资源详情

返回首页 | 相关搜索
Udemy - Software Architecture and Clean Code Design in OOP (11.2024)
大小 19.75 GB
文件数 398
Info Hash: 7EEBE77FC2AE7480A67E4EB503CD36EA7598E56A
收录时间 2026-02-07 16:49:24
更新时间 2026-02-07 16:49:24
文件列表 (398)
01. Introduction/01. Communication plan.mp4
11.75 MB
01. Introduction/01. Communication plan.vtt
5.46 KB
01. Introduction/02. Unlimited access to 'Learn IT' application for students.mp4
7.65 MB
01. Introduction/02. Unlimited access to 'Learn IT' application for students.vtt
4.07 KB
01. Introduction/03. Tips to Improve Your Course Taking Experience.html
1.88 KB
01. Introduction/external-links/01. Facebook-of-the-Tutor.url
66 B
01. Introduction/external-links/01. Facebook-Page-with-Udemy-Coupons-from-Learn-IT-University.url
69 B
01. Introduction/external-links/01. Instagram-of-the-Tutor.url
68 B
01. Introduction/external-links/01. IT-Bulls-Company-Official-Web-Site.url
47 B
01. Introduction/external-links/01. LinkedIn-IT-Bulls-company-official-page.url
68 B
01. Introduction/external-links/01. LinkedIn-of-the-Tutor.url
70 B
01. Introduction/external-links/01. Patreon-account-of-the-Tutor.url
65 B
01. Introduction/external-links/01. Telegram-Channel-with-Latest-News-coupons-and-important-information.url
122 B
01. Introduction/external-links/02. Learn-IT-application-in-Play-Market.url
110 B
01. Introduction/external-links/02. Page-where-you-can-generate-FREE-bonus-code-for-your-self-to-remove-limits-in-Application.url
79 B
02. SOLID Principles/01. SOLID principles overview & Single Responsibility Principle.mp4
59.41 MB
02. SOLID Principles/01. SOLID principles overview & Single Responsibility Principle.vtt
9.07 KB
02. SOLID Principles/02. Open Closed Principle.mp4
60.03 MB
02. SOLID Principles/02. Open Closed Principle.vtt
9.38 KB
02. SOLID Principles/03. Liskov Substitution Principle.mp4
42.25 MB
02. SOLID Principles/03. Liskov Substitution Principle.vtt
6.14 KB
02. SOLID Principles/04. Interface Segregation Principle.mp4
34.67 MB
02. SOLID Principles/04. Interface Segregation Principle.vtt
5.83 KB
02. SOLID Principles/05. Dependency Inversion Principle.mp4
51.79 MB
02. SOLID Principles/05. Dependency Inversion Principle.vtt
7.08 KB
02. SOLID Principles/external-links/01. Source-code-All-examples-from-the-lecture.url
134 B
02. SOLID Principles/external-links/02. Source-code-All-examples-from-the-lecture.url
134 B
02. SOLID Principles/external-links/03. Source-code-All-examples-from-the-lecture.url
134 B
02. SOLID Principles/external-links/04. Source-code-All-examples-from-the-lecture.url
134 B
02. SOLID Principles/external-links/05. Source-code-All-examples-from-the-lecture.url
134 B
03 - PRACTICE Coding exercises to practice SOLID principles/001 Single Responsibility Principle User Registration and Authentication Refactoring Exercise.html
11.78 KB
03 - PRACTICE Coding exercises to practice SOLID principles/002 Open Closed Principle Shape Refactoring Challenge.html
11.15 KB
03 - PRACTICE Coding exercises to practice SOLID principles/003 Liskov Substitution Principle Square and Rectangle Refactoring Challenge.html
9.39 KB
03 - PRACTICE Coding exercises to practice SOLID principles/004 Interface Segregation Principle Worker Refactoring Challenge.html
10.32 KB
03 - PRACTICE Coding exercises to practice SOLID principles/005 Dependency Inversion Principle Car-Engine Refactoring Challenge.html
8.46 KB
04. Object-oriented Architecture, Clean Code Design (Advanced)/001 Single Responsibility Principle User Registration and Authentication Refactoring Exercise.html
11.78 KB
04. Object-oriented Architecture, Clean Code Design (Advanced)/002 Open Closed Principle Shape Refactoring Challenge.html
11.15 KB
04. Object-oriented Architecture, Clean Code Design (Advanced)/003 Liskov Substitution Principle Square and Rectangle Refactoring Challenge.html
9.39 KB
04. Object-oriented Architecture, Clean Code Design (Advanced)/004 Interface Segregation Principle Worker Refactoring Challenge.html
10.32 KB
04. Object-oriented Architecture, Clean Code Design (Advanced)/005 Dependency Inversion Principle Car-Engine Refactoring Challenge.html
8.46 KB
04. Object-oriented Architecture, Clean Code Design (Advanced)/01. Clean Code Architecture, Coupling & Cohesion.mp4
87 MB
04. Object-oriented Architecture, Clean Code Design (Advanced)/01. Clean Code Architecture, Coupling & Cohesion.vtt
25.98 KB
04. Object-oriented Architecture, Clean Code Design (Advanced)/02. Tell, Don’t Ask Pricniple & Data Structures.mp4
96.08 MB
04. Object-oriented Architecture, Clean Code Design (Advanced)/02. Tell, Don’t Ask Pricniple & Data Structures.vtt
25.46 KB
04. Object-oriented Architecture, Clean Code Design (Advanced)/03. Law of Demeter.mp4
40.49 MB
04. Object-oriented Architecture, Clean Code Design (Advanced)/03. Law of Demeter.vtt
12.23 KB
04. Object-oriented Architecture, Clean Code Design (Advanced)/04. KISS Principle in OOP.mp4
184.75 MB
04. Object-oriented Architecture, Clean Code Design (Advanced)/04. KISS Principle in OOP.vtt
29.77 KB
04. Object-oriented Architecture, Clean Code Design (Advanced)/05. YAGNI Principle in OOP.mp4
165.15 MB
04. Object-oriented Architecture, Clean Code Design (Advanced)/05. YAGNI Principle in OOP.vtt
27.68 KB
04. Object-oriented Architecture, Clean Code Design (Advanced)/06. DRY Principle in OOP Part 1.mp4
137.38 MB
