Web Application Vulnerabilities, Security With Spring Boot 3
Published 1/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.09 GB | Duration: 1h 15m
Published 1/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.09 GB | Duration: 1h 15m
Web application vulnerabilities, security with Spring Boot 3, Spring security 6
What you'll learn
Web application vulnerabilities
Web application security attacks
Spring boot 3 with Spring security 6
Securing web applications
Requirements
Java , Spring boot
Description
Hello Friends,This course is all about web application vulnerabilities and how to secure them against various types of security attacks.Web application security is as important as their development but many developers specially new developers don't have much idea about these security vulnerabilities. So I have tried to show these vulnerabilities and how to exploit them using code examples. This code is also available at GitHub and it's repository link is attached to courses.I did not focus much on creating basic Spring application code like controllers. services, repository and entities because this course is not about Spring or Spring Boot but securing web application against security attacks.This is why I have explained only that part of code which is necessary to understand security attacks, how to exploit them and how to secure application against those attacks.This course will benefit front end and back end developers, testers and people working in Cyber security domain.Thanks you very much and I hope you find this course useful. I will keep adding and updating course. If you have any questions, fell free to ask it in Q&A section. I will try to answer them as soon as possible.Thank you again and best of luck!
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 Who is this course for?
Section 2: SQL Injection
Lecture 3 SQL Injection Introduction
Lecture 4 SQL Injection Code Demo
Lecture 5 Securing application against SQL Injection attack
Section 3: Cross Site Scripting (XSS)
Lecture 6 Introduction
Lecture 7 XSS Demo
Lecture 8 Securing application against XSS 1
Lecture 9 Securing application against XSS 2
Lecture 10 Securing application against XSS 3
Section 4: Cross Site Request Forgery (CSRF)
Lecture 11 Introduction
Lecture 12 CSRF Demo
Lecture 13 Securing application against CSRF attack
Section 5: ClickJacking
Lecture 14 Introduction
Lecture 15 Clickjacking Demo
Lecture 16 Securing application against Clickjacking
Section 6: Broken Authentication
Lecture 17 Broken authentication and how to mitigate its risks
Section 7: Final Words
Lecture 18 Final Words and some suggestions
Java Developers, Spring developers, Cyber security, Testing application for security vulnerabilities