Torrent Info
Title [ FreeCourseWeb.com ] Learning Path - CSSLP (Certified Secure Software Lifecycle Professional)
Category
Size 1.54GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
01. Design Software Security Architecture.mp4 7.37MB
01. Design Software Security Architecture.vtt 6.11KB
01. Secure Coding Practices.mp4 10.41MB
01. Secure Coding Practices.vtt 8.82KB
02. Adequate Security.mp4 6.06MB
02. Adequate Security.vtt 5.14KB
02. Programming Considerations.mp4 17.86MB
02. Programming Considerations.vtt 12.07KB
03. Architecture Based Controls.mp4 10.06MB
03. Architecture Based Controls.vtt 8.01KB
03. Input Validation.mp4 10.58MB
03. Input Validation.vtt 8.09KB
04. Client Server.mp4 13.07MB
04. Client Server.vtt 8.79KB
04. Error Handling and Logging.mp4 16.35MB
04. Error Handling and Logging.vtt 14.60KB
05. Protection of Output.mp4 8.97MB
05. Protection of Output.vtt 8.06KB
05. Web-based Architecture Risk.mp4 6.89MB
05. Web-based Architecture Risk.vtt 5.89KB
06. Pervasive Computing.mp4 10.28MB
06. Pervasive Computing.vtt 8.27KB
06. Session Management, Injection, and XSS.mp4 12.85MB
06. Session Management, Injection, and XSS.vtt 8.89KB
07. Configuration Management.mp4 9.04MB
07. Configuration Management.vtt 6.76KB
07. Feature-based Risk.mp4 15.38MB
07. Feature-based Risk.vtt 11.09KB
08. Network and Storage Requirements.mp4 9.04MB
08. Network and Storage Requirements.vtt 8.14KB
08. Side Channel Vulnerabilities Speculative Execution.mp4 10.40MB
08. Side Channel Vulnerabilities Speculative Execution.vtt 8.58KB
09. Resource and Memory Management.mp4 14.52MB
09. Resource and Memory Management.vtt 12.46KB
09. Security Design Architecture - The Cloud.mp4 9.21MB
09. Security Design Architecture - The Cloud.vtt 7.48KB
1. Analyze Code for Security Risks.mp4 7.78MB
1. Analyze Code for Security Risks.vtt 6.04KB
1. Ascertain Code Repository Security.mp4 10.32MB
1. Ascertain Code Repository Security.vtt 9.33KB
1. Assess Supply Chain Monitoring.mp4 18.55MB
1. Assess Supply Chain Monitoring.vtt 15.80KB
1. Categorize Threats to Software Applications.mp4 13.54MB
1. Categorize Threats to Software Applications.vtt 10.78KB
1. Course Overview.mp4 2.65MB
1. Course Overview.mp4 5.14MB
1. Course Overview.mp4 2.63MB
1. Course Overview.mp4 5.00MB
1. Course Overview.mp4 4.92MB
1. Course Overview.mp4 5.31MB
1. Course Overview.mp4 2.53MB
1. Course Overview.mp4 2.65MB
1. Course Overview.vtt 1.77KB
1. Course Overview.vtt 2.32KB
1. Course Overview.vtt 1.73KB
1. Course Overview.vtt 1.40KB
1. Course Overview.vtt 2.46KB
1. Course Overview.vtt 2.24KB
1. Course Overview.vtt 1.61KB
1. Course Overview.vtt 1.70KB
1. Course Overview (1).mp4 2.02MB
1. Course Overview (1).vtt 1.27KB
1. Data Protection.mp4 15.56MB
1. Data Protection.vtt 13.65KB
1. Decommissioning Software Securely.mp4 11.27MB
1. Decommissioning Software Securely.vtt 9.03KB
1. Design and Evaluate Software Security Architecture.mp4 12.81MB
1. Design and Evaluate Software Security Architecture.vtt 10.34KB
1. Design Secure System Interfaces.mp4 8.00MB
1. Design Secure System Interfaces.vtt 6.33KB
1. Develop Security Test Cases.mp4 16.43MB
1. Develop Security Test Cases.vtt 14.06KB
1. Develop Security Testing Strategy and Plan.mp4 17.58MB
1. Develop Security Testing Strategy and Plan.vtt 12.98KB
1. Discovering Secure Software Requirements.mp4 13.41MB
1. Discovering Secure Software Requirements.vtt 13.31KB
1. Documentation, Verification, and Validation.mp4 9.20MB
1. Documentation, Verification, and Validation.vtt 7.43KB
1. Documenting Software Requirements.mp4 13.31MB
1. Documenting Software Requirements.vtt 11.20KB
1. Domain Summary.mp4 6.52MB
1. Domain Summary.mp4 5.61MB
1. Domain Summary.mp4 7.49MB
1. Domain Summary.mp4 6.97MB
1. Domain Summary.vtt 4.42KB
1. Domain Summary.vtt 3.54KB
1. Domain Summary.vtt 5.11KB
1. Domain Summary.vtt 5.11KB
1. Evaluate Operational Risk.mp4 14.36MB
1. Evaluate Operational Risk.vtt 10.31KB
1. Evaluate Software Supply Chain Risk Management.mp4 9.64MB
1. Evaluate Software Supply Chain Risk Management.vtt 8.62KB
1. Governance.mp4 21.16MB
1. Governance.vtt 14.15KB
1. Implement Software Security Controls.mp4 7.50MB
1. Implement Software Security Controls.vtt 5.48KB
1. Integrating Security into Software.mp4 5.58MB
1. Integrating Security into Software.vtt 4.18KB
1. Managing Software Lifecycle Risk.mp4 18.22MB
1. Managing Software Lifecycle Risk.vtt 13.03KB
1. Managing Software Operational Security.mp4 17.35MB
1. Managing Software Operational Security.vtt 12.38KB
1. Post-deployment and Resilience.mp4 12.68MB
1. Post-deployment and Resilience.vtt 10.89KB
1. Secure Code Analysis.mp4 11.35MB
1. Secure Code Analysis.vtt 9.68KB
1. Secure Coding Practices.mp4 8.25MB
1. Secure Coding Practices.vtt 6.91KB
1. Software Code Risks.mp4 8.15MB
1. Software Code Risks.vtt 6.62KB
1. Software Development Methodologies.mp4 10.16MB
1. Software Development Methodologies.vtt 6.85KB
1. Specify Secure Software Configuration.mp4 16.05MB
1. Specify Secure Software Configuration.vtt 13.29KB
10. Reasons to Migrate to the Cloud.mp4 10.74MB
10. Reasons to Migrate to the Cloud.vtt 9.56KB
10. Sensitive Data Exposure and Access Control.mp4 14.30MB
10. Sensitive Data Exposure and Access Control.vtt 11.00KB
11. Security Design Architecture - Mobile Applications.mp4 12.96MB
11. Security Design Architecture - Mobile Applications.vtt 9.88KB
2. Code Review.mp4 6.63MB
2. Code Review.vtt 5.97KB
2. Code Review Methods.mp4 8.43MB
2. Code Review Methods.vtt 7.50KB
2. Complete Mediation.mp4 4.60MB
2. Complete Mediation.vtt 2.37KB
2. Confidentiality.mp4 7.41MB
2. Confidentiality.vtt 5.85KB
2. Data Destruction.mp4 13.61MB
2. Data Destruction.vtt 13.54KB
2. Data Lifecycle.mp4 16.32MB
2. Data Lifecycle.vtt 13.96KB
2. Deployment Environment Hardening.mp4 9.96MB
2. Deployment Environment Hardening.vtt 8.51KB
2. Develop or Obtain Security Test Data.mp4 7.63MB
2. Develop or Obtain Security Test Data.vtt 5.84KB
2. Document the Supply Chain.mp4 10.32MB
2. Document the Supply Chain.vtt 9.23KB
2. External Software Attack - Human.mp4 13.71MB
2. External Software Attack - Human.vtt 12.49KB
2. Gathering (Security) Requirements.mp4 15.00MB
2. Gathering (Security) Requirements.vtt 13.69KB
2. Incorporate Security into the SDLC.mp4 23.10MB
2. Incorporate Security into the SDLC.vtt 17.70KB
2. Input Validation.mp4 5.60MB
2. Input Validation.vtt 3.94KB
2. Legal and Regulatory Issues.mp4 12.23MB
2. Legal and Regulatory Issues.vtt 8.77KB
2. Manage Security Requirements with Third-parties.mp4 24.18MB
2. Manage Security Requirements with Third-parties.vtt 20.24KB
2. Operating System Security.mp4 15.12MB
2. Operating System Security.vtt 12.99KB
2. Post-implementation Support.mp4 11.78MB
2. Post-implementation Support.vtt 9.61KB
2. Protected Code.mp4 18.51MB
2. Protected Code.mp4 15.10MB
2. Protected Code.vtt 14.23KB
2. Protected Code.vtt 11.42KB
2. Resolving Errors Found During Testing.mp4 10.27MB
2. Resolving Errors Found During Testing.vtt 8.89KB
2. Scheduling.mp4 10.04MB
2. Scheduling.vtt 9.99KB
2. Software Deployment.mp4 10.35MB
2. Software Deployment.vtt 9.18KB
2. Supply Chain Risk Response.mp4 10.97MB
2. Supply Chain Risk Response.vtt 9.62KB
2. Testing the Box.mp4 13.84MB
2. Testing the Box.vtt 10.00KB
2. Upstream and Downstream Dependencies.mp4 9.84MB
2. Upstream and Downstream Dependencies.vtt 8.80KB
2. Version Control.mp4 5.32MB
2. Version Control.vtt 4.98KB
3. Assess Personnel Training and Integration.mp4 4.91MB
3. Assess Personnel Training and Integration.vtt 4.08KB
3. Assess Supply Chain Risk.mp4 6.94MB
3. Assess Supply Chain Risk.vtt 5.84KB
3. Compromise of Operations.mp4 7.39MB
3. Compromise of Operations.vtt 6.78KB
3. Continuous Monitoring.mp4 15.03MB
3. Continuous Monitoring.vtt 14.59KB
3. Credential Management.mp4 6.30MB
3. Credential Management.vtt 5.78KB
3. Describe Psychological Acceptability.mp4 4.10MB
3. Describe Psychological Acceptability.vtt 3.68KB
3. Documentation.mp4 13.61MB
3. Documentation.vtt 11.32KB
3. Error Handling and Logging.mp4 14.92MB
3. Error Handling and Logging.vtt 12.46KB
3. Identify Compliance Requirements.mp4 10.05MB
3. Identify Compliance Requirements.vtt 8.74KB
3. Implementing Data Protection.mp4 16.60MB
3. Implementing Data Protection.vtt 15.89KB
3. Integrity.mp4 7.70MB
3. Integrity.vtt 6.85KB
3. Interfaces.mp4 5.67MB
3. Interfaces.vtt 4.88KB
3. Secure Build.mp4 12.15MB
3. Secure Build.vtt 9.58KB
3. Securely Store and Manage Security Data.mp4 12.16MB
3. Securely Store and Manage Security Data.vtt 11.92KB
3. Security Metrics.mp4 20.71MB
3. Security Metrics.vtt 18.00KB
3. Seeking out Vulnerabilities.mp4 8.79MB
3. Seeking Out Vulnerabilities.mp4 7.94MB
3. Seeking out Vulnerabilities.vtt 7.22KB
3. Seeking Out Vulnerabilities.vtt 6.31KB
3. Software Security Standards.mp4 11.55MB
3. Software Security Standards.vtt 7.62KB
3. Testing Methodologies.mp4 12.33MB
3. Testing Methodologies.vtt 6.18KB
3. Vulnerability Assessments and Penetration Testing.mp4 20.41MB
3. Vulnerability Assessments and Penetration Testing.vtt 17.23KB
4. Access Control.mp4 9.72MB
4. Access Control.vtt 7.57KB
4. Availability.mp4 7.43MB
4. Availability.vtt 6.36KB
4. Database Integrity.mp4 12.76MB
4. Database Integrity.vtt 10.60KB
4. Data Protection.mp4 9.24MB
4. Data Protection.vtt 8.72KB
4. Data Sharing.mp4 12.60MB
4. Data Sharing.vtt 11.25KB
4. Defence in Depth.mp4 6.40MB
4. Defence in Depth.vtt 5.86KB
4. Document Security Properties and Constraints.mp4 13.80MB
4. Document Security Properties and Constraints.vtt 10.61KB
4. Protocol Design Choices.mp4 9.07MB
4. Protocol Design Choices.vtt 6.69KB
4. Scanning.mp4 10.68MB
4. Scanning.vtt 8.37KB
4. Sensitive Data Exposure and Access Control.mp4 18.81MB
4. Sensitive Data Exposure and Access Control.vtt 12.24KB
4. Support Incident Response.mp4 19.85MB
4. Support Incident Response.vtt 16.96KB
4. Third-party Contracts.mp4 11.30MB
4. Third-party Contracts.vtt 9.99KB
5. Access Control Requirements.mp4 22.29MB
5. Access Control Requirements.vtt 19.62KB
5. Credentials.mp4 11.56MB
5. Credentials.vtt 10.47KB
5. Database Security.mp4 12.18MB
5. Database Security.vtt 9.64KB
5. Least Privilege.mp4 5.56MB
5. Least Privilege.vtt 4.87KB
5. Ongoing Testing.mp4 10.03MB
5. Ongoing Testing.vtt 8.48KB
5. Outsourcing Software Development.mp4 9.99MB
5. Outsourcing Software Development.vtt 9.23KB
5. Resource Management.mp4 13.25MB
5. Resource Management.vtt 11.77KB
5. Security Properties.mp4 8.93MB
5. Security Properties.vtt 8.03KB
5. Support Continuity of Operations.mp4 10.57MB
5. Support Continuity of Operations.vtt 8.97KB
6. Authorization.mp4 2.76MB
6. Authorization.vtt 2.33KB
6. Configuration Management.mp4 11.85MB
6. Configuration Management.vtt 8.20KB
6. Delayed Recovery.mp4 9.76MB
6. Delayed Recovery.vtt 8.73KB
6. Economy of Mechanism.mp4 11.42MB
6. Economy of Mechanism.vtt 9.65KB
6. Encryption Keys.mp4 9.50MB
6. Encryption Keys.vtt 7.95KB
6. Environment Testing.mp4 10.14MB
6. Environment Testing.vtt 7.86KB
6. Performance.mp4 8.08MB
6. Performance.vtt 7.30KB
6. Programming Language Environments.mp4 7.78MB
6. Programming Language Environments.vtt 5.46KB
7. Accountability.mp4 11.86MB
7. Accountability.vtt 11.01KB
7. Describe Resilience.mp4 4.19MB
7. Describe Resilience.vtt 3.58KB
7. Disaster Recovery Planning.mp4 13.73MB
7. Disaster Recovery Planning.vtt 12.41KB
7. Examine Architectural Risk Assessment.mp4 10.27MB
7. Examine Architectural Risk Assessment.vtt 8.77KB
7. Post-implementation Security Testing.mp4 4.31MB
7. Post-implementation Security Testing.vtt 3.63KB
7. Programming Considerations.mp4 9.49MB
7. Programming Considerations.vtt 5.99KB
7. Secure Backup and Restoration Planning.mp4 10.96MB
7. Secure Backup and Restoration Planning.vtt 9.03KB
8. Design Security Review.mp4 7.44MB
8. Design Security Review.vtt 5.55KB
8. Protection of Output.mp4 9.18MB
8. Protection of Output.vtt 6.76KB
8. Support Patch and Vulnerability Management.mp4 12.27MB
8. Support Patch and Vulnerability Management.vtt 10.86KB
9. Perform Architectural Risk Assessment.mp4 10.22MB
9. Perform Architectural Risk Assessment.vtt 6.92KB
assess-software-security-slides.pdf 617.93KB
Bonus Resources.txt 386B
confirm-adherence-to-secure-coding-practices-slides.pdf 2.76MB
create-security-controls-slides.pdf 1.15MB
Get Bonus Downloads Here.url 183B
playlist.m3u 2.26KB
playlist.m3u 913B
playlist.m3u 1.23KB
playlist.m3u 925B
playlist.m3u 817B
playlist.m3u 689B
playlist.m3u 873B
playlist.m3u 907B
playlist (1).m3u 987B
Distribution statistics by country
Taiwan (TW) 1
Total 1
IP List List of IP addresses which were distributed this torrent