Coursera - Secure Coding Practices Specialization
Language: English | Size:1.9 GB
Genre:eLearning
Files Included :
02 course-introduction.mp4 (15.91 MB)
MP4
03 overview-of-resources-and-tools-for-this-course.mp4 (9.07 MB)
MP4
03 how-to-import-webgoat-into-ide.mp4 (18.1 MB)
MP4
04 how-to-run-webgoat-in-a-docker-container.mp4 (19.33 MB)
MP4
02 cross-site-scripting-xss-part-1.mp4 (21.09 MB)
MP4
03 protecting-against-cross-site-scripting-xss-part-2.mp4 (19.67 MB)
MP4
05 patching-reflected-cross-site-scripting-xss-part-3.mp4 (15.37 MB)
MP4
06 stored-cross-site-scripting-xss.mp4 (37.02 MB)
MP4
07 dangers-of-cross-site-scripting-xss-attacks.mp4 (9.28 MB)
MP4
01 a-note-about-finding-lessons-on-webgoat.mp4 (3.46 MB)
MP4
02 introduction-to-labs-peer-reviewed.mp4 (7.8 MB)
MP4
01 injection-attacks.mp4 (6.76 MB)
MP4
02 tutorial-using-a-proxy-to-intercept-traffic-from-client-to-servers.mp4 (18.17 MB)
MP4
04 sql-syntax-and-basics-putting-on-the-attacker-hat.mp4 (20.02 MB)
MP4
05 solution-to-sql-injection-attacks-sqli.mp4 (19.54 MB)
MP4
06 sql-injection-attacks-evaluation-of-code.mp4 (30.4 MB)
MP4
08 xml-external-entity-xxe-attacks.mp4 (15.7 MB)
MP4
09 demo-of-an-xml-external-entity-xxe-attack-to-gain-remote-code-execution-rce.mp4 (19.48 MB)
MP4
10 evaluation-of-code-xxe-through-a-rest-framework.mp4 (20.35 MB)
MP4
11 solution-evaluation-of-code-xxe-through-a-rest-framework.mp4 (18.38 MB)
MP4
12 patching-the-xxe-vulnerability.mp4 (24.32 MB)
MP4
01 authentication-and-authorization.mp4 (3.48 MB)
MP4
03 introduction-to-authentication-flaws-in-webgoat.mp4 (4.49 MB)
MP4
04 authentication-bypass-exploit.mp4 (5.59 MB)
MP4
05 tips-and-tricks-for-burp-suite-use-proxy-to-intercept-traffic.mp4 (7.79 MB)
MP4
06 solution-to-authentication-bypass-evaluation-of-code.mp4 (14.46 MB)
MP4
07 finding-vulnerabilities-and-logical-flaws-in-source-code.mp4 (24.23 MB)
MP4
01 introduction-to-json-web-tokens-jwt-and-authentication-bypass.mp4 (3.38 MB)
MP4
03 authentication-flaw-json-web-tokens-jwt.mp4 (13.83 MB)
MP4
04 solution-demo-exploiting-json-web-tokens-jwt.mp4 (20.5 MB)
MP4
05 evaluating-code-to-find-the-json-web-tokens-jwt-flaw.mp4 (12.88 MB)
MP4
06 hint-video-jwt-patching-the-vulnerable-code-in-webgoat.mp4 (2.07 MB)
MP4
07 solution-to-patch-jwt-flaw.mp4 (18.07 MB)
MP4
01 dangers-of-vulnerable-components-introduction.mp4 (7.78 MB)
MP4
02 vulnerable-components-xstream-library.mp4 (24.54 MB)
MP4
03 solution-fixing-vulnerabilities-with-xstream.mp4 (29.34 MB)
MP4
01 introduction-to-labs-peer-reviewed.mp4 (7.8 MB)
MP4
01 course-summary.mp4 (6.9 MB)
MP4
02 course-introduction.mp4 (10.32 MB)
MP4
01 module-1-introduction.mp4 (6.65 MB)
MP4
02 fundamental-concepts-in-security.mp4 (14.63 MB)
MP4
03 the-stride-method-via-example.mp4 (18 MB)
MP4
04 stride-threats-in-more-detail-via-example.mp4 (8.48 MB)
MP4
05 trust-boundaries.mp4 (5.83 MB)
MP4
06 cryptography-basics-introduction.mp4 (6.51 MB)
MP4
07 cryptography-basics-block-ciphers.mp4 (16.64 MB)
MP4
08 cryptography-basics-symmetric-and-asymmetric-cryptography.mp4 (10.05 MB)
MP4
09 cryptography-basics-hash-functions.mp4 (16.46 MB)
MP4
10 cryptography-basics-application-to-threat-models.mp4 (11.67 MB)
MP4
01 lab-threat-model-activity.mp4 (14.26 MB)
MP4
01 owasp-top-10-proactive-controls-and-exploits-part-1.mp4 (12.51 MB)
MP4
