Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
01. Design Software Security Architecture.mp4 |
7.37MB |
01. Design Software Security Architecture.vtt |
6.11KB |
01. Secure Coding Practices.mp4 |
10.41MB |
01. Secure Coding Practices.vtt |
8.82KB |
02. Adequate Security.mp4 |
6.06MB |
02. Adequate Security.vtt |
5.14KB |
02. Programming Considerations.mp4 |
17.86MB |
02. Programming Considerations.vtt |
12.07KB |
03. Architecture Based Controls.mp4 |
10.06MB |
03. Architecture Based Controls.vtt |
8.01KB |
03. Input Validation.mp4 |
10.58MB |
03. Input Validation.vtt |
8.09KB |
04. Client Server.mp4 |
13.07MB |
04. Client Server.vtt |
8.79KB |
04. Error Handling and Logging.mp4 |
16.35MB |
04. Error Handling and Logging.vtt |
14.60KB |
05. Protection of Output.mp4 |
8.97MB |
05. Protection of Output.vtt |
8.06KB |
05. Web-based Architecture Risk.mp4 |
6.89MB |
05. Web-based Architecture Risk.vtt |
5.89KB |
06. Pervasive Computing.mp4 |
10.28MB |
06. Pervasive Computing.vtt |
8.27KB |
06. Session Management, Injection, and XSS.mp4 |
12.85MB |
06. Session Management, Injection, and XSS.vtt |
8.89KB |
07. Configuration Management.mp4 |
9.04MB |
07. Configuration Management.vtt |
6.76KB |
07. Feature-based Risk.mp4 |
15.38MB |
07. Feature-based Risk.vtt |
11.09KB |
08. Network and Storage Requirements.mp4 |
9.04MB |
08. Network and Storage Requirements.vtt |
8.14KB |
08. Side Channel Vulnerabilities Speculative Execution.mp4 |
10.40MB |
08. Side Channel Vulnerabilities Speculative Execution.vtt |
8.58KB |
09. Resource and Memory Management.mp4 |
14.52MB |
09. Resource and Memory Management.vtt |
12.46KB |
09. Security Design Architecture - The Cloud.mp4 |
9.21MB |
09. Security Design Architecture - The Cloud.vtt |
7.48KB |
1. Analyze Code for Security Risks.mp4 |
7.78MB |
1. Analyze Code for Security Risks.vtt |
6.04KB |
1. Ascertain Code Repository Security.mp4 |
10.32MB |
1. Ascertain Code Repository Security.vtt |
9.33KB |
1. Assess Supply Chain Monitoring.mp4 |
18.55MB |
1. Assess Supply Chain Monitoring.vtt |
15.80KB |
1. Categorize Threats to Software Applications.mp4 |
13.54MB |
1. Categorize Threats to Software Applications.vtt |
10.78KB |
1. Course Overview.mp4 |
2.65MB |
1. Course Overview.mp4 |
5.14MB |
1. Course Overview.mp4 |
2.63MB |
1. Course Overview.mp4 |
5.00MB |
1. Course Overview.mp4 |
4.92MB |
1. Course Overview.mp4 |
5.31MB |
1. Course Overview.mp4 |
2.53MB |
1. Course Overview.mp4 |
2.65MB |
1. Course Overview.vtt |
1.77KB |
1. Course Overview.vtt |
2.32KB |
1. Course Overview.vtt |
1.73KB |
1. Course Overview.vtt |
1.40KB |
1. Course Overview.vtt |
2.46KB |
1. Course Overview.vtt |
2.24KB |
1. Course Overview.vtt |
1.61KB |
1. Course Overview.vtt |
1.70KB |
1. Course Overview (1).mp4 |
2.02MB |
1. Course Overview (1).vtt |
1.27KB |
1. Data Protection.mp4 |
15.56MB |
1. Data Protection.vtt |
13.65KB |
1. Decommissioning Software Securely.mp4 |
11.27MB |
1. Decommissioning Software Securely.vtt |
9.03KB |
1. Design and Evaluate Software Security Architecture.mp4 |
12.81MB |
1. Design and Evaluate Software Security Architecture.vtt |
10.34KB |
1. Design Secure System Interfaces.mp4 |
8.00MB |
1. Design Secure System Interfaces.vtt |
6.33KB |
1. Develop Security Test Cases.mp4 |
16.43MB |
1. Develop Security Test Cases.vtt |
14.06KB |
1. Develop Security Testing Strategy and Plan.mp4 |
17.58MB |
1. Develop Security Testing Strategy and Plan.vtt |
12.98KB |
1. Discovering Secure Software Requirements.mp4 |
13.41MB |
1. Discovering Secure Software Requirements.vtt |
13.31KB |
1. Documentation, Verification, and Validation.mp4 |
9.20MB |
1. Documentation, Verification, and Validation.vtt |
7.43KB |
1. Documenting Software Requirements.mp4 |
13.31MB |
1. Documenting Software Requirements.vtt |
11.20KB |
1. Domain Summary.mp4 |
6.52MB |
1. Domain Summary.mp4 |
5.61MB |
1. Domain Summary.mp4 |
7.49MB |
1. Domain Summary.mp4 |
6.97MB |
1. Domain Summary.vtt |
4.42KB |
1. Domain Summary.vtt |
3.54KB |
1. Domain Summary.vtt |
5.11KB |
1. Domain Summary.vtt |
5.11KB |
1. Evaluate Operational Risk.mp4 |
14.36MB |
1. Evaluate Operational Risk.vtt |
10.31KB |
1. Evaluate Software Supply Chain Risk Management.mp4 |
9.64MB |
1. Evaluate Software Supply Chain Risk Management.vtt |
8.62KB |
1. Governance.mp4 |
21.16MB |
1. Governance.vtt |
14.15KB |
1. Implement Software Security Controls.mp4 |
7.50MB |
1. Implement Software Security Controls.vtt |
5.48KB |
1. Integrating Security into Software.mp4 |
5.58MB |
1. Integrating Security into Software.vtt |
4.18KB |
1. Managing Software Lifecycle Risk.mp4 |
18.22MB |
1. Managing Software Lifecycle Risk.vtt |
13.03KB |
1. Managing Software Operational Security.mp4 |
17.35MB |
1. Managing Software Operational Security.vtt |
12.38KB |
1. Post-deployment and Resilience.mp4 |
12.68MB |
1. Post-deployment and Resilience.vtt |
10.89KB |
1. Secure Code Analysis.mp4 |
11.35MB |
1. Secure Code Analysis.vtt |
9.68KB |
1. Secure Coding Practices.mp4 |
8.25MB |
1. Secure Coding Practices.vtt |
6.91KB |
1. Software Code Risks.mp4 |
8.15MB |
1. Software Code Risks.vtt |
6.62KB |
1. Software Development Methodologies.mp4 |
10.16MB |
1. Software Development Methodologies.vtt |
6.85KB |
1. Specify Secure Software Configuration.mp4 |
16.05MB |
1. Specify Secure Software Configuration.vtt |
13.29KB |
10. Reasons to Migrate to the Cloud.mp4 |
10.74MB |
10. Reasons to Migrate to the Cloud.vtt |
9.56KB |
10. Sensitive Data Exposure and Access Control.mp4 |
14.30MB |
10. Sensitive Data Exposure and Access Control.vtt |
11.00KB |
11. Security Design Architecture - Mobile Applications.mp4 |
12.96MB |
11. Security Design Architecture - Mobile Applications.vtt |
9.88KB |
2. Code Review.mp4 |
6.63MB |
2. Code Review.vtt |
5.97KB |
2. Code Review Methods.mp4 |
8.43MB |
2. Code Review Methods.vtt |
7.50KB |
2. Complete Mediation.mp4 |
4.60MB |
2. Complete Mediation.vtt |
2.37KB |
2. Confidentiality.mp4 |
7.41MB |
2. Confidentiality.vtt |
5.85KB |
2. Data Destruction.mp4 |
13.61MB |
2. Data Destruction.vtt |
13.54KB |
2. Data Lifecycle.mp4 |
16.32MB |
2. Data Lifecycle.vtt |
13.96KB |
2. Deployment Environment Hardening.mp4 |
9.96MB |
2. Deployment Environment Hardening.vtt |
8.51KB |
2. Develop or Obtain Security Test Data.mp4 |
7.63MB |
2. Develop or Obtain Security Test Data.vtt |
5.84KB |
2. Document the Supply Chain.mp4 |
10.32MB |
2. Document the Supply Chain.vtt |
9.23KB |
2. External Software Attack - Human.mp4 |
13.71MB |
2. External Software Attack - Human.vtt |
12.49KB |
2. Gathering (Security) Requirements.mp4 |
15.00MB |
2. Gathering (Security) Requirements.vtt |
13.69KB |
2. Incorporate Security into the SDLC.mp4 |
23.10MB |
2. Incorporate Security into the SDLC.vtt |
17.70KB |
2. Input Validation.mp4 |
5.60MB |
2. Input Validation.vtt |
3.94KB |
2. Legal and Regulatory Issues.mp4 |
12.23MB |
2. Legal and Regulatory Issues.vtt |
8.77KB |
2. Manage Security Requirements with Third-parties.mp4 |
24.18MB |
2. Manage Security Requirements with Third-parties.vtt |
20.24KB |
2. Operating System Security.mp4 |
15.12MB |
2. Operating System Security.vtt |
12.99KB |
2. Post-implementation Support.mp4 |
11.78MB |
2. Post-implementation Support.vtt |
9.61KB |
2. Protected Code.mp4 |
18.51MB |
2. Protected Code.mp4 |
15.10MB |
2. Protected Code.vtt |
14.23KB |
2. Protected Code.vtt |
11.42KB |
2. Resolving Errors Found During Testing.mp4 |
10.27MB |
2. Resolving Errors Found During Testing.vtt |
8.89KB |
2. Scheduling.mp4 |
10.04MB |
2. Scheduling.vtt |
9.99KB |
2. Software Deployment.mp4 |
10.35MB |
2. Software Deployment.vtt |
9.18KB |
2. Supply Chain Risk Response.mp4 |
10.97MB |
2. Supply Chain Risk Response.vtt |
9.62KB |
2. Testing the Box.mp4 |
13.84MB |
2. Testing the Box.vtt |
10.00KB |
2. Upstream and Downstream Dependencies.mp4 |
9.84MB |
2. Upstream and Downstream Dependencies.vtt |
8.80KB |
2. Version Control.mp4 |
5.32MB |
2. Version Control.vtt |
4.98KB |
3. Assess Personnel Training and Integration.mp4 |
4.91MB |
3. Assess Personnel Training and Integration.vtt |
4.08KB |
3. Assess Supply Chain Risk.mp4 |
6.94MB |
3. Assess Supply Chain Risk.vtt |
5.84KB |
3. Compromise of Operations.mp4 |
7.39MB |
3. Compromise of Operations.vtt |
6.78KB |
3. Continuous Monitoring.mp4 |
15.03MB |
3. Continuous Monitoring.vtt |
14.59KB |
3. Credential Management.mp4 |
6.30MB |
3. Credential Management.vtt |
5.78KB |
3. Describe Psychological Acceptability.mp4 |
4.10MB |
3. Describe Psychological Acceptability.vtt |
3.68KB |
3. Documentation.mp4 |
13.61MB |
3. Documentation.vtt |
11.32KB |
3. Error Handling and Logging.mp4 |
14.92MB |
3. Error Handling and Logging.vtt |
12.46KB |
3. Identify Compliance Requirements.mp4 |
10.05MB |
3. Identify Compliance Requirements.vtt |
8.74KB |
3. Implementing Data Protection.mp4 |
16.60MB |
3. Implementing Data Protection.vtt |
15.89KB |
3. Integrity.mp4 |
7.70MB |
3. Integrity.vtt |
6.85KB |
3. Interfaces.mp4 |
5.67MB |
3. Interfaces.vtt |
4.88KB |
3. Secure Build.mp4 |
12.15MB |
3. Secure Build.vtt |
9.58KB |
3. Securely Store and Manage Security Data.mp4 |
12.16MB |
3. Securely Store and Manage Security Data.vtt |
11.92KB |
3. Security Metrics.mp4 |
20.71MB |
3. Security Metrics.vtt |
18.00KB |
3. Seeking out Vulnerabilities.mp4 |
8.79MB |
3. Seeking Out Vulnerabilities.mp4 |
7.94MB |
3. Seeking out Vulnerabilities.vtt |
7.22KB |
3. Seeking Out Vulnerabilities.vtt |
6.31KB |
3. Software Security Standards.mp4 |
11.55MB |
3. Software Security Standards.vtt |
7.62KB |
3. Testing Methodologies.mp4 |
12.33MB |
3. Testing Methodologies.vtt |
6.18KB |
3. Vulnerability Assessments and Penetration Testing.mp4 |
20.41MB |
3. Vulnerability Assessments and Penetration Testing.vtt |
17.23KB |
4. Access Control.mp4 |
9.72MB |
4. Access Control.vtt |
7.57KB |
4. Availability.mp4 |
7.43MB |
4. Availability.vtt |
6.36KB |
4. Database Integrity.mp4 |
12.76MB |
4. Database Integrity.vtt |
10.60KB |
4. Data Protection.mp4 |
9.24MB |
4. Data Protection.vtt |
8.72KB |
4. Data Sharing.mp4 |
12.60MB |
4. Data Sharing.vtt |
11.25KB |
4. Defence in Depth.mp4 |
6.40MB |
4. Defence in Depth.vtt |
5.86KB |
