03 - PRACTICE Coding exercises to practice SOLID principles/001 Single Responsibility Principle User Registration and Authentication Refactoring Exercise.html
11.78 KB
03 - PRACTICE Coding exercises to practice SOLID principles/002 Open Closed Principle Shape Refactoring Challenge.html
11.15 KB
03 - PRACTICE Coding exercises to practice SOLID principles/003 Liskov Substitution Principle Square and Rectangle Refactoring Challenge.html
9.39 KB
03 - PRACTICE Coding exercises to practice SOLID principles/004 Interface Segregation Principle Worker Refactoring Challenge.html
10.32 KB
03 - PRACTICE Coding exercises to practice SOLID principles/005 Dependency Inversion Principle Car-Engine Refactoring Challenge.html
8.46 KB
04. Object-oriented Architecture, Clean Code Design (Advanced)/001 Single Responsibility Principle User Registration and Authentication Refactoring Exercise.html
12. Secure Software Architecture and Secure Coding/36. Improper Inventory Management - Part 1.mp4
233.59 MB
12. Secure Software Architecture and Secure Coding/36. Improper Inventory Management - Part 1.vtt
29.96 KB
12. Secure Software Architecture and Secure Coding/37. Improper Inventory Management - Part 2 (Practice).mp4
85.71 MB
12. Secure Software Architecture and Secure Coding/37. Improper Inventory Management - Part 2 (Practice).vtt
13.27 KB
12. Secure Software Architecture and Secure Coding/38. Unsafe Consumption of APIs - Part 1.mp4
141.47 MB
12. Secure Software Architecture and Secure Coding/38. Unsafe Consumption of APIs - Part 1.vtt
34.3 KB
12. Secure Software Architecture and Secure Coding/39. Unsafe Consumption of APIs - Part 2 (Practice).mp4
73.14 MB
12. Secure Software Architecture and Secure Coding/39. Unsafe Consumption of APIs - Part 2 (Practice).vtt
10.71 KB
12. Secure Software Architecture and Secure Coding/external-links/01. Common-Weakness-Enumeration-CWE-official-website.url
58 B
12. Secure Software Architecture and Secure Coding/external-links/02. Source-code-examples-from-the-lesson.url
178 B
12. Secure Software Architecture and Secure Coding/external-links/04. Source-code-examples-from-the-lesson.url
177 B
12. Secure Software Architecture and Secure Coding/external-links/05. Source-code-examples-from-the-lesson.url
177 B
12. Secure Software Architecture and Secure Coding/external-links/06. Source-code-examples-from-the-lesson.url
184 B
12. Secure Software Architecture and Secure Coding/external-links/07. Source-code-examples-from-the-lesson.url
184 B
12. Secure Software Architecture and Secure Coding/external-links/08. Source-code-examples-from-the-lesson.url
184 B
12. Secure Software Architecture and Secure Coding/external-links/11. NIST-800-123-Guide-to-General-Server-Security.url
103 B
12. Secure Software Architecture and Secure Coding/external-links/11. NIST-800-207-Zero-Trust-Architecture.url
99 B
12. Secure Software Architecture and Secure Coding/external-links/12. NIST-800-123-Guide-to-General-Server-Security.url
103 B
12. Secure Software Architecture and Secure Coding/external-links/12. NIST-800-207-Zero-Trust-Architecture.url
99 B
12. Secure Software Architecture and Secure Coding/external-links/13. Dependency-check-plugin.url
99 B
12. Secure Software Architecture and Secure Coding/external-links/13. pom.xml-from-the-lesson-with-OWASP-plugin.url
109 B
12. Secure Software Architecture and Secure Coding/external-links/16. Computer-Security-Incident-Handling-Guide.url
100 B
12. Secure Software Architecture and Secure Coding/external-links/20. Source-code-examples-from-the-lesson.url
137 B
12. Secure Software Architecture and Secure Coding/external-links/24. Source-code-examples-from-the-lesson.url
137 B
12. Secure Software Architecture and Secure Coding/external-links/26. Source-code-examples-from-the-lesson.url
180 B
12. Secure Software Architecture and Secure Coding/external-links/28. Source-code-examples-from-the-lesson.url
178 B
12. Secure Software Architecture and Secure Coding/external-links/30. Source-code-examples-from-the-lesson.url
179 B
12. Secure Software Architecture and Secure Coding/external-links/33. Source-code-examples-from-the-lesson.url
180 B
12. Secure Software Architecture and Secure Coding/external-links/37. Source-code-examples-from-the-lesson.url
178 B
12. Secure Software Architecture and Secure Coding/external-links/39. Source-code-examples-from-the-lesson.url
178 B
13. Logging in Java/01. Logging in Java Part 1 (Logging theory, Logging Levels, Java Logging Framework).mp4
243.39 MB
13. Logging in Java/01. Logging in Java Part 1 (Logging theory, Logging Levels, Java Logging Framework).vtt