02 owasp-top-10-proactive-controls-and-exploits-part-2.mp4 (16 MB)
MP4
01 module-2-introduction.mp4 (7.91 MB)
MP4
02 general-concepts-injection-problems.mp4 (7.64 MB)
MP4
03 sql-injection-problems.mp4 (14.2 MB)
MP4
04 mitigating-sql-injection-using-prepared-statements.mp4 (6.87 MB)
MP4
05 mitigating-sql-injection-using-stored-procedures.mp4 (6.99 MB)
MP4
06 mitigating-sql-injection-using-whitelisting.mp4 (5.37 MB)
MP4
07 injection-problems-in-real-life.mp4 (10.4 MB)
MP4
08 solution-screencast-for-lab-exploit-using-webgoats-sqli-example.mp4 (14.42 MB)
MP4
09 cross-site-scripting-introduction.mp4 (6.36 MB)
MP4
10 http-and-document-isolation.mp4 (14.18 MB)
MP4
11 dom-dynamically-generating-pages-and-cross-site-scripting.mp4 (13.98 MB)
MP4
12 the-3-kinds-of-cross-site-scripting-vulnerabilities.mp4 (11.63 MB)
MP4
13 comparing-and-contrasting-cross-site-scripting-vulnerabilities.mp4 (6.07 MB)
MP4
14 owasp-prescribed-cross-site-scripting-prevention-rules-part-1.mp4 (12.74 MB)
MP4
15 owasp-prescribed-cross-site-scripting-prevention-rules-part-2.mp4 (10.67 MB)
MP4
16 command-injection-problems.mp4 (6.77 MB)
MP4
17 owasp-proactive-controls-related-to-injections.mp4 (7.9 MB)
MP4
01 module-3-introduction.mp4 (7.37 MB)
MP4
02 overview-of-http-protocol.mp4 (13.18 MB)
MP4
03 introduction-to-authentication.mp4 (16.8 MB)
MP4
04 handling-error-messages-during-authentication.mp4 (8.36 MB)
MP4
05 introduction-to-session-management.mp4 (13.05 MB)
MP4
06 enforcing-access-control-with-session-management.mp4 (12.79 MB)
MP4
07 session-management-threat-bruteforce-session-ids.mp4 (18.23 MB)
MP4
08 session-management-theat-session-fixation-vulnerabilities.mp4 (6.7 MB)
MP4
09 logging-and-monitoring.mp4 (6.32 MB)
MP4
10 solution-for-lab-3-webgoats-session-management-vulnerability.mp4 (16.64 MB)
MP4
01 module-4-introduction.mp4 (8.74 MB)
MP4
02 introduction-to-sensitive-data-exposure-problems.mp4 (11.63 MB)
MP4
03 issue-1-using-pii-to-compose-session-ids.mp4 (6.82 MB)
MP4
04 issue-2-not-encrypting-sensitive-information.mp4 (5.63 MB)
MP4
05 issue-3-improperly-storing-passwords.mp4 (10.09 MB)
MP4
06 slowing-down-password-bruteforce-attacks.mp4 (12.89 MB)
MP4
07 issue-4-using-http-for-sensitive-client-server.mp4 (8.44 MB)
MP4
08 owasp-proactive-controls-related-to-sensitive-data-exposure.mp4 (6.86 MB)
MP4
01 course-summary.mp4 (6.97 MB)
MP4
02 course-introduction.mp4 (12.42 MB)
MP4
01 module-1-introduction.mp4 (9.53 MB)
MP4
02 users-and-privileges-overview.mp4 (10.52 MB)
MP4
03 identifying-users-and-changing-privileges.mp4 (9.91 MB)
MP4
04 spawning-subprocesses.mp4 (11.33 MB)
MP4
05 identifying-users-incorrectly.mp4 (2.41 MB)
MP4
06 establishing-users-and-setting-uids.mp4 (12.54 MB)
MP4
07 establishing-groups-and-gids.mp4 (4.81 MB)
MP4
08 establishing-privileges-for-users-and-groups.mp4 (16.37 MB)
MP4
09 how-root-privileges-work.mp4 (4.72 MB)
MP4
10 lesson-1-summary.mp4 (2.31 MB)
MP4
01 environment-variables-overview.mp4 (4.77 MB)
MP4
02 programming-explicitly.mp4 (5.87 MB)
MP4
03 addressing-various-attacks.mp4 (22.45 MB)
MP4
04 dynamic-loading-and-associated-attacks.mp4 (22.96 MB)
MP4
05 programming-implicitly.mp4 (4.92 MB)
MP4
06 the-moral-of-the-story.mp4 (7.54 MB)
MP4
03 metacharacters.mp4 (15.58 MB)
MP4
05 inputs.mp4 (21.81 MB)
MP4
06 fixes.mp4 (9.79 MB)
MP4
07 lesson-3-summary.mp4 (1.63 MB)
MP4