04. Object-oriented Architecture, Clean Code Design (Advanced)/06. DRY Principle in OOP Part 1.vtt
20.26 KB
04. Object-oriented Architecture, Clean Code Design (Advanced)/07. DRY Principle in OOP Part 2 - Practice.mp4
100.95 MB
04. Object-oriented Architecture, Clean Code Design (Advanced)/07. DRY Principle in OOP Part 2 - Practice.vtt
12.68 KB
04. Object-oriented Architecture, Clean Code Design (Advanced)/08. Packaging Pricniples p.1 Cohesion Principles.mp4
72.46 MB
04. Object-oriented Architecture, Clean Code Design (Advanced)/08. Packaging Pricniples p.1 Cohesion Principles.vtt
30.15 KB
04. Object-oriented Architecture, Clean Code Design (Advanced)/09. Packaging Pricniples p.2 Coupling Principles and Others.mp4
121.1 MB
04. Object-oriented Architecture, Clean Code Design (Advanced)/09. Packaging Pricniples p.2 Coupling Principles and Others.vtt
31.41 KB
04. Object-oriented Architecture, Clean Code Design (Advanced)/external-links/04. Source-code-examples-shown-in-the-lesson.url
131 B
04. Object-oriented Architecture, Clean Code Design (Advanced)/external-links/05. Source-code-examples-shown-in-the-lesson.url
132 B
04. Object-oriented Architecture, Clean Code Design (Advanced)/external-links/07. Source-code-examples-shown-in-the-lesson.url
130 B
05. GoF Design Patterns of Software Architecture in OOP/01. GoF Patterns Overview.mp4
54.97 MB
05. GoF Design Patterns of Software Architecture in OOP/01. GoF Patterns Overview.vtt
16.97 KB
05. GoF Design Patterns of Software Architecture in OOP/02. Creational Patterns.mp4
236.79 MB
05. GoF Design Patterns of Software Architecture in OOP/02. Creational Patterns.vtt
38.09 KB
05. GoF Design Patterns of Software Architecture in OOP/03. Structural Patterns, p.1.mp4
187.99 MB
05. GoF Design Patterns of Software Architecture in OOP/03. Structural Patterns, p.1.vtt
36.44 KB
05. GoF Design Patterns of Software Architecture in OOP/04. Structural Patterns, p.2.mp4
165.64 MB
05. GoF Design Patterns of Software Architecture in OOP/04. Structural Patterns, p.2.vtt
24.94 KB
05. GoF Design Patterns of Software Architecture in OOP/05. Behevioral Patterns, p.1.mp4
236.64 MB
05. GoF Design Patterns of Software Architecture in OOP/05. Behevioral Patterns, p.1.vtt
38.53 KB
05. GoF Design Patterns of Software Architecture in OOP/06. Behevioral Patterns, p.2.mp4
246.8 MB
05. GoF Design Patterns of Software Architecture in OOP/06. Behevioral Patterns, p.2.vtt
38.51 KB
05. GoF Design Patterns of Software Architecture in OOP/07. Behevioral Patterns, p.3.mp4
189.04 MB
05. GoF Design Patterns of Software Architecture in OOP/07. Behevioral Patterns, p.3.vtt
24.84 KB
05. GoF Design Patterns of Software Architecture in OOP/external-links/02. Source-code-of-all-examples-from-the-lesson.url
142 B
05. GoF Design Patterns of Software Architecture in OOP/external-links/04. Source-code-of-all-examples-from-the-lesson.url
142 B
05. GoF Design Patterns of Software Architecture in OOP/external-links/05. Source-code-of-all-examples-from-the-lesson.url
142 B
05. GoF Design Patterns of Software Architecture in OOP/external-links/06. Source-code-of-all-examples-from-the-lesson.url
142 B
05. GoF Design Patterns of Software Architecture in OOP/external-links/07. Source-code-of-all-examples-from-the-lesson.url
142 B
06. TDD, BDD & ATTD/01. Test-driven development Theory.mp4
99.29 MB
06. TDD, BDD & ATTD/01. Test-driven development Theory.vtt
29.34 KB
06. TDD, BDD & ATTD/02. BDD & ATTD.mp4
65.52 MB
06. TDD, BDD & ATTD/02. BDD & ATTD.vtt
19.96 KB
06. TDD, BDD & ATTD/03. TDD, BDD & ATTD - Practice.mp4
72.57 MB
06. TDD, BDD & ATTD/03. TDD, BDD & ATTD - Practice.vtt
17.98 KB
07. Databases Architecture from Scratch/01. About this section.html
785 B
07. Databases Architecture from Scratch/02. Databases Overview - Part 1.mp4
120.42 MB
07. Databases Architecture from Scratch/02. Databases Overview - Part 1.vtt
28.17 KB
07. Databases Architecture from Scratch/03. Databases Overview - Part 2.mp4
109.38 MB
07. Databases Architecture from Scratch/03. Databases Overview - Part 2.vtt
25.55 KB
07. Databases Architecture from Scratch/04. MySQL Overview & Installation (including Workbench Installation).mp4
114.94 MB
07. Databases Architecture from Scratch/04. MySQL Overview & Installation (including Workbench Installation).vtt
23.84 KB
07. Databases Architecture from Scratch/05. Relational Databases Basic Concepts.mp4
134.39 MB
07. Databases Architecture from Scratch/05. Relational Databases Basic Concepts.vtt
29.93 KB
07. Databases Architecture from Scratch/06. Create Schema & Table Naming, Collation, Engines, Types, Column Properties.mp4
235.52 MB
07. Databases Architecture from Scratch/06. Create Schema & Table Naming, Collation, Engines, Types, Column Properties.vtt
41.07 KB
07. Databases Architecture from Scratch/07. Database Modelling & Design Conceptual, Logical and Physical Data Models.mp4
114.42 MB
07. Databases Architecture from Scratch/07. Database Modelling & Design Conceptual, Logical and Physical Data Models.vtt
27.8 KB
07. Databases Architecture from Scratch/08. Referential Integrity Foreign Key Constraint & Cascading Operations.mp4
154.02 MB
07. Databases Architecture from Scratch/08. Referential Integrity Foreign Key Constraint & Cascading Operations.vtt
23.15 KB
07. Databases Architecture from Scratch/09. Indexes in Databases.mp4
