RAR-files |
ilearn-saaccdio.rar |
350,000,000 |
9C7C6F14 |
ilearn-saaccdio.r00 |
350,000,000 |
29C21AD5 |
ilearn-saaccdio.r01 |
350,000,000 |
766B3110 |
ilearn-saaccdio.r02 |
350,000,000 |
C1B6520D |
ilearn-saaccdio.r03 |
350,000,000 |
8BF57744 |
ilearn-saaccdio.r04 |
350,000,000 |
5D0C6059 |
ilearn-saaccdio.r05 |
350,000,000 |
BCC1C0DC |
ilearn-saaccdio.r06 |
350,000,000 |
42703190 |
ilearn-saaccdio.r07 |
350,000,000 |
4AEF09DA |
ilearn-saaccdio.r08 |
350,000,000 |
DFF83C16 |
ilearn-saaccdio.r09 |
350,000,000 |
F76D1CD8 |
ilearn-saaccdio.r10 |
350,000,000 |
550F720F |
ilearn-saaccdio.r11 |
350,000,000 |
3C96C31A |
ilearn-saaccdio.r12 |
350,000,000 |
DDFC55B9 |
ilearn-saaccdio.r13 |
350,000,000 |
DEE2B64F |
ilearn-saaccdio.r14 |
350,000,000 |
E114FAD2 |
ilearn-saaccdio.r15 |
350,000,000 |
AF0A6BDF |
ilearn-saaccdio.r16 |
350,000,000 |
B6B9F0ED |
ilearn-saaccdio.r17 |
350,000,000 |
F79917C5 |
ilearn-saaccdio.r18 |
350,000,000 |
B2FB0E6D |
ilearn-saaccdio.r19 |
350,000,000 |
924F055F |
ilearn-saaccdio.r20 |
350,000,000 |
3A775FB1 |
ilearn-saaccdio.r21 |
350,000,000 |
5A707E27 |
ilearn-saaccdio.r22 |
350,000,000 |
8E834BC6 |
ilearn-saaccdio.r23 |
350,000,000 |
3D7302A0 |
ilearn-saaccdio.r24 |
177,343,795 |
B136F7A2 |
|
Total size: |
8,927,343,795 |
|
|
Archived
files |
7. Liskov Substitution Principle.mp4
[bd056a69c256c2bc]
|
51,099,871 |
EAB0118C |
8. Interface Segregation Principle.mp4
[bc3cf2203cde7b30]
|
40,650,777 |
E323BD5E |
9. Dependency Inversion Principle.mp4
[fbade4bc09668ad2]
|
63,312,074 |
DA7D1522 |
10. Clean Code Architecture, Coupling & Cohesion.mp4
[f802b48ee9be5e28]
|
101,056,547 |
EE3B65C4 |
11. Tell, Don’t Ask Pricniple & Data Structures.mp4
[29f2dbbcaa9b960d]
|
109,133,902 |
36D8DD80 |
12. Law of Demeter.mp4
[6880fd55fdb22c52]
|
46,870,641 |
39B65F4C |
13. Packaging Pricniples p.1 Cohesion Principles.mp4
[832ad3a25c185f48]
|
84,567,686 |
1E658BAA |
14. Packaging Pricniples p.2 Coupling Principles and Others.mp4
[d2c92a9ec01f7fc8]
|
137,731,916 |
A834C322 |
15. GoF Patterns Overview.mp4
[6a107ad8efa94ab9]
|
64,200,142 |
C8D37477 |
16. Creational Patterns.mp4
[9df3a4893f6e05b5]
|
278,933,981 |
D6239F88 |
17. Structural Patterns, p.1.mp4
[f743669e8bfb1fc2]
|
221,174,810 |
090AD49D |
18. Structural Patterns, p.2.mp4
[1040139d9b2a6af0]
|
202,809,409 |
DD2FBE69 |
19. Behevioral Patterns, p.1.mp4
[ba05e97ada5b025f]
|
283,401,167 |
2294AF02 |
20. Behevioral Patterns, p.2.mp4
[ffdcfd312a13a8b3]
|
297,969,022 |
8915C9D8 |
21. Behevioral Patterns, p.3.mp4
[dc18b50f38f8f177]
|
194,165,161 |
0EB3395F |
22. Test-driven development Theory.mp4
[e251e4381f9bb366]
|
112,209,070 |
4F22DBE7 |
23. BDD & ATTD.mp4
[948bdd178e0afdae]
|
75,511,200 |
3932DFF0 |
24. TDD, BDD & ATTD - Practice.mp4
[f471ef76c072ea5b]
|
83,353,529 |
1805EEBF |
26. Databases Overview - Part 1.mp4
[9de5201f83e78333]
|
135,573,781 |
6DCA4A43 |
27. Databases Overview - Part 2.mp4
[6257fe9ed6359a10]
|
121,739,125 |
92BBE47E |
28. MySQL Overview & Installation (including Workbench Installation).mp4
[e7d39c372f7a635e]
|
128,584,817 |
1BC09CC3 |
29. Relational Databases Basic Concepts.mp4
[c50000612abe316b]
|
150,366,535 |
D91F375A |
30. Create Schema & Table Naming, Collation, Engines, Types, Column Properties.mp4
[b11bdfa7674c9fd3]
|
271,622,212 |
3A12C7AE |
31. Database Modelling & Design Conceptual, Logical and Physical Data Models.mp4
[7cb44876dde1056f]
|