03 sql-injections.mp4 (15.54 MB)
MP4
04 lesson-5-summary.mp4 (6.82 MB)
MP4
01 module-3-introduction.mp4 (9.7 MB)
MP4
02 files-and-subprocesses-overview.mp4 (2.04 MB)
MP4
03 creating-a-child-process.mp4 (7.36 MB)
MP4
04 subprocess-environment.mp4 (14.16 MB)
MP4
05 files-and-subprocesses-design-tips.mp4 (7.03 MB)
MP4
06 lesson-6-summary.mp4 (3.33 MB)
MP4
01 race-conditions-overview.mp4 (12.34 MB)
MP4
02 a-classic-race-condition-example.mp4 (13.26 MB)
MP4
03 time-of-check-to-time-of-use.mp4 (17.16 MB)
MP4
04 programming-condition.mp4 (7.33 MB)
MP4
05 environmental-condition.mp4 (9.98 MB)
MP4
06 race-conditions.mp4 (8.91 MB)
MP4
07 linux-locks-and-freebsd-system-calls.mp4 (5.57 MB)
MP4
01 module-4-introduction.mp4 (11.9 MB)
MP4
02 randomness-and-cryptography-overview.mp4 (4.05 MB)
MP4
03 pseudorandom-vs-random.mp4 (8.98 MB)
MP4
04 producing-random-numbers.mp4 (6.89 MB)
MP4
05 sowing-seeds.mp4 (16.75 MB)
MP4
06 cryptography-basics.mp4 (5.31 MB)
MP4
07 using-cryptography-for-secrecy-and-integrity.mp4 (11.98 MB)
MP4
08 some-cryptography-examples.mp4 (12.6 MB)
MP4
09 lesson-8-summary.mp4 (2.64 MB)
MP4
02 all-about-passwords.mp4 (10.39 MB)
MP4
08 format-strings.mp4 (7.42 MB)
MP4
09 lesson-9-summary.mp4 (3.34 MB)
MP4
01 course-summary.mp4 (4.58 MB)
MP4
02 course-introduction.mp4 (9.93 MB)
MP4
01 module-1-introduction.mp4 (6.71 MB)
MP4
02 the-philosophy-of-secure-programming.mp4 (4.07 MB)
MP4
03 defining-secure-programming.mp4 (5.91 MB)
MP4
04 robust-vs-secure-programming.mp4 (18.75 MB)
MP4
05 security-policies-and-procedures.mp4 (11.16 MB)
MP4
06 secure-programming-general-philosophy.mp4 (13.79 MB)
MP4
07 checking-design-and-implementation.mp4 (12.68 MB)
MP4
08 where-to-look-for-vulnerabilities.mp4 (15.96 MB)
MP4
09 secure-programming-summary.mp4 (1.36 MB)
MP4
01 module-2-introduction.mp4 (5.37 MB)
MP4
02 secure-programming-design-principles-overview.mp4 (3.4 MB)
MP4
03 principle-of-least-privilege.mp4 (4.54 MB)
MP4
04 fail-safe-defaults.mp4 (4.83 MB)
MP4
05 principle-of-economy-of-mechanism.mp4 (2.24 MB)
MP4
06 principle-of-complete-mediation.mp4 (2.33 MB)
MP4
07 separation-of-privilege-principle.mp4 (4.04 MB)
MP4
08 principle-of-open-design.mp4 (9.62 MB)
MP4
09 principle-of-least-common-mechanism.mp4 (6.03 MB)
MP4
10 principle-of-least-astonishment.mp4 (8.59 MB)
MP4
11 secure-programming-design-principles-summary.mp4 (1.62 MB)
MP4
02 module-3-introduction.mp4 (6.34 MB)
MP4
03 robust-programming-overview.mp4 (1.09 MB)
MP4
04 robust-programming-basic-principles.mp4 (4.36 MB)
MP4
05 an-example-of-fragile-code.mp4 (18.41 MB)
MP4
06 error-handling.mp4 (15.86 MB)
MP4
07 cohesion-new-interfaces-and-token-generation.mp4 (19.38 MB)
MP4
08 token-generation-and-interpretation.mp4 (7.4 MB)
MP4
09 creating-and-deleting-a-queue.mp4 (7.91 MB)
MP4
10 adding-and-removing-elements-to-a-queue.mp4 (7.28 MB)
MP4
01 module-4-introduction.mp4 (4.96 MB)
MP4
02 methods-for-robustness-overview.mp4 (882.83 KB)
MP4
03 methods-overview-formal-informal-and-ad-hoc-methods.mp4 (4.9 MB)
MP4
04 overview-of-formal-methods.mp4 (3.9 MB)
MP4
05 login-program-example.mp4 (15.12 MB)
MP4
06 incorporating-hierarchical-decomposition-methodology.mp4 (12.74 MB)
MP4
07 login-program-authenticating-a-user.mp4 (15.1 MB)
MP4
08 login-program-preconditions-and-postconditions.mp4 (978.54 KB)
MP4
01 course-summary.mp4 (6.67 MB)
MP4