106.95 MB
07. Databases Architecture from Scratch/09. Indexes in Databases.vtt
25.66 KB
07. Databases Architecture from Scratch/10. Database Normalization & Denormalization.mp4
174.23 MB
07. Databases Architecture from Scratch/10. Database Normalization & Denormalization.vtt
35.75 KB
07. Databases Architecture from Scratch/external-links/04. How-to-Install-MySQL-on-MacOS.url
93 B
07. Databases Architecture from Scratch/external-links/04. Microsoft-MySQL-Installer.url
68 B
08. Web Application Design Patterns/01. DAO (Data Access Object) Design Pattern.mp4
137.09 MB
08. Web Application Design Patterns/01. DAO (Data Access Object) Design Pattern.vtt
20.5 KB
08. Web Application Design Patterns/02. MVC Design Pattern.mp4
73.25 MB
08. Web Application Design Patterns/02. MVC Design Pattern.vtt
16.25 KB
08. Web Application Design Patterns/03. Layered Architecture.mp4
120.22 MB
08. Web Application Design Patterns/03. Layered Architecture.vtt
27.96 KB
08. Web Application Design Patterns/external-links/01. Source-code-example-from-the-lesson.url
126 B
08. Web Application Design Patterns/external-links/02. Source-code-of-Controller.url
197 B
08. Web Application Design Patterns/external-links/02. Source-code-of-Model.url
215 B
08. Web Application Design Patterns/external-links/02. Source-code-of-View.url
168 B
08. Web Application Design Patterns/external-links/03. Source-code-of-application-from-the-lesson-with-layered-architecture.url
89 B
09. ===== Exam DAO, Database, JDBC, SQL ======/01. Exam task review and solution.mp4
188.25 MB
09. ===== Exam DAO, Database, JDBC, SQL ======/01. Exam task review and solution.vtt
20.93 KB
09. ===== Exam DAO, Database, JDBC, SQL ======/external-links/01. Homework-description-and-reference-to-the-solution.url
122 B
10. ===== Exam MVC & Layered Architecture =====/01. Task Overview.mp4
202.85 MB
10. ===== Exam MVC & Layered Architecture =====/01. Task Overview.vtt
24.25 KB
10. ===== Exam MVC & Layered Architecture =====/02. Solution Overview Part 1.mp4
328.59 MB
10. ===== Exam MVC & Layered Architecture =====/02. Solution Overview Part 1.vtt
27.65 KB
10. ===== Exam MVC & Layered Architecture =====/03. Solution Overview Part 2.mp4
201.08 MB
10. ===== Exam MVC & Layered Architecture =====/03. Solution Overview Part 2.vtt
19.04 KB
10. ===== Exam MVC & Layered Architecture =====/04. Solution Overview Part 3.mp4
149.69 MB
10. ===== Exam MVC & Layered Architecture =====/04. Solution Overview Part 3.vtt
11.11 KB
10. ===== Exam MVC & Layered Architecture =====/external-links/01. Exam-task-description-and-reference-to-the-solution.url
122 B
11. Connection Pooling/01. Connection Pooling DBCP, C3P0, HikariCP & Tomcat Connection Pool with JNDI.mp4
220.31 MB
11. Connection Pooling/01. Connection Pooling DBCP, C3P0, HikariCP & Tomcat Connection Pool with JNDI.vtt
29.75 KB
11. Connection Pooling/external-links/01. Documentation-for-attributes-of-connection-pooling-in-Tomcat.url
81 B
11. Connection Pooling/external-links/01. Homework-task-and-source-code-of-the-solution.url
122 B
12. Secure Software Architecture and Secure Coding/01. OWASP Top 10 Overview.mp4
111.68 MB
12. Secure Software Architecture and Secure Coding/01. OWASP Top 10 Overview.vtt
19.41 KB
12. Secure Software Architecture and Secure Coding/02. Broken Access Control.mp4
316.81 MB
12. Secure Software Architecture and Secure Coding/02. Broken Access Control.vtt
37.76 KB
12. Secure Software Architecture and Secure Coding/03. Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).mp4
85.77 MB
12. Secure Software Architecture and Secure Coding/03. Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).vtt
13.53 KB
12. Secure Software Architecture and Secure Coding/04. Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).mp4
99.81 MB
12. Secure Software Architecture and Secure Coding/04. Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).vtt
20.19 KB
12. Secure Software Architecture and Secure Coding/05. Cryptography Failures (Examples, Password Encryption, Hashing, Salting).mp4
138.51 MB
12. Secure Software Architecture and Secure Coding/05. Cryptography Failures (Examples, Password Encryption, Hashing, Salting).vtt
18.67 KB
12. Secure Software Architecture and Secure Coding/06. Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).mp4
100.49 MB
12. Secure Software Architecture and Secure Coding/06. Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).vtt
16.49 KB
12. Secure Software Architecture and Secure Coding/07. Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).mp4
91.78 MB
12. Secure Software Architecture and Secure Coding/07. Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).vtt
16.45 KB
12. Secure Software Architecture and Secure Coding/08. Injection (XPath Injection, Log Injection, Input Validation).mp4
73.84 MB
12. Secure Software Architecture and Secure Coding/08. Injection (XPath Injection, Log Injection, Input Validation).vtt
16.03 KB
12. Secure Software Architecture and Secure Coding/09. Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).mp4
94.9 MB
12. Secure Software Architecture and Secure Coding/09. Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).vtt
20.47 KB
12. Secure Software Architecture and Secure Coding/10. Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).mp4
52.46 MB
