-a-rest-framework.mp4 (20.35 MB)
MP4
11 solution-evaluation-of-code-xxe-through-a-rest-framework.mp4 (18.38 MB)
MP4
12 patching-the-xxe-vulnerability.mp4 (24.32 MB)
MP4
01 authentication-and-authorization.mp4 (3.48 MB)
MP4
03 introduction-to-authentication-flaws-in-webgoat.mp4 (4.49 MB)
MP4
04 authentication-bypass-exploit.mp4 (5.59 MB)
MP4
05 tips-and-tricks-for-burp-suite-use-proxy-to-intercept-traffic.mp4 (7.79 MB)
MP4
06 solution-to-authentication-bypass-evaluation-of-code.mp4 (14.46 MB)
MP4
07 finding-vulnerabilities-and-logical-flaws-in-source-code.mp4 (24.23 MB)
MP4
01 introduction-to-json-web-tokens-jwt-and-authentication-bypass.mp4 (3.38 MB)
MP4
03 authentication-flaw-json-web-tokens-jwt.mp4 (13.83 MB)
MP4
04 solution-demo-exploiting-json-web-tokens-jwt.mp4 (20.5 MB)
MP4
05 evaluating-code-to-find-the-json-web-tokens-jwt-flaw.mp4 (12.88 MB)
MP4
06 hint-video-jwt-patching-the-vulnerable-code-in-webgoat.mp4 (2.07 MB)
MP4
07 solution-to-patch-jwt-flaw.mp4 (18.07 MB)
MP4
01 dangers-of-vulnerable-components-introduction.mp4 (7.78 MB)
MP4
02 vulnerable-components-xstream-library.mp4 (24.54 MB)
MP4
03 solution-fixing-vulnerabilities-with-xstream.mp4 (29.34 MB)
MP4
01 introduction-to-labs-peer-reviewed.mp4 (7.8 MB)
MP4
01 course-summary.mp4 (6.9 MB)
MP4
02 course-introduction.mp4 (10.32 MB)
MP4
01 module-1-introduction.mp4 (6.65 MB)
MP4
02 fundamental-concepts-in-security.mp4 (14.63 MB)
MP4
03 the-stride-method-via-example.mp4 (18 MB)
MP4
04 stride-threats-in-more-detail-via-example.mp4 (8.48 MB)
MP4
05 trust-boundaries.mp4 (5.83 MB)
MP4
06 cryptography-basics-introduction.mp4 (6.51 MB)
MP4
07 cryptography-basics-block-ciphers.mp4 (16.64 MB)
MP4
08 cryptography-basics-symmetric-and-asymmetric-cryptography.mp4 (10.05 MB)
MP4
09 cryptography-basics-hash-functions.mp4 (16.46 MB)
MP4
10 cryptography-basics-application-to-threat-models.mp4 (11.67 MB)
MP4
01 lab-threat-model-activity.mp4 (14.26 MB)
MP4
01 owasp-top-10-proactive-controls-and-exploits-part-1.mp4 (12.51 MB)
MP4
02 owasp-top-10-proactive-controls-and-exploits-part-2.mp4 (16 MB)
MP4
01 module-2-introduction.mp4 (7.91 MB)
MP4
02 general-concepts-injection-problems.mp4 (7.64 MB)
MP4
03 sql-injection-problems.mp4 (14.2 MB)
MP4
04 mitigating-sql-injection-using-prepared-statements.mp4 (6.87 MB)
MP4
05 mitigating-sql-injection-using-stored-procedures.mp4 (6.99 MB)
MP4
06 mitigating-sql-injection-using-whitelisting.mp4 (5.37 MB)
MP4
07 injection-problems-in-real-life.mp4 (10.4 MB)
MP4
08 solution-screencast-for-lab-exploit-using-webgoats-sqli-example.mp4 (14.42 MB)
MP4
09 cross-site-scripting-introduction.mp4 (6.36 MB)
MP4
10 http-and-document-isolation.mp4 (14.18 MB)
MP4
11 dom-dynamically-generating-pages-and-cross-site-scripting.mp4 (13.98 MB)
MP4
12 the-3-kinds-of-cross-site-scripting-vulnerabilities.mp4 (11.63 MB)
MP4
13 comparing-and-contrasting-cross-site-scripting-vulnerabilities.mp4 (6.07 MB)
MP4
14 owasp-prescribed-cross-site-scripting-prevention-rules-part-1.mp4 (12.74 MB)