4. Document Security Properties and Constraints.mp4 |
13.80MB |
4. Document Security Properties and Constraints.vtt |
10.61KB |
4. Protocol Design Choices.mp4 |
9.07MB |
4. Protocol Design Choices.vtt |
6.69KB |
4. Scanning.mp4 |
10.68MB |
4. Scanning.vtt |
8.37KB |
4. Sensitive Data Exposure and Access Control.mp4 |
18.81MB |
4. Sensitive Data Exposure and Access Control.vtt |
12.24KB |
4. Support Incident Response.mp4 |
19.85MB |
4. Support Incident Response.vtt |
16.96KB |
4. Third-party Contracts.mp4 |
11.30MB |
4. Third-party Contracts.vtt |
9.99KB |
5. Access Control Requirements.mp4 |
22.29MB |
5. Access Control Requirements.vtt |
19.62KB |
5. Credentials.mp4 |
11.56MB |
5. Credentials.vtt |
10.47KB |
5. Database Security.mp4 |
12.18MB |
5. Database Security.vtt |
9.64KB |
5. Least Privilege.mp4 |
5.56MB |
5. Least Privilege.vtt |
4.87KB |
5. Ongoing Testing.mp4 |
10.03MB |
5. Ongoing Testing.vtt |
8.48KB |
5. Outsourcing Software Development.mp4 |
9.99MB |
5. Outsourcing Software Development.vtt |
9.23KB |
5. Resource Management.mp4 |
13.25MB |
5. Resource Management.vtt |
11.77KB |
5. Security Properties.mp4 |
8.93MB |
5. Security Properties.vtt |
8.03KB |
5. Support Continuity of Operations.mp4 |
10.57MB |
5. Support Continuity of Operations.vtt |
8.97KB |
6. Authorization.mp4 |
2.76MB |
6. Authorization.vtt |
2.33KB |
6. Configuration Management.mp4 |
11.85MB |
6. Configuration Management.vtt |
8.20KB |
6. Delayed Recovery.mp4 |
9.76MB |
6. Delayed Recovery.vtt |
8.73KB |
6. Economy of Mechanism.mp4 |
11.42MB |
6. Economy of Mechanism.vtt |
9.65KB |
6. Encryption Keys.mp4 |
9.50MB |
6. Encryption Keys.vtt |
7.95KB |
6. Environment Testing.mp4 |
10.14MB |
6. Environment Testing.vtt |
7.86KB |
6. Performance.mp4 |
8.08MB |
6. Performance.vtt |
7.30KB |
6. Programming Language Environments.mp4 |
7.78MB |
6. Programming Language Environments.vtt |
5.46KB |
7. Accountability.mp4 |
11.86MB |
7. Accountability.vtt |
11.01KB |
7. Describe Resilience.mp4 |
4.19MB |
7. Describe Resilience.vtt |
3.58KB |
7. Disaster Recovery Planning.mp4 |
13.73MB |
7. Disaster Recovery Planning.vtt |
12.41KB |
7. Examine Architectural Risk Assessment.mp4 |
10.27MB |
7. Examine Architectural Risk Assessment.vtt |
8.77KB |
7. Post-implementation Security Testing.mp4 |
4.31MB |
7. Post-implementation Security Testing.vtt |
3.63KB |
7. Programming Considerations.mp4 |
9.49MB |
7. Programming Considerations.vtt |
5.99KB |
7. Secure Backup and Restoration Planning.mp4 |
10.96MB |
7. Secure Backup and Restoration Planning.vtt |
9.03KB |
8. Design Security Review.mp4 |
7.44MB |
8. Design Security Review.vtt |
5.55KB |
8. Protection of Output.mp4 |
9.18MB |
8. Protection of Output.vtt |
6.76KB |
8. Support Patch and Vulnerability Management.mp4 |
12.27MB |
8. Support Patch and Vulnerability Management.vtt |
10.86KB |
9. Perform Architectural Risk Assessment.mp4 |
10.22MB |
9. Perform Architectural Risk Assessment.vtt |
6.92KB |
assess-software-security-slides.pdf |
617.93KB |
Bonus Resources.txt |
386B |
confirm-adherence-to-secure-coding-practices-slides.pdf |
2.76MB |
create-security-controls-slides.pdf |
1.15MB |
Get Bonus Downloads Here.url |
183B |
playlist.m3u |
2.26KB |
playlist.m3u |
913B |
playlist.m3u |
1.23KB |
playlist.m3u |
925B |
playlist.m3u |
817B |
playlist.m3u |
689B |
playlist.m3u |
873B |
playlist.m3u |
907B |
playlist (1).m3u |
987B |