Details for:

Type:
Files:
Size:

Uploaded On:
Added By:
Not Trusted

Seeders:
Leechers:
Info Hash:
96B5279DA9BBC32FA20C515AAFE47D7DFA41DD1B
  1. 1. Introduction/01. Welcome.mp4 40.6 MB
  2. 1. Introduction/02. Application security.mp4 10.2 MB
  3. 1. Introduction/02. Application security.en.srt 7.4 KB
  4. 1. Introduction/01. Welcome.en.srt 3.8 KB
  5. 2. 1. Software Development Lifecycle/03. Development methodologies.mp4 17.7 MB
  6. 2. 1. Software Development Lifecycle/05. Operation, maintenance, and change management.mp4 7.1 MB
  7. 2. 1. Software Development Lifecycle/04. Maturity models.mp4 6.8 MB
  8. 2. 1. Software Development Lifecycle/06. DevOps.mp4 6.5 MB
  9. 2. 1. Software Development Lifecycle/03. Development methodologies.en.srt 10.7 KB
  10. 2. 1. Software Development Lifecycle/06. DevOps.en.srt 6.9 KB
  11. 2. 1. Software Development Lifecycle/04. Maturity models.en.srt 5.9 KB
  12. 2. 1. Software Development Lifecycle/05. Operation, maintenance, and change management.en.srt 5.3 KB
  13. 3. 2. Software Security Issues/07. Understanding cross-site scripting.mp4 14.0 MB
  14. 3. 2. Software Security Issues/08. Preventing SQL injection.mp4 12.0 MB
  15. 3. 2. Software Security Issues/11. Overflow attacks.mp4 10.2 MB
  16. 3. 2. Software Security Issues/13. Session hijacking.mp4 9.1 MB
  17. 3. 2. Software Security Issues/10. Directory traversal.mp4 7.6 MB
  18. 3. 2. Software Security Issues/15. Code execution attacks.mp4 7.1 MB
  19. 3. 2. Software Security Issues/14. Malicious add-ons.mp4 6.6 MB
  20. 3. 2. Software Security Issues/12. Cookies.mp4 6.5 MB
  21. 3. 2. Software Security Issues/09. Privilege escalation.mp4 3.8 MB
  22. 3. 2. Software Security Issues/07. Understanding cross-site scripting.en.srt 9.6 KB
  23. 3. 2. Software Security Issues/08. Preventing SQL injection.en.srt 9.3 KB
  24. 3. 2. Software Security Issues/13. Session hijacking.en.srt 6.7 KB
  25. 3. 2. Software Security Issues/10. Directory traversal.en.srt 5.8 KB
  26. 3. 2. Software Security Issues/11. Overflow attacks.en.srt 5.8 KB
  27. 3. 2. Software Security Issues/12. Cookies.en.srt 5.4 KB
  28. 3. 2. Software Security Issues/15. Code execution attacks.en.srt 4.7 KB
  29. 3. 2. Software Security Issues/14. Malicious add-ons.en.srt 4.4 KB
  30. 3. 2. Software Security Issues/09. Privilege escalation.en.srt 3.8 KB
  31. 4. 3. Secure Coding Practices/17. Code repositories.mp4 14.6 MB
  32. 4. 3. Secure Coding Practices/18. Third-party code.mp4 10.2 MB
  33. 4. 3. Secure Coding Practices/16. Error and exception handling.mp4 7.5 MB
  34. 4. 3. Secure Coding Practices/19. Code signing.mp4 5.3 MB
  35. 4. 3. Secure Coding Practices/17. Code repositories.en.srt 10.6 KB
  36. 4. 3. Secure Coding Practices/18. Third-party code.en.srt 8.4 KB
  37. 4. 3. Secure Coding Practices/16. Error and exception handling.en.srt 6.3 KB
  38. 4. 3. Secure Coding Practices/19. Code signing.en.srt 5.1 KB
  39. 5. 4. Software Security Assessment/20. Risk analysis and mitigation.mp4 6.3 MB
  40. 5. 4. Software Security Assessment/22. Acquired software.mp4 5.7 MB
  41. 5. 4. Software Security Assessment/21. Software testing.mp4 5.0 MB
  42. 5. 4. Software Security Assessment/20. Risk analysis and mitigation.en.srt 5.8 KB
  43. 5. 4. Software Security Assessment/21. Software testing.en.srt 5.4 KB
  44. 5. 4. Software Security Assessment/22. Acquired software.en.srt 5.1 KB
  45. 6. Conclusion/23. What's next.mp4 3.6 MB
  46. 6. Conclusion/23. What's next.en.srt 2.4 KB

Similar Posts:

  1. E-books Lynda - CISSP Cert Prep 8 Software Development Security Feb. 3, 2023, 6:18 p.m.
  2. Other Lynda - CISSP Cert Prep Basics Feb. 3, 2023, 12:58 a.m.