12. Secure Software Architecture and Secure Coding/10. Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).vtt
23.97 KB
12. Secure Software Architecture and Secure Coding/11. Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).mp4
92.86 MB
12. Secure Software Architecture and Secure Coding/11. Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).vtt
19.6 KB
12. Secure Software Architecture and Secure Coding/12. Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).mp4
175.12 MB
12. Secure Software Architecture and Secure Coding/12. Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).vtt
27.16 KB
12. Secure Software Architecture and Secure Coding/13. Vulnerable & Outdated Components.mp4
180.94 MB
12. Secure Software Architecture and Secure Coding/13. Vulnerable & Outdated Components.vtt
23.42 KB
12. Secure Software Architecture and Secure Coding/14. Identification & Authentication Failures.mp4
192.15 MB
12. Secure Software Architecture and Secure Coding/14. Identification & Authentication Failures.vtt
33.02 KB
12. Secure Software Architecture and Secure Coding/15. Software & Data Integrity Failures.mp4
98.95 MB
12. Secure Software Architecture and Secure Coding/15. Software & Data Integrity Failures.vtt
16.9 KB
12. Secure Software Architecture and Secure Coding/16. Security Logging & Monitoring Failures.mp4
125.47 MB
12. Secure Software Architecture and Secure Coding/16. Security Logging & Monitoring Failures.vtt
22.32 KB
12. Secure Software Architecture and Secure Coding/17. Server-Side Request Forgery (SSRF).mp4
114.79 MB
12. Secure Software Architecture and Secure Coding/17. Server-Side Request Forgery (SSRF).vtt
23.13 KB
12. Secure Software Architecture and Secure Coding/18. OWASP API Security Project & OWASP API Security Top 10 2023.html
8.93 KB
12. Secure Software Architecture and Secure Coding/19. Broken Object Level Authorization - Part 1.mp4
151.91 MB
12. Secure Software Architecture and Secure Coding/19. Broken Object Level Authorization - Part 1.vtt
16.99 KB
12. Secure Software Architecture and Secure Coding/20. Broken Object Level Authorization - Part 2 (Practice).mp4
61.66 MB
12. Secure Software Architecture and Secure Coding/20. Broken Object Level Authorization - Part 2 (Practice).vtt
13.13 KB
12. Secure Software Architecture and Secure Coding/21. Broken Object Level Authorization - Part 3 (Zero-Trust, UUIDs).mp4
199.39 MB
12. Secure Software Architecture and Secure Coding/21. Broken Object Level Authorization - Part 3 (Zero-Trust, UUIDs).vtt
23.22 KB
12. Secure Software Architecture and Secure Coding/22. Broken Authentication - Part 1 (Basics, Impact, Types of Attacks).mp4
67.86 MB
12. Secure Software Architecture and Secure Coding/22. Broken Authentication - Part 1 (Basics, Impact, Types of Attacks).vtt
19.6 KB
12. Secure Software Architecture and Secure Coding/23. Broken Authentication - Part 2 (Case Studies, OAuth, OpenID).mp4
198.93 MB
12. Secure Software Architecture and Secure Coding/23. Broken Authentication - Part 2 (Case Studies, OAuth, OpenID).vtt
21.87 KB
12. Secure Software Architecture and Secure Coding/24. Broken Authentication - P.3 - (Practice, JWT Tokens, Timing Attacks).mp4
253.35 MB
12. Secure Software Architecture and Secure Coding/24. Broken Authentication - P.3 - (Practice, JWT Tokens, Timing Attacks).vtt
30.04 KB
12. Secure Software Architecture and Secure Coding/25. Broken Object Property Level Authorization - Part 1.mp4
164.45 MB
12. Secure Software Architecture and Secure Coding/25. Broken Object Property Level Authorization - Part 1.vtt
23.18 KB
12. Secure Software Architecture and Secure Coding/26. Broken Object Property Level Authorization - Part 2 (Practice).mp4
157.6 MB
12. Secure Software Architecture and Secure Coding/26. Broken Object Property Level Authorization - Part 2 (Practice).vtt
18.3 KB
12. Secure Software Architecture and Secure Coding/27. Unrestricted Resource Consumption - Part 1.mp4
227.76 MB
12. Secure Software Architecture and Secure Coding/27. Unrestricted Resource Consumption - Part 1.vtt
30.61 KB
12. Secure Software Architecture and Secure Coding/28. Unrestricted Resource Consumption - Part 2 (Practice).mp4
96.08 MB
12. Secure Software Architecture and Secure Coding/28. Unrestricted Resource Consumption - Part 2 (Practice).vtt
11.12 KB
12. Secure Software Architecture and Secure Coding/29. Broken Function Level Authorization - Part 1.mp4
156.23 MB
12. Secure Software Architecture and Secure Coding/29. Broken Function Level Authorization - Part 1.vtt
21.53 KB
12. Secure Software Architecture and Secure Coding/30. Broken Function Level Authorization - Part 2 (Practice).mp4
69.74 MB
12. Secure Software Architecture and Secure Coding/30. Broken Function Level Authorization - Part 2 (Practice).vtt
9.56 KB
12. Secure Software Architecture and Secure Coding/31. Unrestricted Access to Sensitive Business Flows - Part 1.mp4
181.14 MB
12. Secure Software Architecture and Secure Coding/31. Unrestricted Access to Sensitive Business Flows - Part 1.vtt
23.2 KB
12. Secure Software Architecture and Secure Coding/32. Unrestricted Access to Sensitive Business Flows - Part 2.mp4
212.88 MB
12. Secure Software Architecture and Secure Coding/32. Unrestricted Access to Sensitive Business Flows - Part 2.vtt
28.97 KB
12. Secure Software Architecture and Secure Coding/33. Unrestricted Access to Sensitive Business Flows - Part 3 (Practice).mp4
84.46 MB
12. Secure Software Architecture and Secure Coding/33. Unrestricted Access to Sensitive Business Flows - Part 3 (Practice).vtt
11.51 KB
12. Secure Software Architecture and Secure Coding/34. Server Side Request Forgery - SSRF (OWASP 2023 Updates).html
5.97 KB
12. Secure Software Architecture and Secure Coding/35. Security Misconfiguration (OWASP 2023 Updates).html
3.95 KB
12. Secure Software Architecture and Secure Coding/36. Improper Inventory Management - Part 1.mp4
233.59 MB
12. Secure Software Architecture and Secure Coding/36. Improper Inventory Management - Part 1.vtt
29.96 KB
12. Secure Software Architecture and Secure Coding/37. Improper Inventory Management - Part 2 (Practice).mp4
85.71 MB
12. Secure Software Architecture and Secure Coding/37. Improper Inventory Management - Part 2 (Practice).vtt
13.27 KB
12. Secure Software Architecture and Secure Coding/38. Unsafe Consumption of APIs - Part 1.mp4
141.47 MB
12. Secure Software Architecture and Secure Coding/38. Unsafe Consumption of APIs - Part 1.vtt
34.3 KB
12. Secure Software Architecture and Secure Coding/39. Unsafe Consumption of APIs - Part 2 (Practice).mp4
73.14 MB
12. Secure Software Architecture and Secure Coding/39. Unsafe Consumption of APIs - Part 2 (Practice).vtt
10.71 KB
12. Secure Software Architecture and Secure Coding/external-links/01. Common-Weakness-Enumeration-CWE-official-website.url
58 B
12. Secure Software Architecture and Secure Coding/external-links/02. Source-code-examples-from-the-lesson.url
178 B
12. Secure Software Architecture and Secure Coding/external-links/04. Source-code-examples-from-the-lesson.url
177 B
12. Secure Software Architecture and Secure Coding/external-links/05. Source-code-examples-from-the-lesson.url
177 B
12. Secure Software Architecture and Secure Coding/external-links/06. Source-code-examples-from-the-lesson.url
184 B
12. Secure Software Architecture and Secure Coding/external-links/07. Source-code-examples-from-the-lesson.url
184 B
12. Secure Software Architecture and Secure Coding/external-links/08. Source-code-examples-from-the-lesson.url
184 B
12. Secure Software Architecture and Secure Coding/external-links/11. NIST-800-123-Guide-to-General-Server-Security.url
103 B
12. Secure Software Architecture and Secure Coding/external-links/11. NIST-800-207-Zero-Trust-Architecture.url
99 B
12. Secure Software Architecture and Secure Coding/external-links/12. NIST-800-123-Guide-to-General-Server-Security.url
103 B
12. Secure Software Architecture and Secure Coding/external-links/12. NIST-800-207-Zero-Trust-Architecture.url
99 B
12. Secure Software Architecture and Secure Coding/external-links/13. Dependency-check-plugin.url
99 B
12. Secure Software Architecture and Secure Coding/external-links/13. pom.xml-from-the-lesson-with-OWASP-plugin.url
109 B
12. Secure Software Architecture and Secure Coding/external-links/16. Computer-Security-Incident-Handling-Guide.url
100 B
12. Secure Software Architecture and Secure Coding/external-links/20. Source-code-examples-from-the-lesson.url
137 B
12. Secure Software Architecture and Secure Coding/external-links/24. Source-code-examples-from-the-lesson.url
137 B
12. Secure Software Architecture and Secure Coding/external-links/26. Source-code-examples-from-the-lesson.url
180 B
12. Secure Software Architecture and Secure Coding/external-links/28. Source-code-examples-from-the-lesson.url
178 B
12. Secure Software Architecture and Secure Coding/external-links/30. Source-code-examples-from-the-lesson.url
179 B
12. Secure Software Architecture and Secure Coding/external-links/33. Source-code-examples-from-the-lesson.url
180 B
12. Secure Software Architecture and Secure Coding/external-links/37. Source-code-examples-from-the-lesson.url
178 B
12. Secure Software Architecture and Secure Coding/external-links/39. Source-code-examples-from-the-lesson.url
178 B
13. Logging in Java/01. Logging in Java Part 1 (Logging theory, Logging Levels, Java Logging Framework).mp4
243.39 MB
13. Logging in Java/01. Logging in Java Part 1 (Logging theory, Logging Levels, Java Logging Framework).vtt
30.66 KB
13. Logging in Java/02. Logging in Java Part 2 (Log4J, Logback, SLF4J).mp4
297 MB
13. Logging in Java/02. Logging in Java Part 2 (Log4J, Logback, SLF4J).vtt
30.83 KB
13. Logging in Java/external-links/01. java.util.logging-package-official-documentation.url
128 B
13. Logging in Java/external-links/01. Source-code-examples-from-the-lesson.url
178 B
13. Logging in Java/external-links/02. Log4J-2-Official-documentation-about-Appenders.url
84 B
13. Logging in Java/external-links/02. Log4J-2-Official-Documentation-about-Layouts.url
82 B
13. Logging in Java/external-links/02. Logback-configuration-documentation.url
74 B
13. Logging in Java/external-links/02. Source-code-examples-from-the-lesson.url
178 B
14. Cybersecurity Comprehensive Security Practices for Developers/01. Introduction to Cybersecurity p.1 - Overview of current cyber threat landscape.mp4
57.58 MB
14. Cybersecurity Comprehensive Security Practices for Developers/01. Introduction to Cybersecurity p.1 - Overview of current cyber threat landscape.vtt
9.46 KB
14. Cybersecurity Comprehensive Security Practices for Developers/02. Introduction to Cybersecurity p.2 - Case Studies, Threat Analysis Models & More.mp4