132,534,673 |
469C4C73 |
32. Referential Integrity Foreign Key Constraint & Cascading Operations.mp4
[33d888f79c5dd069]
|
178,498,308 |
BAED7C26 |
33. Indexes in Databases.mp4
[f50fb07e25a17d10]
|
123,557,931 |
5733BD31 |
34. DAO (Data Access Object) Design Pattern.mp4
[5938bfdb7c5a92d7]
|
165,367,047 |
CDB9BE43 |
35. MVC Design Pattern.mp4
[4d38115c418fcf25]
|
86,282,890 |
C0C5976C |
36. Layered Architecture.mp4
[d97bcbcfaa1ba5d6]
|
138,683,946 |
99B43B31 |
37. Exam task review and solution.mp4
[1dfa1cc580253f2f]
|
221,558,749 |
BC2E4ADD |
38. Task Overview.mp4
[b8eac62456d221ca]
|
235,893,048 |
88C197B1 |
39. Solution Overview Part 1.mp4
[8e1b4b846a29a195]
|
333,326,124 |
4CD8EC9C |
40. Solution Overview Part 2.mp4
[26ea9a5da135c5b]
|
244,724,333 |
C601BA22 |
41. Solution Overview Part 3.mp4
[988b71c4541030af]
|
151,646,874 |
0106ED44 |
42. Connection Pooling DBCP, C3P0, HikariCP & Tomcat Connection Pool with JNDI.mp4
[daa9367628ebaeeb]
|
263,049,365 |
B1847958 |
43. OWASP Top 10 Overview.mp4
[f3b48fdc513ded54]
|
124,987,518 |
3D4BC388 |
44. Broken Access Control.mp4
[b546d054f4f0a9f2]
|
325,804,071 |
B2286C7F |
45. Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).mp4
[54d5003e01d87b60]
|
98,160,432 |
69B211FF |
46. Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).mp4
[b896d5c6cc1504ac]
|
144,326,014 |
BC05C524 |
47. Cryptography Failures (Examples, Password Encryption, Hashing, Salting).mp4
[7d0a41594826e7e4]
|
161,747,529 |
51C888B2 |
48. Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).mp4
[2ed052b2ce85179a]
|
117,208,776 |
6AF35598 |
49. Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).mp4
[195771391d5763eb]
|
132,798,311 |
188AF66F |
50. Injection (XPath Injection, Log Injection, Input Validation).mp4
[108f41baa998d0af]
|
93,083,892 |
9E30A9F4 |
51. Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).mp4
[7cf271b712dc945b]
|
107,116,534 |
22CB7311 |
52. Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).mp4
[4a510ca42e7711d3]
|
135,389,339 |
0A0CD2A5 |
53. Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).mp4
[6191fc72581cd844]
|
103,337,161 |
5C761698 |
54. Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).mp4
[d3378696264e46fd]
|
202,005,955 |
DF487089 |
55. Vulnerable & Outdated Components.mp4
[866474934c860cd3]
|
187,489,759 |
D74EF151 |
56. Identification & Authentication Failures.mp4
[fec6e325bf458584]
|
212,658,758 |
A672D142 |
57. Software & Data Integrity Failures.mp4
[46c7f822e94e5157]
|
109,292,998 |
1B518350 |
58. Security Logging & Monitoring Failures.mp4
[1002a0c62cb3b9f9]
|
141,632,099 |
8D5E2C65 |
59. Server-Side Request Forgery (SSRF).mp4
[218fa4108fff4303]
|
128,926,117 |
A00CBFB7 |
60. Logging in Java Part 1 (Logging theory, Logging Levels, Java Logging Framework).mp4
[71b0d30e3775b2b7]
|
287,359,115 |
2DC71927 |
61. Logging in Java Part 2 (Log4J, Logback, SLF4J).mp4
[1820196c73ec270c]
|
305,134,855 |
4CE37521 |
63. Bonus lesson.mp4
[bac42166b00985db]
|
38,921,758 |
C8025ABD |
1. Communication plan.mp4
[1ea47e3bea9b592]
|
51,519,885 |
3DA1FBFE |
2. Unlimited access to 'Learn IT' application for students.mp4
[66b0a185c277e51d]
|
46,685,320 |
72805042 |
4. SOLID principles overview & Single Responsibility Principle.mp4
[6065d528213bd408]
|
69,695,200 |
3BB65C59 |
6. Open Closed Principle.mp4
[78c61475e2bbc6fb]
|
70,893,525 |
B869AC70 |
|
Total size: |
8,927,335,584 |
|
|