Node.js - Security
File List
- Exercise Files/Ex_Files_NodeJS_Security.zip 153.1 MB
- 2.1. Security Overview/04.OWASP top 10 in Node.js.mp4 44.5 MB
- 2.1. Security Overview/03.Introduction to OWASP and other sources.mp4 13.7 MB
- 6.5. Tools for Testing/19.Introduction to OWASP dependency check.mp4 12.4 MB
- 4.3. Best Practices - Data/11.Data handling with type and validation.mp4 11.7 MB
- 3.2. Best Practices - Packages/09.Maintain package dependencies.mp4 10.7 MB
- 3.2. Best Practices - Packages/08.Hands-on base template overview.mp4 10.6 MB
- 5.4. Best Practices - Server Level/16.Rate limiting against DoS attacks.mp4 10.6 MB
- 4.3. Best Practices - Data/13.Set proper HTTP headers with Helmet.mp4 9.4 MB
- 6.5. Tools for Testing/20.Find vulnerabilities with Snyk.mp4 9.4 MB
- 5.4. Best Practices - Server Level/18.Use cookie attributes.mp4 9.0 MB
- 1.Introduction/01.Securing your Node.js projects.mp4 6.9 MB
- 5.4. Best Practices - Server Level/17.Use csurf to prevent CSRF attacks.mp4 5.5 MB
- 4.3. Best Practices - Data/14.Encrypt user data and session management.mp4 5.5 MB
- 3.2. Best Practices - Packages/10.Add two-factor and read-only tokens with npm.mp4 5.4 MB
- 2.1. Security Overview/05.Overview of cross-site scripting.mp4 5.1 MB
- 6.5. Tools for Testing/21.Penetration testing with Burp.mp4 4.0 MB
- 4.3. Best Practices - Data/12.Use prepared statements for SQL_NoSQL.mp4 3.1 MB
- 5.4. Best Practices - Server Level/15.Use secure HTTPS protocol.mp4 2.2 MB
- 2.1. Security Overview/07.Overview of server-side injection.mp4 1.9 MB
- 2.1. Security Overview/06.Overview of denial of service.mp4 1.8 MB
- 1.Introduction/02.What you should know.mp4 1.4 MB
- 7.Conclusion/22.Next steps.mp4 1.4 MB
- 3.2. Best Practices - Packages/08.Hands-on base template overview.en.srt 7.4 KB
- 4.3. Best Practices - Data/11.Data handling with type and validation.en.srt 7.1 KB
- 3.2. Best Practices - Packages/09.Maintain package dependencies.en.srt 6.9 KB
- 6.5. Tools for Testing/19.Introduction to OWASP dependency check.en.srt 5.8 KB
- 5.4. Best Practices - Server Level/16.Rate limiting against DoS attacks.en.srt 5.8 KB
- 6.5. Tools for Testing/20.Find vulnerabilities with Snyk.en.srt 5.4 KB
- 2.1. Security Overview/03.Introduction to OWASP and other sources.en.srt 4.9 KB
- 4.3. Best Practices - Data/13.Set proper HTTP headers with Helmet.en.srt 4.8 KB
- 5.4. Best Practices - Server Level/18.Use cookie attributes.en.srt 4.2 KB
- 2.1. Security Overview/04.OWASP top 10 in Node.js.en.srt 4.2 KB
- 4.3. Best Practices - Data/14.Encrypt user data and session management.en.srt 4.0 KB
- 3.2. Best Practices - Packages/10.Add two-factor and read-only tokens with npm.en.srt 3.5 KB
- 2.1. Security Overview/05.Overview of cross-site scripting.en.srt 3.5 KB
- 5.4. Best Practices - Server Level/17.Use csurf to prevent CSRF attacks.en.srt 2.8 KB
- 5.4. Best Practices - Server Level/15.Use secure HTTPS protocol.en.srt 2.6 KB
- 4.3. Best Practices - Data/12.Use prepared statements for SQL_NoSQL.en.srt 2.2 KB
- 2.1. Security Overview/07.Overview of server-side injection.en.srt 2.2 KB
- 2.1. Security Overview/06.Overview of denial of service.en.srt 2.2 KB
- 1.Introduction/01.Securing your Node.js projects.en.srt 2.0 KB
- 6.5. Tools for Testing/21.Penetration testing with Burp.en.srt 1.9 KB
- 7.Conclusion/22.Next steps.en.srt 1.6 KB
- 1.Introduction/02.What you should know.en.srt 1.4 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.