MySQL + JavaScript + Spring Security Offer

Created By: Trevor Page


$297

Pay with Card

Lessons: 81
Video: 26.5 Hours
This offer bundles together all the courses needed to satisfy the two highest levels for becoming a full-stack web application developer - the "front end" and "back end" levels.
  Supplemental material available for download.

What's Inside This Offer?

JavaScript Super Course

JavaScript Basics

Variables (24:52)
Control Structures (15:18)
Advanced IF Statements (25:05)
For Loops (18:46)
Advanced For Loops (26:33)
While Loops (27:10)

HTML Basics

HTML Tags (14:18)
Creating Your First Webpage (18:30)
Input Tags (22:50)
Input Tags (Part II) (15:06)
Importing Scripts (21:58)

Functions

What are Functions? (14:23)
What are Functions? (Part II) (26:57)

Fun with Strings

String Manipulation (33:05)
IndexOf Function (08:46)

Data Structures and Objects

Arrays (Part I) (14:44)
Arrays (Part II) (24:57)
Objects (Part I) (13:35)
Objects (Part II) (13:14)
Objects (Part III) (24:29)
The Prototype (20:05)

Miscellaneous Topics

Null vs. Undefined (15:57)
Debugging (22:39)

JavaScript Closures

Closures + Encapsulation (30:32)
Closures (Part II) (39:31)

Final Assignment

Legend of the Blue Mongoose (Part I) (18:51)
Legend of the Blue Mongoose (Part II) (27:42)
Legend of the Blue Mongoose (Part III) (31:32)
Legend of the Blue Mongoose (Part IV) (21:15)
Legend of the Blue Mongoose (Part V) (20:14)
Legend of the Blue Mongoose (Part VI) (30:38)
Legend of the Blue Mongoose (Part VII) (26:45)
Legend of the Blue Mongoose (Part VIII) (18:50)
Legend of the Blue Mongoose (Part IX) (30:59)
Legend of the Blue Mongoose (Part X) (41:52)

Databases and SQL Course

Module 1 - Getting Comfortable with Databases

Lesson #4 - What is SQL? (09:35)
Lesson #5 - Using SQL Command Line (10:07)
Lesson #6 - SQL Data Types (15:09)
Lesson #7 - Create a Table (16:13)
Lesson #8 - CRUD Part I (27:50)
Lesson #9 - CRUD Part II (21:05)
Assignment #1

Module 2 – What Makes Databases “Relational” & Why It’s Cool

Lesson #10 - Relationships (10:08)
Lesson #11 - Normalization (25:28)
Lesson #12 - One to Many Relationship (10:48)
Lesson #13 - One to One Relationship (10:51)
Lesson #14 - Many to Many (11:49)
Lesson #15 - Tools (20:51)
Assignment #2

Module 3 – How to Write SQL “Like a Boss”

Lesson #16 - Joins (36:16)
Lesson #17 - Grouping (27:03)
Lesson #18 - Aggregate Functions (14:30)
Lesson #19 - Having Keyword (23:41)
Lesson #20 - Ordering (07:16)
Lesson #21 - Select Into (25:09)
Assignment #3

Module 4 – Advanced Database Topics

Lesson #22 - Alter Tables (19:12)
Lesson #23 - Views (17:54)
Lesson #24 - Subqueries (26:17)
Lesson #25 - Indexes (39:34)
Lesson #26 - Backups (29:11)
Assignment #4

Bonus Videos

Bonus Video #1 - How to Read the MySQL Documentation (16:34)
Bonus Video #2 - Stored Procedures and Functions (01:03:44)

Spring Security Course

Learning Spring Security

Video #3 – Spring Security “Hello World” (Part II) (18:46)
Video #4 – Customizing Your Login Page (19:11)
Video #5 – Creating Roles for Authorization (18:16)
Video #6 – Integrating with a Database (via JDBC) (15:57)
Video #7 – Using the Principal Object (Getting the User from the HttpRequest) (05:18)
Video #8 – Automatic Advanced Password Encryption (13:37)
Video #9 – Creating Custom Authentication Process (Integrating with Legacy Systems) (18:55)
Video #10 – Adding Method Level Security (15:03)
Video #11 – Concurrent Session Management (07:57)

Student Reviews

Iulian Manole says:

Great Course that demystify the security web-app backend  

The challenge-response technique used in secutity with it's so common and underlie virtually every aspect of our modern technological life. Yet very few beginners have an idea of how this technologies actually work behind and how can be easely implemented. Now, get a hands-on explanation of the principles implemented with spring security framework, plus an overview on all protection layers and techniques, not only on basic authentification and authorisation, but more fine user customization, security path tunning, concurrent login and protection of methods, that we can easely integrate on our projects. These lessons will demystify the security backend behavior and how you shoud approach the web application protection concept, while inspire you to see spring framework technology in a new light.

© Proffesso 2017
Version: 1.5.2.16 (beta)
Privacy Policy | Terms of Service