MP4
15 owasp-prescribed-cross-site-scripting-prevention-rules-part-2.mp4 (10.67 MB)
MP4
16 command-injection-problems.mp4 (6.77 MB)
MP4
17 owasp-proactive-controls-related-to-injections.mp4 (7.9 MB)
MP4
01 module-3-introduction.mp4 (7.37 MB)
MP4
02 overview-of-http-protocol.mp4 (13.18 MB)
MP4
03 introduction-to-authentication.mp4 (16.8 MB)
MP4
04 handling-error-messages-during-authentication.mp4 (8.36 MB)
MP4
05 introduction-to-session-management.mp4 (13.05 MB)
MP4
06 enforcing-access-control-with-session-management.mp4 (12.79 MB)
MP4
07 session-management-threat-bruteforce-session-ids.mp4 (18.23 MB)
MP4
08 session-management-theat-session-fixation-vulnerabilities.mp4 (6.7 MB)
MP4
09 logging-and-monitoring.mp4 (6.32 MB)
MP4
10 solution-for-lab-3-webgoats-session-management-vulnerability.mp4 (16.64 MB)
MP4
01 module-4-introduction.mp4 (8.74 MB)
MP4
02 introduction-to-sensitive-data-exposure-problems.mp4 (11.63 MB)
MP4
03 issue-1-using-pii-to-compose-session-ids.mp4 (6.82 MB)
MP4
04 issue-2-not-encrypting-sensitive-information.mp4 (5.63 MB)
MP4
05 issue-3-improperly-storing-passwords.mp4 (10.09 MB)
MP4
06 slowing-down-password-bruteforce-attacks.mp4 (12.89 MB)
MP4
07 issue-4-using-http-for-sensitive-client-server.mp4 (8.44 MB)
MP4
08 owasp-proactive-controls-related-to-sensitive-data-exposure.mp4 (6.86 MB)
MP4
01 course-summary.mp4 (6.97 MB)
MP4
02 course-introduction.mp4 (12.42 MB)
MP4
01 module-1-introduction.mp4 (9.53 MB)
MP4
02 users-and-privileges-overview.mp4 (10.52 MB)
MP4
03 identifying-users-and-changing-privileges.mp4 (9.91 MB)
MP4
04 spawning-subprocesses.mp4 (11.33 MB)
MP4
05 identifying-users-incorrectly.mp4 (2.41 MB)
MP4
06 establishing-users-and-setting-uids.mp4 (12.54 MB)
MP4
07 establishing-groups-and-gids.mp4 (4.81 MB)
MP4
08 establishing-privileges-for-users-and-groups.mp4 (16.37 MB)
MP4
09 how-root-privileges-work.mp4 (4.72 MB)
MP4
10 lesson-1-summary.mp4 (2.31 MB)
MP4
01 environment-variables-overview.mp4 (4.77 MB)
MP4
02 programming-explicitly.mp4 (5.87 MB)
MP4
03 addressing-various-attacks.mp4 (22.45 MB)
MP4
04 dynamic-loading-and-associated-attacks.mp4 (22.96 MB)
MP4
05 programming-implicitly.mp4 (4.92 MB)
MP4
06 the-moral-of-the-story.mp4 (7.54 MB)
MP4
03 metacharacters.mp4 (15.58 MB)
MP4
05 inputs.mp4 (21.81 MB)
MP4
06 fixes.mp4 (9.79 MB)
MP4
07 lesson-3-summary.mp4 (1.63 MB)
MP4
03 sql-injections.mp4 (15.54 MB)
MP4
04 lesson-5-summary.mp4 (6.82 MB)
MP4
01 module-3-introduction.mp4 (9.7 MB)
MP4
02 files-and-subprocesses-overview.mp4 (2.04 MB)
MP4
03 creating-a-child-process.mp4 (7.36 MB)
MP4
04 subprocess-environment.mp4 (14.16 MB)
MP4
05 files-and-subprocesses-design-tips.mp4 (7.03 MB)
MP4
06 lesson-6-summary.mp4 (3.33 MB)
MP4
01 race-conditions-overview.mp4 (12.34 MB)
MP4
02 a-classic-race-condition-example.mp4 (13.26 MB)
MP4
03 time-of-check-to-time-of-use.mp4 (17.16 MB)
MP4
04 programming-condition.mp4 (7.33 MB)
MP4
05 environmental-condition.mp4 (9.98 MB)
