MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

[ FreeCourseWeb.com ] Learning Path - CSSLP (Certified Secure Software Lifecycle Professional)

磁力链接/BT种子名称

[ FreeCourseWeb.com ] Learning Path - CSSLP (Certified Secure Software Lifecycle Professional)

磁力链接/BT种子简介

种子哈希:ca280bb9be7bd747f03f5a2222bd5a2dad62a08f
文件大小: 1.54G
已经下载:948次
下载速度:极快
收录时间:2024-01-28
最近下载:2025-10-05

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:CA280BB9BE7BD747F03F5A2222BD5A2DAD62A08F
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 91视频 含羞草 欲漫涩 逼哩逼哩 成人快手 51品茶 抖阴破解版 极乐禁地 91短视频 抖音Max TikTok成人版 PornHub 听泉鉴鲍 少女日记 草榴社区 哆哔涩漫 呦乐园 萝莉岛 悠悠禁区 拔萝卜 疯马秀

最近搜索

开源 飞哥 边 三射 干什么 好久没有 ts 操射 清纯露脸美少女 红狼 攻 ts 被同学 我妈 sbs 亲姐姐 双女大秀 海角社区 路上 情侣沙发 九妹 萌妹子 长清美女 あかり 少狼 梁佳 鱼网 李爱 超级喷水 朋友 极品m 一线b

文件列表

  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/4. Documenting Software Requirements/2. Manage Security Requirements with Third-parties.mp4 25.3 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/2. Software Development Methodologies/2. Incorporate Security into the SDLC.mp4 24.2 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/5. Access Control Requirements.mp4 23.4 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/1. Governance.mp4 22.2 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/3. Security Metrics.mp4 21.7 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/3. Vulnerability Assessments and Penetration Testing.mp4 21.4 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/4. Support Incident Response.mp4 20.8 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/4. Sensitive Data Exposure and Access Control.mp4 19.7 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/4. Assess Software Supply Chain Operations/1. Assess Supply Chain Monitoring.mp4 19.5 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Software Code Risks - 25min/2. Protected Code.mp4 19.4 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/1. Managing Software Lifecycle Risk.mp4 19.1 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/02. Programming Considerations.mp4 18.7 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/1. Develop Security Testing Strategy and Plan.mp4 18.4 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/1. Managing Software Operational Security.mp4 18.2 MB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/3. Implementing Data Protection.mp4 17.4 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/1. Develop Security Test Cases.mp4 17.2 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/04. Error Handling and Logging.mp4 17.1 MB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/2. Data Lifecycle.mp4 17.1 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/1. Specify Secure Software Configuration.mp4 16.8 MB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/1. Data Protection.mp4 16.3 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/07. Feature-based Risk.mp4 16.1 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/2. Operating System Security.mp4 15.9 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Create Security Controls/2. Protected Code.mp4 15.8 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/3. Continuous Monitoring.mp4 15.8 MB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/2. Gathering (Security) Requirements.mp4 15.7 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/3. Error Handling and Logging.mp4 15.6 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/09. Resource and Memory Management.mp4 15.2 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/1. Evaluate Operational Risk.mp4 15.1 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/10. Sensitive Data Exposure and Access Control.mp4 15.0 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/2. Testing the Box.mp4 14.5 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/4. Document Security Properties and Constraints.mp4 14.5 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/7. Disaster Recovery Planning.mp4 14.4 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/2. External Software Attack - Human.mp4 14.4 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/3. Documentation.mp4 14.3 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/5. Decommissioning Software Securely/2. Data Destruction.mp4 14.3 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/1. Categorize Threats to Software Applications.mp4 14.2 MB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/1. Discovering Secure Software Requirements.mp4 14.1 MB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/4. Documenting Software Requirements/1. Documenting Software Requirements.mp4 14.0 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/5. Resource Management.mp4 13.9 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/04. Client Server.mp4 13.7 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/11. Security Design Architecture - Mobile Applications.mp4 13.6 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/06. Session Management, Injection, and XSS.mp4 13.5 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/1. Design and Evaluate Software Security Architecture.mp4 13.4 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/4. Database Integrity.mp4 13.4 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/1. Post-deployment and Resilience.mp4 13.3 MB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/4. Data Sharing.mp4 13.2 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/3. Testing Methodologies.mp4 12.9 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/8. Support Patch and Vulnerability Management.mp4 12.9 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/2. Legal and Regulatory Issues.mp4 12.8 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/5. Database Security.mp4 12.8 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/3. Securely Store and Manage Security Data.mp4 12.8 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/3. Secure Build.mp4 12.7 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/7. Accountability.mp4 12.4 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/6. Configuration Management.mp4 12.4 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/2. Post-implementation Support.mp4 12.4 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/5. Credentials.mp4 12.1 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/3. Software Security Standards.mp4 12.1 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/6. Economy of Mechanism.mp4 12.0 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/1. Secure Code Analysis.mp4 11.9 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/4. Third-party Contracts.mp4 11.8 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/5. Decommissioning Software Securely/1. Decommissioning Software Securely.mp4 11.8 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/4. Assess Software Supply Chain Operations/2. Supply Chain Risk Response.mp4 11.5 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/7. Secure Backup and Restoration Planning.mp4 11.5 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/10. Reasons to Migrate to the Cloud.mp4 11.3 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/4. Scanning.mp4 11.2 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/03. Input Validation.mp4 11.1 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/5. Support Continuity of Operations.mp4 11.1 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/01. Secure Coding Practices.mp4 10.9 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/08. Side Channel Vulnerabilities Speculative Execution.mp4 10.9 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/2. Software Deployment.mp4 10.8 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/2. Document the Supply Chain.mp4 10.8 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/1. Ascertain Code Repository Security.mp4 10.8 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/06. Pervasive Computing.mp4 10.8 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/7. Examine Architectural Risk Assessment.mp4 10.8 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/2. Resolving Errors Found During Testing.mp4 10.8 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/9. Perform Architectural Risk Assessment.mp4 10.7 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/2. Software Development Methodologies/1. Software Development Methodologies.mp4 10.6 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/6. Environment Testing.mp4 10.6 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/03. Architecture Based Controls.mp4 10.6 MB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/3. Identify Compliance Requirements.mp4 10.5 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/2. Scheduling.mp4 10.5 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/5. Ongoing Testing.mp4 10.5 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/5. Outsourcing Software Development.mp4 10.5 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/2. Deployment Environment Hardening.mp4 10.4 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/2. Upstream and Downstream Dependencies.mp4 10.3 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/6. Delayed Recovery.mp4 10.2 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/4. Access Control.mp4 10.2 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/1. Evaluate Software Supply Chain Risk Management.mp4 10.1 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/6. Encryption Keys.mp4 10.0 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/7. Programming Considerations.mp4 10.0 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/4. Data Protection.mp4 9.7 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/09. Security Design Architecture - The Cloud.mp4 9.7 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/1. Documentation, Verification, and Validation.mp4 9.6 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/8. Protection of Output.mp4 9.6 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/4. Protocol Design Choices.mp4 9.5 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/07. Configuration Management.mp4 9.5 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/08. Network and Storage Requirements.mp4 9.5 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/05. Protection of Output.mp4 9.4 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/5. Security Properties.mp4 9.4 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/3. Seeking out Vulnerabilities.mp4 9.2 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/2. Code Review Methods.mp4 8.8 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/1. Secure Coding Practices.mp4 8.6 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Software Code Risks - 25min/1. Software Code Risks.mp4 8.5 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/6. Performance.mp4 8.5 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/1. Design Secure System Interfaces.mp4 8.4 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/3. Seeking Out Vulnerabilities.mp4 8.3 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/1. Analyze Code for Security Risks.mp4 8.2 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/6. Programming Language Environments.mp4 8.2 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/3. Integrity.mp4 8.1 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/2. Develop or Obtain Security Test Data.mp4 8.0 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Create Security Controls/1. Implement Software Security Controls.mp4 7.9 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/6. Domain Summary/1. Domain Summary.mp4 7.9 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/8. Design Security Review.mp4 7.8 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/4. Availability.mp4 7.8 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/2. Confidentiality.mp4 7.8 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/3. Compromise of Operations.mp4 7.7 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/01. Design Software Security Architecture.mp4 7.7 MB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/5. Domain Summary/1. Domain Summary.mp4 7.3 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/3. Assess Supply Chain Risk.mp4 7.3 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/05. Web-based Architecture Risk.mp4 7.2 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/2. Code Review.mp4 7.0 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/4. Domain Summary/1. Domain Summary.mp4 6.8 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/4. Defence in Depth.mp4 6.7 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/3. Credential Management.mp4 6.6 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/02. Adequate Security.mp4 6.4 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/3. Interfaces.mp4 5.9 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/5. Domain Summary - 5min/1. Domain Summary.mp4 5.9 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/2. Input Validation.mp4 5.9 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/1. Integrating Security into Software.mp4 5.8 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/5. Least Privilege.mp4 5.8 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/2. Version Control.mp4 5.6 MB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 5.6 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 5.4 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 5.2 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 5.2 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/3. Assess Personnel Training and Integration.mp4 5.1 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/2. Complete Mediation.mp4 4.8 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/7. Post-implementation Security Testing.mp4 4.5 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/7. Describe Resilience.mp4 4.4 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/3. Describe Psychological Acceptability.mp4 4.3 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02/confirm-adherence-to-secure-coding-practices-slides.pdf 2.9 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/6. Authorization.mp4 2.9 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 2.8 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 2.8 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 2.8 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 2.7 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview (1).mp4 2.1 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/04/create-security-controls-slides.pdf 1.2 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/03/assess-software-security-slides.pdf 632.8 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/4. Documenting Software Requirements/2. Manage Security Requirements with Third-parties.vtt 20.7 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/5. Access Control Requirements.vtt 20.1 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/3. Security Metrics.vtt 18.4 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/2. Software Development Methodologies/2. Incorporate Security into the SDLC.vtt 18.1 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/3. Vulnerability Assessments and Penetration Testing.vtt 17.6 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/4. Support Incident Response.vtt 17.4 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/3. Implementing Data Protection.vtt 16.3 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/4. Assess Software Supply Chain Operations/1. Assess Supply Chain Monitoring.vtt 16.2 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/04. Error Handling and Logging.vtt 15.0 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/3. Continuous Monitoring.vtt 14.9 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Software Code Risks - 25min/2. Protected Code.vtt 14.6 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/1. Governance.vtt 14.5 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/1. Develop Security Test Cases.vtt 14.4 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/2. Data Lifecycle.vtt 14.3 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/2. Gathering (Security) Requirements.vtt 14.0 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/1. Data Protection.vtt 14.0 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/5. Decommissioning Software Securely/2. Data Destruction.vtt 13.9 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/1. Discovering Secure Software Requirements.vtt 13.6 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/1. Specify Secure Software Configuration.vtt 13.6 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/1. Managing Software Lifecycle Risk.vtt 13.3 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/2. Operating System Security.vtt 13.3 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/1. Develop Security Testing Strategy and Plan.vtt 13.3 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/2. External Software Attack - Human.vtt 12.8 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/3. Error Handling and Logging.vtt 12.8 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/09. Resource and Memory Management.vtt 12.8 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/7. Disaster Recovery Planning.vtt 12.7 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/1. Managing Software Operational Security.vtt 12.7 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/4. Sensitive Data Exposure and Access Control.vtt 12.5 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/02. Programming Considerations.vtt 12.4 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/3. Securely Store and Manage Security Data.vtt 12.2 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/5. Resource Management.vtt 12.1 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Create Security Controls/2. Protected Code.vtt 11.7 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/3. Documentation.vtt 11.6 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/4. Data Sharing.vtt 11.5 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/4. Documenting Software Requirements/1. Documenting Software Requirements.vtt 11.5 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/07. Feature-based Risk.vtt 11.4 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/7. Accountability.vtt 11.3 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/10. Sensitive Data Exposure and Access Control.vtt 11.3 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/1. Post-deployment and Resilience.vtt 11.2 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/8. Support Patch and Vulnerability Management.vtt 11.1 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/1. Categorize Threats to Software Applications.vtt 11.0 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/4. Document Security Properties and Constraints.vtt 10.9 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/4. Database Integrity.vtt 10.9 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/5. Credentials.vtt 10.7 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/1. Design and Evaluate Software Security Architecture.vtt 10.6 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/1. Evaluate Operational Risk.vtt 10.6 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/2. Testing the Box.vtt 10.2 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/4. Third-party Contracts.vtt 10.2 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/2. Scheduling.vtt 10.2 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/11. Security Design Architecture - Mobile Applications.vtt 10.1 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/1. Secure Code Analysis.vtt 9.9 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/6. Economy of Mechanism.vtt 9.9 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/5. Database Security.vtt 9.9 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/4. Assess Software Supply Chain Operations/2. Supply Chain Risk Response.vtt 9.9 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/2. Post-implementation Support.vtt 9.8 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/3. Secure Build.vtt 9.8 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/10. Reasons to Migrate to the Cloud.vtt 9.8 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/1. Ascertain Code Repository Security.vtt 9.6 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/2. Document the Supply Chain.vtt 9.5 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/5. Outsourcing Software Development.vtt 9.4 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/2. Software Deployment.vtt 9.4 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/7. Secure Backup and Restoration Planning.vtt 9.2 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/5. Decommissioning Software Securely/1. Decommissioning Software Securely.vtt 9.2 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/5. Support Continuity of Operations.vtt 9.2 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/06. Session Management, Injection, and XSS.vtt 9.1 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/2. Resolving Errors Found During Testing.vtt 9.1 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/01. Secure Coding Practices.vtt 9.0 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/2. Upstream and Downstream Dependencies.vtt 9.0 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/04. Client Server.vtt 9.0 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/2. Legal and Regulatory Issues.vtt 9.0 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/7. Examine Architectural Risk Assessment.vtt 9.0 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/3. Identify Compliance Requirements.vtt 9.0 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/6. Delayed Recovery.vtt 8.9 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/4. Data Protection.vtt 8.9 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/1. Evaluate Software Supply Chain Risk Management.vtt 8.8 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/08. Side Channel Vulnerabilities Speculative Execution.vtt 8.8 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/2. Deployment Environment Hardening.vtt 8.7 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/5. Ongoing Testing.vtt 8.7 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/4. Scanning.vtt 8.6 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/06. Pervasive Computing.vtt 8.5 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/6. Configuration Management.vtt 8.4 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/08. Network and Storage Requirements.vtt 8.3 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/03. Input Validation.vtt 8.3 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/05. Protection of Output.vtt 8.2 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/5. Security Properties.vtt 8.2 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/03. Architecture Based Controls.vtt 8.2 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/6. Encryption Keys.vtt 8.1 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/6. Environment Testing.vtt 8.0 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/3. Software Security Standards.vtt 7.8 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/4. Access Control.vtt 7.7 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/2. Code Review Methods.vtt 7.7 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/09. Security Design Architecture - The Cloud.vtt 7.7 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/1. Documentation, Verification, and Validation.vtt 7.6 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/6. Performance.vtt 7.5 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/3. Seeking out Vulnerabilities.vtt 7.4 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/9. Perform Architectural Risk Assessment.vtt 7.1 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/1. Secure Coding Practices.vtt 7.1 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/3. Integrity.vtt 7.0 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/2. Software Development Methodologies/1. Software Development Methodologies.vtt 7.0 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/3. Compromise of Operations.vtt 6.9 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/07. Configuration Management.vtt 6.9 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/8. Protection of Output.vtt 6.9 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/4. Protocol Design Choices.vtt 6.9 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Software Code Risks - 25min/1. Software Code Risks.vtt 6.8 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/4. Availability.vtt 6.5 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/1. Design Secure System Interfaces.vtt 6.5 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/3. Seeking Out Vulnerabilities.vtt 6.5 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/3. Testing Methodologies.vtt 6.3 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/01. Design Software Security Architecture.vtt 6.3 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/1. Analyze Code for Security Risks.vtt 6.2 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/7. Programming Considerations.vtt 6.1 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/2. Code Review.vtt 6.1 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/05. Web-based Architecture Risk.vtt 6.0 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/4. Defence in Depth.vtt 6.0 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/2. Confidentiality.vtt 6.0 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/3. Assess Supply Chain Risk.vtt 6.0 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/2. Develop or Obtain Security Test Data.vtt 6.0 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/3. Credential Management.vtt 5.9 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/8. Design Security Review.vtt 5.7 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Create Security Controls/1. Implement Software Security Controls.vtt 5.6 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/6. Programming Language Environments.vtt 5.6 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/02. Adequate Security.vtt 5.3 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/6. Domain Summary/1. Domain Summary.vtt 5.2 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/5. Domain Summary/1. Domain Summary.vtt 5.2 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/2. Version Control.vtt 5.1 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/3. Interfaces.vtt 5.0 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/5. Least Privilege.vtt 5.0 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/4. Domain Summary/1. Domain Summary.vtt 4.5 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/1. Integrating Security into Software.vtt 4.3 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/3. Assess Personnel Training and Integration.vtt 4.2 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/2. Input Validation.vtt 4.0 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/3. Describe Psychological Acceptability.vtt 3.8 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/7. Post-implementation Security Testing.vtt 3.7 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/7. Describe Resilience.vtt 3.7 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/5. Domain Summary - 5min/1. Domain Summary.vtt 3.6 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 2.5 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/2. Complete Mediation.vtt 2.4 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/6. Authorization.vtt 2.4 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 2.4 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/playlist.m3u 2.3 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 2.3 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 1.8 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 1.8 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 1.7 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 1.6 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 1.4 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview (1).vtt 1.3 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/playlist.m3u 1.3 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/playlist (1).m3u 987 Bytes
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/playlist.m3u 925 Bytes
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/playlist.m3u 913 Bytes
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/playlist.m3u 907 Bytes
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/playlist.m3u 873 Bytes
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/playlist.m3u 817 Bytes
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/playlist.m3u 689 Bytes
  • ~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • Get Bonus Downloads Here.url 183 Bytes

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!