Magnetic link has been copied to the cutting board

Name Lynda - CISSP Cert Prep 8 Software Development Security

File Type video

Size 224.13MB

UpdateDate 2024-6-27

hash *****79DA9BBC32FA20C515AAFE47D7DFA41DD1

Hot 3

Files 1. Introduction/01. Welcome.mp4 | 40.63MB 1. Introduction/02. Application security.mp4 | 10.21MB 1. Introduction/02. Application security.en.srt | 7.37KB 1. Introduction/01. Welcome.en.srt | 3.80KB 2. 1. Software Development Lifecycle/03. Development methodologies.mp4 | 17.67MB 2. 1. Software Development Lifecycle/05. Operation, maintenance, and change management.mp4 | 7.08MB 2. 1. Software Development Lifecycle/04. Maturity models.mp4 | 6.84MB 2. 1. Software Development Lifecycle/06. DevOps.mp4 | 6.50MB 2. 1. Software Development Lifecycle/03. Development methodologies.en.srt | 10.70KB 2. 1. Software Development Lifecycle/06. DevOps.en.srt | 6.85KB 2. 1. Software Development Lifecycle/04. Maturity models.en.srt | 5.86KB 2. 1. Software Development Lifecycle/05. Operation, maintenance, and change management.en.srt | 5.34KB 3. 2. Software Security Issues/07. Understanding cross-site scripting.mp4 | 14.02MB 3. 2. Software Security Issues/08. Preventing SQL injection.mp4 | 11.95MB 3. 2. Software Security Issues/11. Overflow attacks.mp4 | 10.22MB 3. 2. Software Security Issues/13. Session hijacking.mp4 | 9.10MB 3. 2. Software Security Issues/10. Directory traversal.mp4 | 7.63MB 3. 2. Software Security Issues/15. Code execution attacks.mp4 | 7.06MB 3. 2. Software Security Issues/14. Malicious add-ons.mp4 | 6.63MB 3. 2. Software Security Issues/12. Cookies.mp4 | 6.49MB 3. 2. Software Security Issues/09. Privilege escalation.mp4 | 3.79MB 3. 2. Software Security Issues/07. Understanding cross-site scripting.en.srt | 9.60KB 3. 2. Software Security Issues/08. Preventing SQL injection.en.srt | 9.32KB 3. 2. Software Security Issues/13. Session hijacking.en.srt | 6.72KB 3. 2. Software Security Issues/10. Directory traversal.en.srt | 5.78KB 3. 2. Software Security Issues/11. Overflow attacks.en.srt | 5.77KB 3. 2. Software Security Issues/12. Cookies.en.srt | 5.38KB 3. 2. Software Security Issues/15. Code execution attacks.en.srt | 4.74KB 3. 2. Software Security Issues/14. Malicious add-ons.en.srt | 4.39KB 3. 2. Software Security Issues/09. Privilege escalation.en.srt | 3.79KB 4. 3. Secure Coding Practices/17. Code repositories.mp4 | 14.64MB 4. 3. Secure Coding Practices/18. Third-party code.mp4 | 10.16MB 4. 3. Secure Coding Practices/16. Error and exception handling.mp4 | 7.46MB 4. 3. Secure Coding Practices/19. Code signing.mp4 | 5.28MB 4. 3. Secure Coding Practices/17. Code repositories.en.srt | 10.63KB 4. 3. Secure Coding Practices/18. Third-party code.en.srt | 8.38KB 4. 3. Secure Coding Practices/16. Error and exception handling.en.srt | 6.34KB 4. 3. Secure Coding Practices/19. Code signing.en.srt | 5.08KB 5. 4. Software Security Assessment/20. Risk analysis and mitigation.mp4 | 6.30MB 5. 4. Software Security Assessment/22. Acquired software.mp4 | 5.71MB 5. 4. Software Security Assessment/21. Software testing.mp4 | 5.02MB 5. 4. Software Security Assessment/20. Risk analysis and mitigation.en.srt | 5.84KB 5. 4. Software Security Assessment/21. Software testing.en.srt | 5.38KB 5. 4. Software Security Assessment/22. Acquired software.en.srt | 5.14KB 6. Conclusion/23. What's next.mp4 | 3.62MB 6. Conclusion/23. What's next.en.srt | 2.44KB

Recommend

Magnetic link has been copied to the cutting board