Tags
Language
Tags
January 2025
Su Mo Tu We Th Fr Sa
29 30 31 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1

Web Application Vulnerabilities, Security With Spring Boot 3

Posted By: ELK1nG
Web Application Vulnerabilities, Security With Spring Boot 3

Web Application Vulnerabilities, Security With Spring Boot 3
Published 1/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.09 GB | Duration: 1h 15m

Web application vulnerabilities, security with Spring Boot 3, Spring security 6

What you'll learn

Web application vulnerabilities

Web application security attacks

Spring boot 3 with Spring security 6

Securing web applications

Requirements

Java , Spring boot

Description

Hello Friends,This course is all about web application vulnerabilities and how to secure them against various types of security attacks.Web application security is as important as their development but many developers specially new developers don't have much idea about these security vulnerabilities. So I have tried to show these vulnerabilities and how to exploit them using code examples. This code is also available at GitHub and it's repository link is attached to courses.I did not focus much on creating basic Spring application code like controllers. services, repository and entities because this course is not about Spring or Spring Boot but securing web application against security attacks.This is why I have explained only that part of code which is necessary to understand security attacks, how to exploit them and how to secure application against those attacks.This course will benefit front end and back end developers, testers and people working in Cyber security domain.Thanks you very much and I hope you find this course useful. I will keep adding and updating course. If you have any questions, fell free to ask it in Q&A section. I will try to answer them as soon as possible.Thank you again and best of luck!

Overview

Section 1: Introduction

Lecture 1 Introduction

Lecture 2 Who is this course for?

Section 2: SQL Injection

Lecture 3 SQL Injection Introduction

Lecture 4 SQL Injection Code Demo

Lecture 5 Securing application against SQL Injection attack

Section 3: Cross Site Scripting (XSS)

Lecture 6 Introduction

Lecture 7 XSS Demo

Lecture 8 Securing application against XSS 1

Lecture 9 Securing application against XSS 2

Lecture 10 Securing application against XSS 3

Section 4: Cross Site Request Forgery (CSRF)

Lecture 11 Introduction

Lecture 12 CSRF Demo

Lecture 13 Securing application against CSRF attack

Section 5: ClickJacking

Lecture 14 Introduction

Lecture 15 Clickjacking Demo

Lecture 16 Securing application against Clickjacking

Section 6: Broken Authentication

Lecture 17 Broken authentication and how to mitigate its risks

Section 7: Final Words

Lecture 18 Final Words and some suggestions

Java Developers, Spring developers, Cyber security, Testing application for security vulnerabilities