本站已收录 番号和无损神作磁力链接/BT种子 

[GigaCourse.Com] Udemy - Cypress End-to-End Testing - Getting Started

种子简介

种子名称: [GigaCourse.Com] Udemy - Cypress End-to-End Testing - Getting Started
文件类型: 视频
文件数目: 92个文件
文件大小: 2.37 GB
收录时间: 2023-4-22 19:52
已经下载: 3
资源热度: 110
最近下载: 2024-5-5 06:55

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:ec00f6c70f030b19fe9f2f15f317ce143d2544bc&dn=[GigaCourse.Com] Udemy - Cypress End-to-End Testing - Getting Started 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

[GigaCourse.Com] Udemy - Cypress End-to-End Testing - Getting Started.torrent
  • 1. Introduction/1. Welcome To The Course!.mp421.97MB
  • 1. Introduction/2. What is Cypress & End-to-End Testing And Why Should You Care.mp427.25MB
  • 1. Introduction/3. Installing & Using Cypress.mp435.59MB
  • 1. Introduction/4. How Cypress Tests Are Organized & Stored.mp413.78MB
  • 1. Introduction/5. Adjusting Our First Test.mp420.83MB
  • 1. Introduction/6. Writing A More Realistic Test.mp425.64MB
  • 1. Introduction/7. About The Course.mp423.17MB
  • 2. Cypress Basics - Core Features & Syntax/1. Module Introduction.mp45.76MB
  • 2. Cypress Basics - Core Features & Syntax/10. Why You Need To Simulate User Interaction.mp48.12MB
  • 2. Cypress Basics - Core Features & Syntax/11. Simulating User Interaction.mp440.48MB
  • 2. Cypress Basics - Core Features & Syntax/12. Proper Assertions Are Key!.mp426.56MB
  • 2. Cypress Basics - Core Features & Syntax/13. Time To Practice!.mp425.97MB
  • 2. Cypress Basics - Core Features & Syntax/14. Simulating Keyboard Typing & Writing Good Assertions.mp469.7MB
  • 2. Cypress Basics - Core Features & Syntax/15. Checking For Partial Text.mp419.82MB
  • 2. Cypress Basics - Core Features & Syntax/16. Selecting Dropdown Values.mp452.38MB
  • 2. Cypress Basics - Core Features & Syntax/17. Cypress Tests Run In Isolation.mp411.91MB
  • 2. Cypress Basics - Core Features & Syntax/18. Time For More Queries.mp440.7MB
  • 2. Cypress Basics - Core Features & Syntax/19. Summary.mp423.74MB
  • 2. Cypress Basics - Core Features & Syntax/2. Project Setup.mp416.21MB
  • 2. Cypress Basics - Core Features & Syntax/3. Creating Suites & Tests.mp412.17MB
  • 2. Cypress Basics - Core Features & Syntax/4. Visiting Pages inside of E2E Tests.mp415.34MB
  • 2. Cypress Basics - Core Features & Syntax/5. Let the IDE (VS Code) Help You.mp45.94MB
  • 2. Cypress Basics - Core Features & Syntax/6. Selecting Elements & Evaluating Test Results.mp419.8MB
  • 2. Cypress Basics - Core Features & Syntax/7. Selecting By Text.mp428.71MB
  • 2. Cypress Basics - Core Features & Syntax/8. Implicit and Explicit Assertions.mp438.74MB
  • 2. Cypress Basics - Core Features & Syntax/9. get() vs find().mp436.23MB
  • 3. Diving Deeper Element Selection, Assertions & More/1. Module Introduction.mp42.58MB
  • 3. Diving Deeper Element Selection, Assertions & More/11. Simulating Special Key Presses.mp425.25MB
  • 3. Diving Deeper Element Selection, Assertions & More/12. Another Example.mp439.4MB
  • 3. Diving Deeper Element Selection, Assertions & More/13. Losing & Gaining Focus.mp441.68MB
  • 3. Diving Deeper Element Selection, Assertions & More/14. Aliases In Action.mp425.88MB
  • 3. Diving Deeper Element Selection, Assertions & More/15. Using Cypress Studio For Test Evaluation.mp419.52MB
  • 3. Diving Deeper Element Selection, Assertions & More/16. Running Tests Without Cypress Studio & Working with Screenshots + Videos.mp416.65MB
  • 3. Diving Deeper Element Selection, Assertions & More/17. Changing Subjects.mp455.82MB
  • 3. Diving Deeper Element Selection, Assertions & More/18. Taking Screenshots.mp413.19MB
  • 3. Diving Deeper Element Selection, Assertions & More/19. should() instead of then().mp422.6MB
  • 3. Diving Deeper Element Selection, Assertions & More/2. Project Setup.mp48.44MB
  • 3. Diving Deeper Element Selection, Assertions & More/20. Summary.mp417.34MB
  • 3. Diving Deeper Element Selection, Assertions & More/3. Selecting Elements - The Best Practice Way.mp435.91MB
  • 3. Diving Deeper Element Selection, Assertions & More/4. Testing Page Navigation.mp426.08MB
  • 3. Diving Deeper Element Selection, Assertions & More/5. More on Selecting Elements.mp423.3MB
  • 3. Diving Deeper Element Selection, Assertions & More/6. Repetition and More Assertions.mp442.61MB
  • 3. Diving Deeper Element Selection, Assertions & More/7. Chaining Commands.mp416.47MB
  • 3. Diving Deeper Element Selection, Assertions & More/8. Working with Values & Aliases.mp423.46MB
  • 3. Diving Deeper Element Selection, Assertions & More/9. Getting More Direct Element Access via then().mp454.27MB
  • 4. Configuration & Customization/1. Module Introduction.mp43.91MB
  • 4. Configuration & Customization/10. Creating a Custom Command.mp447.23MB
  • 4. Configuration & Customization/11. Creating a Custom Query.mp456.24MB
  • 4. Configuration & Customization/12. Understanding Tasks.mp433.95MB
  • 4. Configuration & Customization/13. Summary.mp412.52MB
  • 4. Configuration & Customization/2. Project Setup.mp42.82MB
  • 4. Configuration & Customization/3. The Global Config File.mp412.36MB
  • 4. Configuration & Customization/4. Understanding Timeouts.mp424.57MB
  • 4. Configuration & Customization/5. Global vs Local Config.mp413.57MB
  • 4. Configuration & Customization/6. Setting the Test Browser.mp49.27MB
  • 4. Configuration & Customization/7. Configuring the baseURL.mp416.98MB
  • 4. Configuration & Customization/8. Sharing Logic with Test Hooks.mp435.46MB
  • 4. Configuration & Customization/9. Introducing Custom Commands & Queries.mp47.11MB
  • 5. Working with Stubs, Spies, Fixtures & Manipulating the Clock/1. Module Introduction.mp4212.52KB
  • 5. Working with Stubs, Spies, Fixtures & Manipulating the Clock/10. Evaluating Stub Arguments.mp446.24MB
  • 5. Working with Stubs, Spies, Fixtures & Manipulating the Clock/11. Using Fixtures.mp446.97MB
  • 5. Working with Stubs, Spies, Fixtures & Manipulating the Clock/12. Understanding Spies.mp430.29MB
  • 5. Working with Stubs, Spies, Fixtures & Manipulating the Clock/13. Creating & Using Spies.mp435.71MB
  • 5. Working with Stubs, Spies, Fixtures & Manipulating the Clock/14. The Problem With Timers.mp441.73MB
  • 5. Working with Stubs, Spies, Fixtures & Manipulating the Clock/15. Manipulating the Clock.mp420.62MB
  • 5. Working with Stubs, Spies, Fixtures & Manipulating the Clock/16. Summary.mp45.95MB
  • 5. Working with Stubs, Spies, Fixtures & Manipulating the Clock/2. Starting Project.mp49.52MB
  • 5. Working with Stubs, Spies, Fixtures & Manipulating the Clock/3. Understanding the Problem.mp421.81MB
  • 5. Working with Stubs, Spies, Fixtures & Manipulating the Clock/4. Understanding Stubs.mp416.36MB
  • 5. Working with Stubs, Spies, Fixtures & Manipulating the Clock/5. Creating & Using a Stub.mp441.44MB
  • 5. Working with Stubs, Spies, Fixtures & Manipulating the Clock/6. When Empty Stubs Are Not Enough.mp441.74MB
  • 5. Working with Stubs, Spies, Fixtures & Manipulating the Clock/7. Adding a Fake Stub Implementation.mp459.68MB
  • 5. Working with Stubs, Spies, Fixtures & Manipulating the Clock/8. Using Stubs Across Tests.mp438.4MB
  • 5. Working with Stubs, Spies, Fixtures & Manipulating the Clock/9. Stubs with Return Values.mp444.61MB
  • 6. Network (HTTP) Requests, Databases & Authentication/1. Module Introduction.mp44.17MB
  • 6. Network (HTTP) Requests, Databases & Authentication/10. More Intercepting!.mp418.82MB
  • 6. Network (HTTP) Requests, Databases & Authentication/11. Testing APIs with Test Requests.mp438.74MB
  • 6. Network (HTTP) Requests, Databases & Authentication/12. Summary Different Network Request Strategies.mp47.67MB
  • 6. Network (HTTP) Requests, Databases & Authentication/13. Testing Authentication Flows & Asserting Cookie Values.mp449.46MB
  • 6. Network (HTTP) Requests, Databases & Authentication/14. Adding a Login Test.mp420.36MB
  • 6. Network (HTTP) Requests, Databases & Authentication/15. Creating a Reusable Login Command.mp428.97MB
  • 6. Network (HTTP) Requests, Databases & Authentication/16. Accessing Interceptor Request & Response Data.mp454.69MB
  • 6. Network (HTTP) Requests, Databases & Authentication/17. Summary.mp46.83MB
  • 6. Network (HTTP) Requests, Databases & Authentication/2. Starting Project.mp419.08MB
  • 6. Network (HTTP) Requests, Databases & Authentication/3. Writing a First (Problematic) Test.mp442.5MB
  • 6. Network (HTTP) Requests, Databases & Authentication/4. The Problem with Tests & Databases.mp411.02MB
  • 6. Network (HTTP) Requests, Databases & Authentication/5. Creating a Test Database.mp426.06MB
  • 6. Network (HTTP) Requests, Databases & Authentication/6. Seeding the Test Database Before Every Test.mp435.27MB
  • 6. Network (HTTP) Requests, Databases & Authentication/7. Another Database-dependent Test.mp428.33MB
  • 6. Network (HTTP) Requests, Databases & Authentication/8. Understanding & Using Interceptors.mp448.78MB
  • 6. Network (HTTP) Requests, Databases & Authentication/9. You Can't Always Use Interceptors.mp48.84MB
  • 7. Roundup & Next Steps/1. Roundup & Next Steps.mp421.96MB