30.66 KB
13. Logging in Java/02. Logging in Java Part 2 (Log4J, Logback, SLF4J).mp4
297 MB
13. Logging in Java/02. Logging in Java Part 2 (Log4J, Logback, SLF4J).vtt
30.83 KB
13. Logging in Java/external-links/01. java.util.logging-package-official-documentation.url
128 B
13. Logging in Java/external-links/01. Source-code-examples-from-the-lesson.url
178 B
13. Logging in Java/external-links/02. Log4J-2-Official-documentation-about-Appenders.url
84 B
13. Logging in Java/external-links/02. Log4J-2-Official-Documentation-about-Layouts.url
82 B
13. Logging in Java/external-links/02. Logback-configuration-documentation.url
74 B
13. Logging in Java/external-links/02. Source-code-examples-from-the-lesson.url
178 B
14. Cybersecurity Comprehensive Security Practices for Developers/01. Introduction to Cybersecurity p.1 - Overview of current cyber threat landscape.mp4
57.58 MB
14. Cybersecurity Comprehensive Security Practices for Developers/01. Introduction to Cybersecurity p.1 - Overview of current cyber threat landscape.vtt
9.46 KB
14. Cybersecurity Comprehensive Security Practices for Developers/02. Introduction to Cybersecurity p.2 - Case Studies, Threat Analysis Models & More.mp4
168.16 MB
14. Cybersecurity Comprehensive Security Practices for Developers/02. Introduction to Cybersecurity p.2 - Case Studies, Threat Analysis Models & More.vtt
22.28 KB
14. Cybersecurity Comprehensive Security Practices for Developers/03. Introduction to Cybersecurity p.3 - Security Controls, SDD, SOC.mp4
219.68 MB
14. Cybersecurity Comprehensive Security Practices for Developers/03. Introduction to Cybersecurity p.3 - Security Controls, SDD, SOC.vtt
26.49 KB
14. Cybersecurity Comprehensive Security Practices for Developers/04. General Security Tips Writing Code with Safety in Mind.mp4
139.08 MB
14. Cybersecurity Comprehensive Security Practices for Developers/04. General Security Tips Writing Code with Safety in Mind.vtt
20.04 KB
14. Cybersecurity Comprehensive Security Practices for Developers/05. Securing Inputs How to Validate and Sanitize Input Data.mp4
146.68 MB
14. Cybersecurity Comprehensive Security Practices for Developers/05. Securing Inputs How to Validate and Sanitize Input Data.vtt
24.73 KB
14. Cybersecurity Comprehensive Security Practices for Developers/06. Safeguarding Outputs Effective Encoding for Secure Systems.mp4
81.94 MB
14. Cybersecurity Comprehensive Security Practices for Developers/06. Safeguarding Outputs Effective Encoding for Secure Systems.vtt
15.19 KB
14. Cybersecurity Comprehensive Security Practices for Developers/07. Mastering Authentication Best Practices for Managing User Credentials.mp4
120.06 MB
14. Cybersecurity Comprehensive Security Practices for Developers/07. Mastering Authentication Best Practices for Managing User Credentials.vtt
29.97 KB
14. Cybersecurity Comprehensive Security Practices for Developers/08. Securing Sessions Preventing Hijacking and Improving Stability.mp4
233.06 MB
14. Cybersecurity Comprehensive Security Practices for Developers/08. Securing Sessions Preventing Hijacking and Improving Stability.vtt
26.4 KB
14. Cybersecurity Comprehensive Security Practices for Developers/09. Locking Down Access Implementing Robust Authorization Mechanisms.mp4
236.35 MB
14. Cybersecurity Comprehensive Security Practices for Developers/09. Locking Down Access Implementing Robust Authorization Mechanisms.vtt
29.17 KB
14. Cybersecurity Comprehensive Security Practices for Developers/10. Zero Trust Architecture and Modern Authentication.mp4
256.77 MB
14. Cybersecurity Comprehensive Security Practices for Developers/10. Zero Trust Architecture and Modern Authentication.vtt
28.6 KB
14. Cybersecurity Comprehensive Security Practices for Developers/11. Encryption Essentials Protecting Data with Cryptography - Part 1.mp4
148.31 MB
14. Cybersecurity Comprehensive Security Practices for Developers/11. Encryption Essentials Protecting Data with Cryptography - Part 1.vtt
20.93 KB
14. Cybersecurity Comprehensive Security Practices for Developers/12. Encryption Essentials Protecting Data with Cryptography - Part 2.mp4
189.95 MB
14. Cybersecurity Comprehensive Security Practices for Developers/12. Encryption Essentials Protecting Data with Cryptography - Part 2.vtt
21.99 KB
14. Cybersecurity Comprehensive Security Practices for Developers/13. Defending Data Strategies for Protecting Sensitive Information.mp4
186.23 MB
14. Cybersecurity Comprehensive Security Practices for Developers/13. Defending Data Strategies for Protecting Sensitive Information.vtt
25.1 KB