168.16 MB
14. Cybersecurity Comprehensive Security Practices for Developers/02. Introduction to Cybersecurity p.2 - Case Studies, Threat Analysis Models & More.vtt
22.28 KB
14. Cybersecurity Comprehensive Security Practices for Developers/03. Introduction to Cybersecurity p.3 - Security Controls, SDD, SOC.mp4
219.68 MB
14. Cybersecurity Comprehensive Security Practices for Developers/03. Introduction to Cybersecurity p.3 - Security Controls, SDD, SOC.vtt
26.49 KB
14. Cybersecurity Comprehensive Security Practices for Developers/04. General Security Tips Writing Code with Safety in Mind.mp4
139.08 MB
14. Cybersecurity Comprehensive Security Practices for Developers/04. General Security Tips Writing Code with Safety in Mind.vtt
20.04 KB
14. Cybersecurity Comprehensive Security Practices for Developers/05. Securing Inputs How to Validate and Sanitize Input Data.mp4
146.68 MB
14. Cybersecurity Comprehensive Security Practices for Developers/05. Securing Inputs How to Validate and Sanitize Input Data.vtt
24.73 KB
14. Cybersecurity Comprehensive Security Practices for Developers/06. Safeguarding Outputs Effective Encoding for Secure Systems.mp4
81.94 MB
14. Cybersecurity Comprehensive Security Practices for Developers/06. Safeguarding Outputs Effective Encoding for Secure Systems.vtt
15.19 KB
14. Cybersecurity Comprehensive Security Practices for Developers/07. Mastering Authentication Best Practices for Managing User Credentials.mp4
120.06 MB
14. Cybersecurity Comprehensive Security Practices for Developers/07. Mastering Authentication Best Practices for Managing User Credentials.vtt
29.97 KB
14. Cybersecurity Comprehensive Security Practices for Developers/08. Securing Sessions Preventing Hijacking and Improving Stability.mp4
233.06 MB
14. Cybersecurity Comprehensive Security Practices for Developers/08. Securing Sessions Preventing Hijacking and Improving Stability.vtt
26.4 KB
14. Cybersecurity Comprehensive Security Practices for Developers/09. Locking Down Access Implementing Robust Authorization Mechanisms.mp4
236.35 MB
14. Cybersecurity Comprehensive Security Practices for Developers/09. Locking Down Access Implementing Robust Authorization Mechanisms.vtt
29.17 KB
14. Cybersecurity Comprehensive Security Practices for Developers/10. Zero Trust Architecture and Modern Authentication.mp4
256.77 MB
14. Cybersecurity Comprehensive Security Practices for Developers/10. Zero Trust Architecture and Modern Authentication.vtt
28.6 KB
14. Cybersecurity Comprehensive Security Practices for Developers/11. Encryption Essentials Protecting Data with Cryptography - Part 1.mp4
148.31 MB
14. Cybersecurity Comprehensive Security Practices for Developers/11. Encryption Essentials Protecting Data with Cryptography - Part 1.vtt
20.93 KB
14. Cybersecurity Comprehensive Security Practices for Developers/12. Encryption Essentials Protecting Data with Cryptography - Part 2.mp4
189.95 MB
14. Cybersecurity Comprehensive Security Practices for Developers/12. Encryption Essentials Protecting Data with Cryptography - Part 2.vtt
21.99 KB
14. Cybersecurity Comprehensive Security Practices for Developers/13. Defending Data Strategies for Protecting Sensitive Information.mp4
186.23 MB
14. Cybersecurity Comprehensive Security Practices for Developers/13. Defending Data Strategies for Protecting Sensitive Information.vtt
25.1 KB
14. Cybersecurity Comprehensive Security Practices for Developers/14. Securing Databases Best Practices for Preventing SQL Injection.mp4
175.95 MB
14. Cybersecurity Comprehensive Security Practices for Developers/14. Securing Databases Best Practices for Preventing SQL Injection.vtt
25.36 KB
14. Cybersecurity Comprehensive Security Practices for Developers/15. Safe File Handling Preventing File-Based Vulnerabilities.mp4
215.85 MB
14. Cybersecurity Comprehensive Security Practices for Developers/15. Safe File Handling Preventing File-Based Vulnerabilities.vtt
28.06 KB
14. Cybersecurity Comprehensive Security Practices for Developers/16. Protecting Communication Channels Ensuring Secure Transmission of Data.mp4
154.61 MB
14. Cybersecurity Comprehensive Security Practices for Developers/16. Protecting Communication Channels Ensuring Secure Transmission of Data.vtt
22.62 KB
14. Cybersecurity Comprehensive Security Practices for Developers/17. Hardening System Configurations Reducing Attack Surface.mp4
199.91 MB
14. Cybersecurity Comprehensive Security Practices for Developers/17. Hardening System Configurations Reducing Attack Surface.vtt
25.94 KB
14. Cybersecurity Comprehensive Security Practices for Developers/18. Cloud Security Best Practices.mp4
86 MB
14. Cybersecurity Comprehensive Security Practices for Developers/18. Cloud Security Best Practices.vtt
26.25 KB
14. Cybersecurity Comprehensive Security Practices for Developers/19. Mobile Application Security.mp4
214.72 MB
14. Cybersecurity Comprehensive Security Practices for Developers/19. Mobile Application Security.vtt
28.37 KB
15. ===== EXAM TASK OWASP Top 10, Secure Coding & Logging =====/01. Exam Task Description and Solution (with reference to the source code).html
7.23 KB
16. REST Architecture/01. REST Architecture Overview and Key Principles.mp4
87.1 MB
16. REST Architecture/01. REST Architecture Overview and Key Principles.vtt