MP4
06 race-conditions.mp4 (8.91 MB)
MP4
07 linux-locks-and-freebsd-system-calls.mp4 (5.57 MB)
MP4
01 module-4-introduction.mp4 (11.9 MB)
MP4
02 randomness-and-cryptography-overview.mp4 (4.05 MB)
MP4
03 pseudorandom-vs-random.mp4 (8.98 MB)
MP4
04 producing-random-numbers.mp4 (6.89 MB)
MP4
05 sowing-seeds.mp4 (16.75 MB)
MP4
06 cryptography-basics.mp4 (5.31 MB)
MP4
07 using-cryptography-for-secrecy-and-integrity.mp4 (11.98 MB)
MP4
08 some-cryptography-examples.mp4 (12.6 MB)
MP4
09 lesson-8-summary.mp4 (2.64 MB)
MP4
02 all-about-passwords.mp4 (10.39 MB)
MP4
08 format-strings.mp4 (7.42 MB)
MP4
09 lesson-9-summary.mp4 (3.34 MB)
MP4
01 course-summary.mp4 (4.58 MB)
MP4
02 course-introduction.mp4 (9.93 MB)
MP4
01 module-1-introduction.mp4 (6.71 MB)
MP4
02 the-philosophy-of-secure-programming.mp4 (4.07 MB)
MP4
03 defining-secure-programming.mp4 (5.91 MB)
MP4
04 robust-vs-secure-programming.mp4 (18.75 MB)
MP4
05 security-policies-and-procedures.mp4 (11.16 MB)
MP4
06 secure-programming-general-philosophy.mp4 (13.79 MB)
MP4
07 checking-design-and-implementation.mp4 (12.68 MB)
MP4
08 where-to-look-for-vulnerabilities.mp4 (15.96 MB)
MP4
09 secure-programming-summary.mp4 (1.36 MB)
MP4
01 module-2-introduction.mp4 (5.37 MB)
MP4
02 secure-programming-design-principles-overview.mp4 (3.4 MB)
MP4
03 principle-of-least-privilege.mp4 (4.54 MB)
MP4
04 fail-safe-defaults.mp4 (4.83 MB)
MP4
05 principle-of-economy-of-mechanism.mp4 (2.24 MB)
MP4
06 principle-of-complete-mediation.mp4 (2.33 MB)
MP4
07 separation-of-privilege-principle.mp4 (4.04 MB)
MP4
08 principle-of-open-design.mp4 (9.62 MB)
MP4
09 principle-of-least-common-mechanism.mp4 (6.03 MB)
MP4
10 principle-of-least-astonishment.mp4 (8.59 MB)
MP4
11 secure-programming-design-principles-summary.mp4 (1.62 MB)
MP4
02 module-3-introduction.mp4 (6.34 MB)
MP4
03 robust-programming-overview.mp4 (1.09 MB)
MP4
04 robust-programming-basic-principles.mp4 (4.36 MB)
MP4
05 an-example-of-fragile-code.mp4 (18.41 MB)
MP4
06 error-handling.mp4 (15.86 MB)
MP4
07 cohesion-new-interfaces-and-token-generation.mp4 (19.38 MB)
MP4
08 token-generation-and-interpretation.mp4 (7.4 MB)
MP4
09 creating-and-deleting-a-queue.mp4 (7.91 MB)
MP4
10 adding-and-removing-elements-to-a-queue.mp4 (7.28 MB)
MP4
01 module-4-introduction.mp4 (4.96 MB)
MP4
02 methods-for-robustness-overview.mp4 (882.83 KB)
MP4
03 methods-overview-formal-informal-and-ad-hoc-methods.mp4 (4.9 MB)
MP4
04 overview-of-formal-methods.mp4 (3.9 MB)
MP4
05 login-program-example.mp4 (15.12 MB)
MP4
06 incorporating-hierarchical-decomposition-methodology.mp4 (12.74 MB)
MP4
07 login-program-authenticating-a-user.mp4 (15.1 MB)
MP4
08 login-program-preconditions-and-postconditions.mp4 (978.54 KB)
MP4
01 course-summary.mp4 (6.67 MB)
MP4





Join to our telegram Group
Information
Users of Guests are not allowed to comment this publication.
Choose Site Language
Keep downtopc Online Please

PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links: