Udemy - Software Architecture and Clean Code Design in OOP 2022-10
File List
- 9. ===== Exam MVC & Layered Architecture =====/2. Solution Overview Part 1.mp4 317.9 MB
- 11. Secure Software Architecture and Secure Coding/2. Broken Access Control.mp4 310.7 MB
- 12. Logging in Java/2. Logging in Java Part 2 (Log4J, Logback, SLF4J).mp4 291.0 MB
- 4. GoF Design Patterns of Software Architecture in OOP/6. Behevioral Patterns, p.2.mp4 284.2 MB
- 12. Logging in Java/1. Logging in Java Part 1 (Logging theory, Logging Levels, Java Logging Framework).mp4 274.0 MB
- 4. GoF Design Patterns of Software Architecture in OOP/5. Behevioral Patterns, p.1.mp4 270.3 MB
- 4. GoF Design Patterns of Software Architecture in OOP/2. Creational Patterns.mp4 266.0 MB
- 6. Databases Architecture from Scratch/6. Create Schema & Table Naming, Collation, Engines, Types, Column Properties.mp4 259.0 MB
- 10. Data Access Software Design Pattern/1. Connection Pooling DBCP, C3P0, HikariCP & Tomcat Connection Pool with JNDI.mp4 250.9 MB
- 9. ===== Exam MVC & Layered Architecture =====/3. Solution Overview Part 2.mp4 233.4 MB
- 9. ===== Exam MVC & Layered Architecture =====/1. Task Overview.mp4 225.0 MB
- 8. ===== Exam DAO, Database, JDBC, SQL ======/1. Exam task review and solution.mp4 211.3 MB
- 4. GoF Design Patterns of Software Architecture in OOP/3. Structural Patterns, p.1.mp4 210.9 MB
- 11. Secure Software Architecture and Secure Coding/14. Identification & Authentication Failures.mp4 202.8 MB
- 4. GoF Design Patterns of Software Architecture in OOP/4. Structural Patterns, p.2.mp4 193.4 MB
- 11. Secure Software Architecture and Secure Coding/12. Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).mp4 192.6 MB
- 4. GoF Design Patterns of Software Architecture in OOP/7. Behevioral Patterns, p.3.mp4 185.2 MB
- 11. Secure Software Architecture and Secure Coding/13. Vulnerable & Outdated Components.mp4 178.8 MB
- 6. Databases Architecture from Scratch/8. Referential Integrity Foreign Key Constraint & Cascading Operations.mp4 170.2 MB
- 7. Web Application Design Patterns/1. DAO (Data Access Object) Design Pattern.mp4 157.7 MB
- 11. Secure Software Architecture and Secure Coding/5. Cryptography Failures (Examples, Password Encryption, Hashing, Salting).mp4 154.3 MB
- 9. ===== Exam MVC & Layered Architecture =====/4. Solution Overview Part 3.mp4 144.6 MB
- 6. Databases Architecture from Scratch/5. Relational Databases Basic Concepts.mp4 143.4 MB
- 11. Secure Software Architecture and Secure Coding/4. Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).mp4 137.6 MB
- 11. Secure Software Architecture and Secure Coding/16. Security Logging & Monitoring Failures.mp4 135.1 MB
- 7. Web Application Design Patterns/3. Layered Architecture.mp4 132.3 MB
- 3. Object-oriented Architecture, Clean Code Design (Advanced)/5. Packaging Pricniples p.2 Coupling Principles and Others.mp4 131.4 MB
- 6. Databases Architecture from Scratch/2. Databases Overview - Part 1.mp4 129.3 MB
- 11. Secure Software Architecture and Secure Coding/10. Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).mp4 129.1 MB
- 11. Secure Software Architecture and Secure Coding/7. Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).mp4 126.6 MB
- 6. Databases Architecture from Scratch/7. Database Modelling & Design Conceptual, Logical and Physical Data Models.mp4 126.4 MB
- 11. Secure Software Architecture and Secure Coding/17. Server-Side Request Forgery (SSRF).mp4 123.0 MB
- 6. Databases Architecture from Scratch/4. MySQL Overview & Installation (including Workbench Installation).mp4 122.6 MB
- 11. Secure Software Architecture and Secure Coding/1. OWASP Top 10 Overview.mp4 119.2 MB
- 6. Databases Architecture from Scratch/9. Indexes in Databases.mp4 117.8 MB
- 6. Databases Architecture from Scratch/3. Databases Overview - Part 2.mp4 116.1 MB
- 11. Secure Software Architecture and Secure Coding/6. Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).mp4 111.8 MB
- 5. TDD, BDD & ATTD/1. Test-driven development Theory.mp4 107.0 MB
- 11. Secure Software Architecture and Secure Coding/15. Software & Data Integrity Failures.mp4 104.2 MB
- 3. Object-oriented Architecture, Clean Code Design (Advanced)/2. Tell, Don’t Ask Pricniple & Data Structures.mp4 104.1 MB
- 11. Secure Software Architecture and Secure Coding/9. Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).mp4 102.2 MB
- 11. Secure Software Architecture and Secure Coding/11. Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).mp4 98.5 MB
- 3. Object-oriented Architecture, Clean Code Design (Advanced)/1. Clean Code Architecture, Coupling & Cohesion.mp4 96.4 MB
- 11. Secure Software Architecture and Secure Coding/3. Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).mp4 93.6 MB
- 11. Secure Software Architecture and Secure Coding/8. Injection (XPath Injection, Log Injection, Input Validation).mp4 88.8 MB
- 7. Web Application Design Patterns/2. MVC Design Pattern.mp4 82.3 MB
- 3. Object-oriented Architecture, Clean Code Design (Advanced)/4. Packaging Pricniples p.1 Cohesion Principles.mp4 80.7 MB
- 5. TDD, BDD & ATTD/3. TDD, BDD & ATTD - Practice.mp4 79.5 MB
- 5. TDD, BDD & ATTD/2. BDD & ATTD.mp4 72.0 MB
- 2. SOLID Principles/3. Open Closed Principle.mp4 67.6 MB
- 2. SOLID Principles/1. SOLID principles overview & Single Responsibility Principle.mp4 66.5 MB
- 4. GoF Design Patterns of Software Architecture in OOP/1. GoF Patterns Overview.mp4 61.2 MB
- 2. SOLID Principles/6. Dependency Inversion Principle.mp4 60.4 MB
- 1. Introduction/1. Communication plan.mp4 49.1 MB
- 2. SOLID Principles/4. Liskov Substitution Principle.mp4 48.7 MB
- 3. Object-oriented Architecture, Clean Code Design (Advanced)/3. Law of Demeter.mp4 44.7 MB
- 1. Introduction/2. Unlimited access to 'Learn IT' application for students.mp4 44.5 MB
- 2. SOLID Principles/5. Interface Segregation Principle.mp4 38.8 MB
- 14. Bonus section/1. Bonus lesson.mp4 37.1 MB
- 6. Databases Architecture from Scratch/6. Create Schema & Table Naming, Collation, Engines, Types, Column Properties.srt 47.3 KB
- 11. Secure Software Architecture and Secure Coding/2. Broken Access Control.srt 43.6 KB
- 4. GoF Design Patterns of Software Architecture in OOP/5. Behevioral Patterns, p.1.srt 43.6 KB
- 4. GoF Design Patterns of Software Architecture in OOP/2. Creational Patterns.srt 43.5 KB
- 4. GoF Design Patterns of Software Architecture in OOP/6. Behevioral Patterns, p.2.srt 43.1 KB
- 4. GoF Design Patterns of Software Architecture in OOP/3. Structural Patterns, p.1.srt 41.4 KB
- 11. Secure Software Architecture and Secure Coding/14. Identification & Authentication Failures.srt 37.8 KB
- 12. Logging in Java/2. Logging in Java Part 2 (Log4J, Logback, SLF4J).srt 35.6 KB
- 12. Logging in Java/1. Logging in Java Part 1 (Logging theory, Logging Levels, Java Logging Framework).srt 35.5 KB
- 3. Object-oriented Architecture, Clean Code Design (Advanced)/5. Packaging Pricniples p.2 Coupling Principles and Others.srt 35.5 KB
- 10. Data Access Software Design Pattern/1. Connection Pooling DBCP, C3P0, HikariCP & Tomcat Connection Pool with JNDI.srt 34.3 KB
- 6. Databases Architecture from Scratch/5. Relational Databases Basic Concepts.srt 33.9 KB
- 5. TDD, BDD & ATTD/1. Test-driven development Theory.srt 33.5 KB
- 6. Databases Architecture from Scratch/2. Databases Overview - Part 1.srt 32.4 KB
- 7. Web Application Design Patterns/3. Layered Architecture.srt 32.0 KB
- 9. ===== Exam MVC & Layered Architecture =====/2. Solution Overview Part 1.srt 32.0 KB
- 6. Databases Architecture from Scratch/7. Database Modelling & Design Conceptual, Logical and Physical Data Models.srt 31.3 KB
- 11. Secure Software Architecture and Secure Coding/12. Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).srt 31.1 KB
- 3. Object-oriented Architecture, Clean Code Design (Advanced)/4. Packaging Pricniples p.1 Cohesion Principles.srt 30.1 KB
- 3. Object-oriented Architecture, Clean Code Design (Advanced)/2. Tell, Don’t Ask Pricniple & Data Structures.srt 29.0 KB
- 3. Object-oriented Architecture, Clean Code Design (Advanced)/1. Clean Code Architecture, Coupling & Cohesion.srt 28.9 KB
- 6. Databases Architecture from Scratch/3. Databases Overview - Part 2.srt 28.6 KB
- 4. GoF Design Patterns of Software Architecture in OOP/4. Structural Patterns, p.2.srt 28.3 KB
- 4. GoF Design Patterns of Software Architecture in OOP/7. Behevioral Patterns, p.3.srt 28.2 KB
- 9. ===== Exam MVC & Layered Architecture =====/1. Task Overview.srt 28.1 KB
- 6. Databases Architecture from Scratch/4. MySQL Overview & Installation (including Workbench Installation).srt 27.9 KB
- 11. Secure Software Architecture and Secure Coding/10. Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).srt 27.4 KB
- 11. Secure Software Architecture and Secure Coding/13. Vulnerable & Outdated Components.srt 26.9 KB
- 6. Databases Architecture from Scratch/8. Referential Integrity Foreign Key Constraint & Cascading Operations.srt 26.6 KB
- 11. Secure Software Architecture and Secure Coding/17. Server-Side Request Forgery (SSRF).srt 26.6 KB
- 11. Secure Software Architecture and Secure Coding/16. Security Logging & Monitoring Failures.srt 25.7 KB
- 6. Databases Architecture from Scratch/9. Indexes in Databases.srt 25.6 KB
- 8. ===== Exam DAO, Database, JDBC, SQL ======/1. Exam task review and solution.srt 24.0 KB
- 7. Web Application Design Patterns/1. DAO (Data Access Object) Design Pattern.srt 23.5 KB
- 11. Secure Software Architecture and Secure Coding/9. Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).srt 23.3 KB
- 11. Secure Software Architecture and Secure Coding/4. Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).srt 23.1 KB
- 5. TDD, BDD & ATTD/2. BDD & ATTD.srt 22.8 KB
- 11. Secure Software Architecture and Secure Coding/11. Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).srt 22.3 KB
- 11. Secure Software Architecture and Secure Coding/1. OWASP Top 10 Overview.srt 22.1 KB
- 9. ===== Exam MVC & Layered Architecture =====/3. Solution Overview Part 2.srt 21.9 KB
- 11. Secure Software Architecture and Secure Coding/5. Cryptography Failures (Examples, Password Encryption, Hashing, Salting).srt 21.5 KB
- 5. TDD, BDD & ATTD/3. TDD, BDD & ATTD - Practice.srt 20.7 KB
- 4. GoF Design Patterns of Software Architecture in OOP/1. GoF Patterns Overview.srt 19.3 KB
- 11. Secure Software Architecture and Secure Coding/15. Software & Data Integrity Failures.srt 19.3 KB
- 11. Secure Software Architecture and Secure Coding/6. Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).srt 19.1 KB
- 11. Secure Software Architecture and Secure Coding/7. Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).srt 18.9 KB
- 7. Web Application Design Patterns/2. MVC Design Pattern.srt 18.7 KB
- 11. Secure Software Architecture and Secure Coding/8. Injection (XPath Injection, Log Injection, Input Validation).srt 18.4 KB
- 11. Secure Software Architecture and Secure Coding/3. Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).srt 15.4 KB
- 9. ===== Exam MVC & Layered Architecture =====/4. Solution Overview Part 3.srt 12.9 KB
- 3. Object-oriented Architecture, Clean Code Design (Advanced)/3. Law of Demeter.srt 11.6 KB
- 2. SOLID Principles/3. Open Closed Principle.srt 10.6 KB
- 2. SOLID Principles/1. SOLID principles overview & Single Responsibility Principle.srt 10.5 KB
- 2. SOLID Principles/6. Dependency Inversion Principle.srt 8.1 KB
- 13. ===== EXAM TASK OWASP Top 10, Secure Coding & Logging =====/1. Exam Task Description and Solution (with reference to the source code).html 7.2 KB
- 2. SOLID Principles/4. Liskov Substitution Principle.srt 6.7 KB
- 2. SOLID Principles/5. Interface Segregation Principle.srt 6.7 KB
- 1. Introduction/1. Communication plan.srt 6.1 KB
- 1. Introduction/2. Unlimited access to 'Learn IT' application for students.srt 4.5 KB
- 14. Bonus section/1. Bonus lesson.srt 4.2 KB
- 1. Introduction/3. Tips to Improve Your Course Taking Experience.html 1.9 KB
- 2. SOLID Principles/2. Tips to Improve Your Course Taking Experience.html 1.9 KB
- 6. Databases Architecture from Scratch/1. About this section.html 785 bytes
- 7. Web Application Design Patterns/2.2 Source code of Model.html 250 bytes
- 7. Web Application Design Patterns/2.1 Source code of Controller.html 232 bytes
- 11. Secure Software Architecture and Secure Coding/6.1 Source code examples from the lesson.html 219 bytes
- 11. Secure Software Architecture and Secure Coding/7.1 Source code examples from the lesson.html 219 bytes
- 11. Secure Software Architecture and Secure Coding/8.1 Source code examples from the lesson.html 219 bytes
- 11. Secure Software Architecture and Secure Coding/2.1 Source code examples from the lesson.html 213 bytes
- 12. Logging in Java/1.2 Source code examples from the lesson.html 213 bytes
- 12. Logging in Java/2.4 Source code examples from the lesson.html 213 bytes
- 11. Secure Software Architecture and Secure Coding/4.1 Source code examples from the lesson.html 212 bytes
- 11. Secure Software Architecture and Secure Coding/5.1 Source code examples from the lesson.html 212 bytes
- 7. Web Application Design Patterns/2.3 Source code of View.html 203 bytes
- 4. GoF Design Patterns of Software Architecture in OOP/2.1 Source code of all examples from the lesson.html 177 bytes
- 4. GoF Design Patterns of Software Architecture in OOP/4.1 Source code of all examples from the lesson.html 177 bytes
- 4. GoF Design Patterns of Software Architecture in OOP/5.1 Source code of all examples from the lesson.html 177 bytes
- 4. GoF Design Patterns of Software Architecture in OOP/6.1 Source code of all examples from the lesson.html 177 bytes
- 4. GoF Design Patterns of Software Architecture in OOP/7.1 Source code of all examples from the lesson.html 177 bytes
- 2. SOLID Principles/1.1 Source code All examples from the lecture.html 169 bytes
- 2. SOLID Principles/3.1 Source code All examples from the lecture.html 169 bytes
- 2. SOLID Principles/4.1 Source code All examples from the lecture.html 169 bytes
- 2. SOLID Principles/5.1 Source code All examples from the lecture.html 169 bytes
- 2. SOLID Principles/6.1 Source code All examples from the lecture.html 169 bytes
- 12. Logging in Java/1.1 java.util.logging package official documentation.html 163 bytes
- 14. Bonus section/1.6 Java Course From zero to first job.html 163 bytes
- 7. Web Application Design Patterns/1.1 Source code example from the lesson.html 161 bytes
- 1. Introduction/1.8 Telegram Channel with Latest News, coupons and important information.html 157 bytes