21.99 KB
16. REST Architecture/02. Naming Convention for RESTful Services.mp4
36.38 MB
16. REST Architecture/02. Naming Convention for RESTful Services.vtt
18.38 KB
16. REST Architecture/03. RESTful Service Implementation with Spring MVC.mp4
322.61 MB
16. REST Architecture/03. RESTful Service Implementation with Spring MVC.vtt
24.75 KB
16. REST Architecture/04. Review of tools for API testing & Postman Installation.mp4
61.44 MB
16. REST Architecture/04. Review of tools for API testing & Postman Installation.vtt
14.81 KB
16. REST Architecture/05. API Testing with Postman.mp4
63.01 MB
16. REST Architecture/05. API Testing with Postman.vtt
23.27 KB
16. REST Architecture/external-links/03. Source-code-of-examples-commit-with-changes-.url
131 B
16. REST Architecture/external-links/05. Commit-with-changes.url
131 B
16. REST Architecture/external-links/05. Postman-collections.url
134 B
17. UML Introduction/01. Introduction to UML.mp4
87.27 MB
17. UML Introduction/01. Introduction to UML.vtt
25.54 KB
18. Behavioral Diagrams/01. Use Case Diagram.mp4
163.42 MB
18. Behavioral Diagrams/01. Use Case Diagram.vtt
26.99 KB
18. Behavioral Diagrams/02. Sequence Diagram.mp4
180.54 MB
18. Behavioral Diagrams/02. Sequence Diagram.vtt
26.66 KB
18. Behavioral Diagrams/03. Activity Diagram.mp4
159.45 MB
18. Behavioral Diagrams/03. Activity Diagram.vtt
24.72 KB
18. Behavioral Diagrams/04. State Machine Diagram.mp4
64.15 MB
18. Behavioral Diagrams/04. State Machine Diagram.vtt
27.17 KB
18. Behavioral Diagrams/05. Communication Diagram (formerly known as Collaboration Diagram).mp4
133.33 MB
18. Behavioral Diagrams/05. Communication Diagram (formerly known as Collaboration Diagram).vtt
21.21 KB
18. Behavioral Diagrams/06. Timing Diagram.mp4
150.63 MB
18. Behavioral Diagrams/06. Timing Diagram.vtt
23.89 KB
18. Behavioral Diagrams/07. Interaction Overview Diagram.mp4
146.02 MB
18. Behavioral Diagrams/07. Interaction Overview Diagram.vtt
22.38 KB
18. Behavioral Diagrams/external-links/01. Diagrams.net-App.url
51 B
18. Behavioral Diagrams/external-links/01. Use-Case-Diagram-from-the-lesson.url
108 B
18. Behavioral Diagrams/external-links/02. Sequence-Diagram-User-Registration.url
108 B
18. Behavioral Diagrams/external-links/03. Activity-Diagram-Order-Processing-Workflow.url
108 B
18. Behavioral Diagrams/external-links/04. State-Machine-Diagram-Online-Shop.url
108 B
18. Behavioral Diagrams/external-links/05. Communication-Diagram-Online-Shop.url
108 B
18. Behavioral Diagrams/external-links/06. Timing-Diagram-Website-Loading.url
108 B
18. Behavioral Diagrams/external-links/07. Interaction-Overview-Diagram-Inspection.url
108 B
19. Structural Diagrams/01. Class Diagram.mp4
274.08 MB
19. Structural Diagrams/01. Class Diagram.vtt
39.79 KB
19. Structural Diagrams/02. Object Diagram.mp4
123.88 MB
19. Structural Diagrams/02. Object Diagram.vtt
18.63 KB
19. Structural Diagrams/03. Component Diagram.mp4
171.63 MB
19. Structural Diagrams/03. Component Diagram.vtt
27.14 KB
19. Structural Diagrams/04. Package Diagram.mp4
93.87 MB
19. Structural Diagrams/04. Package Diagram.vtt
24.27 KB
19. Structural Diagrams/05. Deployment Diagram.mp4
165.34 MB
19. Structural Diagrams/05. Deployment Diagram.vtt
22.53 KB
19. Structural Diagrams/06. Composite Structure Diagram.mp4
179.16 MB
19. Structural Diagrams/06. Composite Structure Diagram.vtt
26.74 KB
19. Structural Diagrams/07. Profile Diagram.mp4
154.35 MB
19. Structural Diagrams/07. Profile Diagram.vtt
23.78 KB
19. Structural Diagrams/external-links/01. Class-Diagram-Order-Processing.url
108 B
19. Structural Diagrams/external-links/02. Object-Diagram-Company-Structure.url
108 B
19. Structural Diagrams/external-links/03. Component-Diagram-Order-Processing.url
108 B
19. Structural Diagrams/external-links/04. Package-Diagram-Order-Processing.url
108 B
19. Structural Diagrams/external-links/05. Deployment-Diagram-Example.url
108 B
19. Structural Diagrams/external-links/06. Composite-Structure-Diagram-PC.url
108 B
19. Structural Diagrams/external-links/07. Profile-Diagram-EJB-Profile.url
108 B
20. Metrics & KPIs to Monitor and Control Software Development Process/01. Why this section is in this course and why it is important.html
2.74 KB
20. Metrics & KPIs to Monitor and Control Software Development Process/02. Metric, KPI & OKR.mp4
155.35 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/02. Metric, KPI & OKR.vtt
25.54 KB
20. Metrics & KPIs to Monitor and Control Software Development Process/03. RAG Status to Present KPI.html
4.28 KB
20. Metrics & KPIs to Monitor and Control Software Development Process/04. Introduction to Engineering Excellence Metrics & KPIs.mp4
46.49 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/04. Introduction to Engineering Excellence Metrics & KPIs.vtt
5.61 KB
20. Metrics & KPIs to Monitor and Control Software Development Process/05. Development Metrics & KPIs Tech Debt Ratio & Index, Cyclomatic Complexity.mp4
243.79 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/05. Development Metrics & KPIs Tech Debt Ratio & Index, Cyclomatic Complexity.vtt
29.53 KB
20. Metrics & KPIs to Monitor and Control Software Development Process/06. Development Metrics & KPIs Unit Test Related Metrics - Part 1.mp4
119.77 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/06. Development Metrics & KPIs Unit Test Related Metrics - Part 1.vtt
