Pluralsight - What Every Developer Must Know About HTTPS By Troy Hunt
    
    File List
    
        
            
                
                    - 04. Securing the Application/5. Understanding Mixed Content.mp4  38.0 MB
 
                
                    - 05. Overcoming (Perceived) Barriers to HTTPS/7. Using Cloudflare for Free.mp4  36.4 MB
 
                
                    - 05. Overcoming (Perceived) Barriers to HTTPS/6. Using Let’s Encrypt for Free.mp4  33.4 MB
 
                
                    - 03. HTTPS Fundamentals/6. Intercepting HTTPS Traffic During Debugging.mp4  31.7 MB
 
                
                    - 06. Beyond the Basics/7. HTTPS Blind Spots.mp4  30.7 MB
 
                
                    - 04. Securing the Application/6. Using a CSP to Upgrade or Block Insecure Requests.mp4  29.1 MB
 
                
                    - 04. Securing the Application/4. Preloading HSTS.mp4  27.5 MB
 
                
                    - 05. Overcoming (Perceived) Barriers to HTTPS/3. Making HTTPS Go Fast on Clients.mp4  27.1 MB
 
                
                    - 03. HTTPS Fundamentals/2. Certificate Authorities.mp4  26.9 MB
 
                
                    - 06. Beyond the Basics/6. Other Reasons to Adopt HTTPS.mp4  24.5 MB
 
                
                    - 06. Beyond the Basics/4. SSL Labs.mp4  21.5 MB
 
                
                    - 06. Beyond the Basics/8. The Tide Is Rapidly Turning.mp4  20.1 MB
 
                
                    - 04. Securing the Application/2. Redirecting from HTTP to HTTPS.mp4  18.8 MB
 
                
                    - 05. Overcoming (Perceived) Barriers to HTTPS/2. The Impact of HTTPS on Server Performance.mp4  17.2 MB
 
                
                    - 04. Securing the Application/7. Secure Cookies.mp4  15.5 MB
 
                
                    - 02. The HTTPS Value Proposition/09. The Big Browser Shift.mp4  14.4 MB
 
                
                    - 04. Securing the Application/3. HTTP Strict Transport Security (HSTS).mp4  13.4 MB
 
                
                    - 05. Overcoming (Perceived) Barriers to HTTPS/4. HTTPS Adoption of Downstream Services.mp4  12.0 MB
 
                
                    - 02. The HTTPS Value Proposition/03. Understanding a Man in the Middle Attack.mp4  11.7 MB
 
                
                    - 02. The HTTPS Value Proposition/02. The Rise and Rise of HTTPS.mp4  11.4 MB
 
                
                    - 06. Beyond the Basics/5. Extended Validation Certificates.mp4  11.2 MB
 
                
                    - 03. HTTPS Fundamentals/5. Issuing Certs for Development.mp4  9.8 MB
 
                
                    - 02. The HTTPS Value Proposition/04. The Importance of Confidentiality.mp4  9.5 MB
 
                
                    - 02. The HTTPS Value Proposition/05. The Importance of Integrity.mp4  9.1 MB
 
                
                    - 03. HTTPS Fundamentals/3. SSL and TLS.mp4  8.2 MB
 
                
                    - 06. Beyond the Basics/3. Public Key Pinning.mp4  8.0 MB
 
                
                    - 02. The HTTPS Value Proposition/07. Abuses of Unencrypted Traffic Are Everywhere.mp4  7.7 MB
 
                
                    - 06. Beyond the Basics/2. TLS and HTTPS Acronyms.mp4  6.8 MB
 
                
                    - 02. The HTTPS Value Proposition/06. The Importance of Authenticity.mp4  6.7 MB
 
                
                    - 04. Securing the Application/8. Summary.mp4  5.1 MB
 
                
                    - 02. The HTTPS Value Proposition/10. Summary.mp4  4.9 MB
 
                
                    - 05. Overcoming (Perceived) Barriers to HTTPS/5. Cost and Complexity.mp4  4.9 MB
 
                
                    - 05. Overcoming (Perceived) Barriers to HTTPS/8. Summary.mp4  4.9 MB
 
                
                    - 06. Beyond the Basics/9. Summary.mp4  4.8 MB
 
                
                    - 01. Course Overview/1. Course Overview.mp4  4.1 MB
 
                
                    - 03. HTTPS Fundamentals/7. Using badssl.com.mp4  4.0 MB
 
                
                    - 02. The HTTPS Value Proposition/01. Overview.mp4  4.0 MB
 
                
                    - 06. Beyond the Basics/1. Overview.mp4  4.0 MB
 
                
                    - 02. The HTTPS Value Proposition/08. The (Perceived) Barriers to HTTPS.mp4  3.8 MB
 
                
                    - 05. Overcoming (Perceived) Barriers to HTTPS/1. Overview.mp4  3.5 MB
 
                
                    - 04. Securing the Application/1. Overview.mp4  3.4 MB
 
                
                    - 03. HTTPS Fundamentals/1. Overview.mp4  3.0 MB
 
                
                    - 03. HTTPS Fundamentals/4. The TLS Handshake.mp4  2.7 MB
 
                
                    - 03. HTTPS Fundamentals/8. Summary.mp4  2.3 MB
 
                
                    - exercise.zip  1.8 MB
 
                
                    - 05. Overcoming (Perceived) Barriers to HTTPS/7. Using Cloudflare for Free.vtt  14.8 KB
 