- 8. ===== Exam DAO, Database, JDBC, SQL ======/1.1 Homework description and reference to the solution.html 157 bytes
- 9. ===== Exam MVC & Layered Architecture =====/1.1 Exam task description and reference to the solution.html 157 bytes
- 10. Data Access Software Design Pattern/1.2 Homework task and source code of the solution.html 157 bytes
- 14. Bonus section/1.11 Telegram Channel with Latest News and important information.html 157 bytes
- 1. Introduction/2.1 Learn IT application in Play Market.html 145 bytes
- 11. Secure Software Architecture and Secure Coding/13.2 pom.xml from the lesson with OWASP plugin.html 144 bytes
- Readme.txt 138 bytes
- 11. Secure Software Architecture and Secure Coding/11.1 NIST 800-123 - Guide to General Server Security.html 138 bytes
- 11. Secure Software Architecture and Secure Coding/12.1 NIST 800-123 - Guide to General Server Security.html 138 bytes
- 11. Secure Software Architecture and Secure Coding/16.1 Computer Security Incident Handling Guide.html 135 bytes
- 11. Secure Software Architecture and Secure Coding/11.2 NIST 800-207 - Zero Trust Architecture.html 134 bytes
- 11. Secure Software Architecture and Secure Coding/12.2 NIST 800-207 - Zero Trust Architecture.html 134 bytes
- 11. Secure Software Architecture and Secure Coding/13.1 Dependency check plugin.html 134 bytes
- 6. Databases Architecture from Scratch/4.1 How to Install MySQL on MacOS.html 128 bytes
- 7. Web Application Design Patterns/3.1 Source code of application from the lesson with layered architecture.html 124 bytes
- 12. Logging in Java/2.1 Log4J 2 Official documentation about Appenders.html 119 bytes
- 12. Logging in Java/2.2 Log4J 2 Official Documentation about Layouts.html 117 bytes
- 10. Data Access Software Design Pattern/1.1 Documentation for attributes of connection pooling in Tomcat.html 116 bytes
- 1. Introduction/2.2 Page where you can generate FREE bonus code for your self to remove limits in Application.html 114 bytes
- 12. Logging in Java/2.3 Logback configuration documentation.html 109 bytes
- 1. Introduction/1.5 LinkedIn of the Tutor.html 105 bytes
- 14. Bonus section/1.7 LinkedIn Andrii PIatakha.html 105 bytes
- 1. Introduction/1.2 Facebook Page with Udemy Coupons from Learn IT University.html 104 bytes
- 14. Bonus section/1.1 Facebook Page with Udemy Coupons from Learn IT University.html 104 bytes
- 14. Bonus section/1.9 Public profile of Tutor with list of all courses - Andrii Piatakha.html 104 bytes
- 1. Introduction/1.3 Instagram of the Tutor.html 103 bytes
- 1. Introduction/1.6 LinkedIn IT-Bulls company - official page.html 103 bytes
- 6. Databases Architecture from Scratch/4.2 Microsoft MySQL Installer.html 103 bytes
- 14. Bonus section/1.3 Free book about AI by Andrii Piatakha (sci-fi).html 103 bytes
- 14. Bonus section/1.4 Instagram Andrii Piatakha.html 103 bytes
- 14. Bonus section/1.8 LinkedIn IT-Bulls company - official page.html 103 bytes
- 1. Introduction/1.1 Facebook of the Tutor.html 101 bytes
- 14. Bonus section/1.2 Facebook Andrii Piatakha.html 101 bytes
- 1. Introduction/1.7 Patreon account of the Tutor.html 100 bytes
- 14. Bonus section/1.10 Support me on Patreon by getting access to EXCLUSIVE content.html 100 bytes
- 1. Introduction/1.9 Youtube channel with free lessons and blog.html 94 bytes
- 14. Bonus section/1.12 Youtube channel with free lessons and blog.html 94 bytes
- 11. Secure Software Architecture and Secure Coding/1.1 Common Weakness Enumeration (CWE) - official website.html 93 bytes
- 1. Introduction/1.4 IT-Bulls Company Official Web Site.html 82 bytes
- 14. Bonus section/1.5 IT-Bulls Company Official Web Site.html 81 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.