17.38 KB
20. Metrics & KPIs to Monitor and Control Software Development Process/07. Development Metrics & KPIs Unit Test Related Metrics - Part 2.mp4
62.5 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/07. Development Metrics & KPIs Unit Test Related Metrics - Part 2.vtt
25.08 KB
20. Metrics & KPIs to Monitor and Control Software Development Process/08. Development Metrics & KPIs Duplicate Code & Commented Code Index.mp4
194.34 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/08. Development Metrics & KPIs Duplicate Code & Commented Code Index.vtt
25.87 KB
20. Metrics & KPIs to Monitor and Control Software Development Process/09. Development Metrics & KPIs Code Review Feedback Loop Time & Code Reviews.mp4
173.16 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/09. Development Metrics & KPIs Code Review Feedback Loop Time & Code Reviews.vtt
25.85 KB
20. Metrics & KPIs to Monitor and Control Software Development Process/10. Development Metrics & KPIs Rules Compliance Index (RCI) & Violations.mp4
204.41 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/10. Development Metrics & KPIs Rules Compliance Index (RCI) & Violations.vtt
29.13 KB
20. Metrics & KPIs to Monitor and Control Software Development Process/11. Development Metrics & KPIs Integration Test Coverage & End-to-End Test Coverage.mp4
203.62 MB
20. Metrics & KPIs to Monitor and Control Software Development Process/11. Development Metrics & KPIs Integration Test Coverage & End-to-End Test Coverage.vtt
27.15 KB
21. Code Review Fundamentals/01. Introduction to Code Reviews.mp4
123.79 MB
21. Code Review Fundamentals/01. Introduction to Code Reviews.vtt
15.4 KB
21. Code Review Fundamentals/02. Basics of Code Review Process.mp4
169.04 MB
21. Code Review Fundamentals/02. Basics of Code Review Process.vtt
27.72 KB
22. Tools, Automation, and Industry Best Practices/01. Tools for Code Review and Code Analysis.mp4
174.58 MB
22. Tools, Automation, and Industry Best Practices/01. Tools for Code Review and Code Analysis.vtt
26.94 KB
22. Tools, Automation, and Industry Best Practices/02. Part 1 - Checkstyle Adhering Coding Standards.mp4
119.98 MB
22. Tools, Automation, and Industry Best Practices/02. Part 1 - Checkstyle Adhering Coding Standards.vtt
17.04 KB
22. Tools, Automation, and Industry Best Practices/03. Part 2 - Checkstyle Adhering Coding Standards.mp4
63.63 MB
22. Tools, Automation, and Industry Best Practices/03. Part 2 - Checkstyle Adhering Coding Standards.vtt
16.27 KB
22. Tools, Automation, and Industry Best Practices/04. PMD Static Code Analysis.mp4
206.85 MB
22. Tools, Automation, and Industry Best Practices/04. PMD Static Code Analysis.vtt
24.82 KB
22. Tools, Automation, and Industry Best Practices/external-links/02. All-resources-and-links-for-the-lesson.url
122 B
22. Tools, Automation, and Industry Best Practices/external-links/03. All-resources-and-links-for-the-lesson.url
122 B
22. Tools, Automation, and Industry Best Practices/external-links/04. All-resources-and-links-for-the-lesson.url
122 B
23. Advanced Code Review Strategies/01. Code Review Guidelines & Contribution Policy.mp4
200.07 MB
23. Advanced Code Review Strategies/01. Code Review Guidelines & Contribution Policy.vtt
28.38 KB
23. Advanced Code Review Strategies/02. Coding Standards, Code Quality & Consistency.mp4
185.05 MB
23. Advanced Code Review Strategies/02. Coding Standards, Code Quality & Consistency.vtt
28.67 KB
23. Advanced Code Review Strategies/03. Provide Feedback like a Pro.mp4
138.15 MB
23. Advanced Code Review Strategies/03. Provide Feedback like a Pro.vtt
21.98 KB
23. Advanced Code Review Strategies/04. Security Considerations During Code Review.mp4
49.53 MB
23. Advanced Code Review Strategies/04. Security Considerations During Code Review.vtt
18.5 KB
23. Advanced Code Review Strategies/05. Scalability Principles in Code.mp4
109.61 MB
23. Advanced Code Review Strategies/05. Scalability Principles in Code.vtt
16.16 KB
23. Advanced Code Review Strategies/external-links/01. All-documents-shared-in-the-lesson.url
110 B
23. Advanced Code Review Strategies/external-links/02. Coding-Standards-and-Guidelines.url
108 B
24. Bonus section/01. Bonus lesson.mp4
10.98 MB
24. Bonus section/01. Bonus lesson.vtt
3.7 KB
24. Bonus section/external-links/01. Facebook-Andrii-Piatakha.url
66 B
24. Bonus section/external-links/01. Facebook-Page-with-Udemy-Coupons-from-Learn-IT-University.url
69 B
24. Bonus section/external-links/01. Free-book-about-AI-by-Andrii-Piatakha-sci-fi-.url
68 B
24. Bonus section/external-links/01. Instagram-Andrii-Piatakha.url
68 B
24. Bonus section/external-links/01. IT-Bulls-Company-Official-Web-Site.url
46 B
24. Bonus section/external-links/01. Java-Course-From-zero-to-first-job.url
128 B
24. Bonus section/external-links/01. LinkedIn-Andrii-PIatakha.url
70 B
24. Bonus section/external-links/01. LinkedIn-IT-Bulls-company-official-page.url
68 B
24. Bonus section/external-links/01. Public-profile-of-Tutor-with-list-of-all-courses-Andrii-Piatakha.url
69 B
24. Bonus section/external-links/01. Support-me-on-Patreon-by-getting-access-to-EXCLUSIVE-content.url
65 B
24. Bonus section/external-links/01. Telegram-Channel-with-Latest-News-and-important-information.url
122 B

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。