                
                    - 05. Overcoming (Perceived) Barriers to HTTPS/6. Using Let’s Encrypt for Free.vtt  12.7 KB
 
                
                    - 04. Securing the Application/5. Understanding Mixed Content.vtt  11.7 KB
 
                
                    - 02. The HTTPS Value Proposition/03. Understanding a Man in the Middle Attack.vtt  9.4 KB
 
                
                    - 04. Securing the Application/6. Using a CSP to Upgrade or Block Insecure Requests.vtt  8.9 KB
 
                
                    - 03. HTTPS Fundamentals/2. Certificate Authorities.vtt  8.8 KB
 
                
                    - 04. Securing the Application/4. Preloading HSTS.vtt  8.5 KB
 
                
                    - 04. Securing the Application/2. Redirecting from HTTP to HTTPS.vtt  8.4 KB
 
                
                    - 06. Beyond the Basics/5. Extended Validation Certificates.vtt  8.4 KB
 
                
                    - 05. Overcoming (Perceived) Barriers to HTTPS/3. Making HTTPS Go Fast on Clients.vtt  8.2 KB
 
                
                    - 06. Beyond the Basics/4. SSL Labs.vtt  8.2 KB
 
                
                    - 06. Beyond the Basics/3. Public Key Pinning.vtt  7.2 KB
 
                
                    - 05. Overcoming (Perceived) Barriers to HTTPS/4. HTTPS Adoption of Downstream Services.vtt  7.2 KB
 
                
                    - 03. HTTPS Fundamentals/6. Intercepting HTTPS Traffic During Debugging.vtt  7.1 KB
 
                
                    - 06. Beyond the Basics/7. HTTPS Blind Spots.vtt  6.9 KB
 
                
                    - 02. The HTTPS Value Proposition/09. The Big Browser Shift.vtt  6.4 KB
 
                
                    - 06. Beyond the Basics/2. TLS and HTTPS Acronyms.vtt  6.0 KB
 
                
                    - 06. Beyond the Basics/6. Other Reasons to Adopt HTTPS.vtt  5.9 KB
 
                
                    - 05. Overcoming (Perceived) Barriers to HTTPS/2. The Impact of HTTPS on Server Performance.vtt  5.8 KB
 
                
                    - 04. Securing the Application/3. HTTP Strict Transport Security (HSTS).vtt  5.7 KB
 
                
                    - 04. Securing the Application/7. Secure Cookies.vtt  5.6 KB
 
                
                    - 03. HTTPS Fundamentals/3. SSL and TLS.vtt  5.4 KB
 
                
                    - 02. The HTTPS Value Proposition/06. The Importance of Authenticity.vtt  5.4 KB
 
                
                    - 05. Overcoming (Perceived) Barriers to HTTPS/5. Cost and Complexity.vtt  5.1 KB
 
                
                    - 02. The HTTPS Value Proposition/08. The (Perceived) Barriers to HTTPS.vtt  4.7 KB
 
                
                    - 02. The HTTPS Value Proposition/02. The Rise and Rise of HTTPS.vtt  4.4 KB
 
                
                    - 02. The HTTPS Value Proposition/07. Abuses of Unencrypted Traffic Are Everywhere.vtt  4.2 KB
 
                
                    - 02. The HTTPS Value Proposition/05. The Importance of Integrity.vtt  4.2 KB
 
                
                    - 06. Beyond the Basics/8. The Tide Is Rapidly Turning.vtt  4.0 KB
 
                
                    - 03. HTTPS Fundamentals/5. Issuing Certs for Development.vtt  3.9 KB
 
                
                    - 04. Securing the Application/8. Summary.vtt  3.7 KB
 
                
                    - 06. Beyond the Basics/9. Summary.vtt  3.7 KB
 
                
                    - 05. Overcoming (Perceived) Barriers to HTTPS/8. Summary.vtt  3.5 KB
 
                
                    - 02. The HTTPS Value Proposition/10. Summary.vtt  3.4 KB
 
                
                    - 02. The HTTPS Value Proposition/04. The Importance of Confidentiality.vtt  3.2 KB
 
                
                    - 02. The HTTPS Value Proposition/01. Overview.vtt  3.2 KB
 
                
                    - 06. Beyond the Basics/1. Overview.vtt  3.1 KB
 
                
                    - 03. HTTPS Fundamentals/4. The TLS Handshake.vtt  3.1 KB
 
                
                    - 03. HTTPS Fundamentals/1. Overview.vtt  3.1 KB
 
                
                    - 04. Securing the Application/1. Overview.vtt  2.7 KB
 
                
                    - playlist.m3u  2.6 KB
 
                
                    - 05. Overcoming (Perceived) Barriers to HTTPS/1. Overview.vtt  2.4 KB
 
                
                    - 03. HTTPS Fundamentals/7. Using badssl.com.vtt  2.4 KB
 
                
                    - 01. Course Overview/1. Course Overview.vtt  2.1 KB
 
                
                    - 03. HTTPS Fundamentals/8. Summary.vtt  2.0 KB
 
                
            
        
     
    Download Torrent
    
    Related Resources
    
    Copyright Infringement
    
        If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.