14. Cybersecurity Comprehensive Security Practices for Developers/14. Securing Databases Best Practices for Preventing SQL Injection.mp4
175.95 MB
14. Cybersecurity Comprehensive Security Practices for Developers/14. Securing Databases Best Practices for Preventing SQL Injection.vtt
20. Metrics & KPIs to Monitor and Control Software Development Process/01. Why this section is in this course and why it is important.html
2.74 KB
20. Metrics & KPIs to Monitor and Control Software Development Process/02. Metric, KPI & OKR.mp4
155.35 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/02. Metric, KPI & OKR.vtt
25.54 KB
20. Metrics & KPIs to Monitor and Control Software Development Process/03. RAG Status to Present KPI.html
4.28 KB
20. Metrics & KPIs to Monitor and Control Software Development Process/04. Introduction to Engineering Excellence Metrics & KPIs.mp4
46.49 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/04. Introduction to Engineering Excellence Metrics & KPIs.vtt
5.61 KB
20. Metrics & KPIs to Monitor and Control Software Development Process/05. Development Metrics & KPIs Tech Debt Ratio & Index, Cyclomatic Complexity.mp4
243.79 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/05. Development Metrics & KPIs Tech Debt Ratio & Index, Cyclomatic Complexity.vtt
29.53 KB
20. Metrics & KPIs to Monitor and Control Software Development Process/06. Development Metrics & KPIs Unit Test Related Metrics - Part 1.mp4
119.77 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/06. Development Metrics & KPIs Unit Test Related Metrics - Part 1.vtt
17.38 KB
20. Metrics & KPIs to Monitor and Control Software Development Process/07. Development Metrics & KPIs Unit Test Related Metrics - Part 2.mp4
62.5 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/07. Development Metrics & KPIs Unit Test Related Metrics - Part 2.vtt
25.08 KB
20. Metrics & KPIs to Monitor and Control Software Development Process/08. Development Metrics & KPIs Duplicate Code & Commented Code Index.mp4
194.34 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/08. Development Metrics & KPIs Duplicate Code & Commented Code Index.vtt
25.87 KB
20. Metrics & KPIs to Monitor and Control Software Development Process/09. Development Metrics & KPIs Code Review Feedback Loop Time & Code Reviews.mp4
173.16 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/09. Development Metrics & KPIs Code Review Feedback Loop Time & Code Reviews.vtt
25.85 KB
20. Metrics & KPIs to Monitor and Control Software Development Process/10. Development Metrics & KPIs Rules Compliance Index (RCI) & Violations.mp4
204.41 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/10. Development Metrics & KPIs Rules Compliance Index (RCI) & Violations.vtt
29.13 KB
20. Metrics & KPIs to Monitor and Control Software Development Process/11. Development Metrics & KPIs Integration Test Coverage & End-to-End Test Coverage.mp4
203.62 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/11. Development Metrics & KPIs Integration Test Coverage & End-to-End Test Coverage.vtt
27.15 KB
21. Code Review Fundamentals/01. Introduction to Code Reviews.mp4
123.79 MB
21. Code Review Fundamentals/01. Introduction to Code Reviews.vtt
15.4 KB
21. Code Review Fundamentals/02. Basics of Code Review Process.mp4
169.04 MB
21. Code Review Fundamentals/02. Basics of Code Review Process.vtt
27.72 KB
22. Tools, Automation, and Industry Best Practices/01. Tools for Code Review and Code Analysis.mp4
174.58 MB
22. Tools, Automation, and Industry Best Practices/01. Tools for Code Review and Code Analysis.vtt
26.94 KB
22. Tools, Automation, and Industry Best Practices/02. Part 1 - Checkstyle Adhering Coding Standards.mp4
119.98 MB
22. Tools, Automation, and Industry Best Practices/02. Part 1 - Checkstyle Adhering Coding Standards.vtt
17.04 KB
22. Tools, Automation, and Industry Best Practices/03. Part 2 - Checkstyle Adhering Coding Standards.mp4
63.63 MB
22. Tools, Automation, and Industry Best Practices/03. Part 2 - Checkstyle Adhering Coding Standards.vtt
16.27 KB
22. Tools, Automation, and Industry Best Practices/04. PMD Static Code Analysis.mp4
206.85 MB
22. Tools, Automation, and Industry Best Practices/04. PMD Static Code Analysis.vtt
24.82 KB
22. Tools, Automation, and Industry Best Practices/external-links/02. All-resources-and-links-for-the-lesson.url
122 B
22. Tools, Automation, and Industry Best Practices/external-links/03. All-resources-and-links-for-the-lesson.url
122 B
22. Tools, Automation, and Industry Best Practices/external-links/04. All-resources-and-links-for-the-lesson.url