搜索
[ FreeCourseWeb.com ] Learning Path - CSSLP (Certified Secure Software Lifecycle Professional)
磁力链接/BT种子名称
[ FreeCourseWeb.com ] Learning Path - CSSLP (Certified Secure Software Lifecycle Professional)
磁力链接/BT种子简介
种子哈希:
ca280bb9be7bd747f03f5a2222bd5a2dad62a08f
文件大小:
1.54G
已经下载:
948
次
下载速度:
极快
收录时间:
2024-01-28
最近下载:
2025-10-05
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:CA280BB9BE7BD747F03F5A2222BD5A2DAD62A08F
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
极乐禁地
91短视频
抖音Max
TikTok成人版
PornHub
听泉鉴鲍
少女日记
草榴社区
哆哔涩漫
呦乐园
萝莉岛
悠悠禁区
拔萝卜
疯马秀
最近搜索
开源
飞哥
边
三射
干什么
好久没有
ts 操射
清纯露脸美少女
红狼
攻 ts
被同学
我妈
sbs
亲姐姐
双女大秀
海角社区
路上
情侣沙发
九妹
萌妹子
长清美女
あかり
少狼
梁佳
鱼网
李爱
超级喷水
朋友
极品m
一线b
文件列表
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/4. Documenting Software Requirements/2. Manage Security Requirements with Third-parties.mp4
25.3 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/2. Software Development Methodologies/2. Incorporate Security into the SDLC.mp4
24.2 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/5. Access Control Requirements.mp4
23.4 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/1. Governance.mp4
22.2 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/3. Security Metrics.mp4
21.7 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/3. Vulnerability Assessments and Penetration Testing.mp4
21.4 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/4. Support Incident Response.mp4
20.8 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/4. Sensitive Data Exposure and Access Control.mp4
19.7 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/4. Assess Software Supply Chain Operations/1. Assess Supply Chain Monitoring.mp4
19.5 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Software Code Risks - 25min/2. Protected Code.mp4
19.4 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/1. Managing Software Lifecycle Risk.mp4
19.1 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/02. Programming Considerations.mp4
18.7 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/1. Develop Security Testing Strategy and Plan.mp4
18.4 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/1. Managing Software Operational Security.mp4
18.2 MB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/3. Implementing Data Protection.mp4
17.4 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/1. Develop Security Test Cases.mp4
17.2 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/04. Error Handling and Logging.mp4
17.1 MB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/2. Data Lifecycle.mp4
17.1 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/1. Specify Secure Software Configuration.mp4
16.8 MB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/1. Data Protection.mp4
16.3 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/07. Feature-based Risk.mp4
16.1 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/2. Operating System Security.mp4
15.9 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Create Security Controls/2. Protected Code.mp4
15.8 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/3. Continuous Monitoring.mp4
15.8 MB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/2. Gathering (Security) Requirements.mp4
15.7 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/3. Error Handling and Logging.mp4
15.6 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/09. Resource and Memory Management.mp4
15.2 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/1. Evaluate Operational Risk.mp4
15.1 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/10. Sensitive Data Exposure and Access Control.mp4
15.0 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/2. Testing the Box.mp4
14.5 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/4. Document Security Properties and Constraints.mp4
14.5 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/7. Disaster Recovery Planning.mp4
14.4 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/2. External Software Attack - Human.mp4
14.4 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/3. Documentation.mp4
14.3 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/5. Decommissioning Software Securely/2. Data Destruction.mp4
14.3 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/1. Categorize Threats to Software Applications.mp4
14.2 MB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/1. Discovering Secure Software Requirements.mp4
14.1 MB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/4. Documenting Software Requirements/1. Documenting Software Requirements.mp4
14.0 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/5. Resource Management.mp4
13.9 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/04. Client Server.mp4
13.7 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/11. Security Design Architecture - Mobile Applications.mp4
13.6 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/06. Session Management, Injection, and XSS.mp4
13.5 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/1. Design and Evaluate Software Security Architecture.mp4
13.4 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/4. Database Integrity.mp4
13.4 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/1. Post-deployment and Resilience.mp4
13.3 MB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/4. Data Sharing.mp4
13.2 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/3. Testing Methodologies.mp4
12.9 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/8. Support Patch and Vulnerability Management.mp4
12.9 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/2. Legal and Regulatory Issues.mp4
12.8 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/5. Database Security.mp4
12.8 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/3. Securely Store and Manage Security Data.mp4
12.8 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/3. Secure Build.mp4
12.7 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/7. Accountability.mp4
12.4 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/6. Configuration Management.mp4
12.4 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/2. Post-implementation Support.mp4
12.4 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/5. Credentials.mp4
12.1 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/3. Software Security Standards.mp4
12.1 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/6. Economy of Mechanism.mp4
12.0 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/1. Secure Code Analysis.mp4
11.9 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/4. Third-party Contracts.mp4
11.8 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/5. Decommissioning Software Securely/1. Decommissioning Software Securely.mp4
11.8 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/4. Assess Software Supply Chain Operations/2. Supply Chain Risk Response.mp4
11.5 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/7. Secure Backup and Restoration Planning.mp4
11.5 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/10. Reasons to Migrate to the Cloud.mp4
11.3 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/4. Scanning.mp4
11.2 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/03. Input Validation.mp4
11.1 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/5. Support Continuity of Operations.mp4
11.1 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/01. Secure Coding Practices.mp4
10.9 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/08. Side Channel Vulnerabilities Speculative Execution.mp4
10.9 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/2. Software Deployment.mp4
10.8 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/2. Document the Supply Chain.mp4
10.8 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/1. Ascertain Code Repository Security.mp4
10.8 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/06. Pervasive Computing.mp4
10.8 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/7. Examine Architectural Risk Assessment.mp4
10.8 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/2. Resolving Errors Found During Testing.mp4
10.8 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/9. Perform Architectural Risk Assessment.mp4
10.7 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/2. Software Development Methodologies/1. Software Development Methodologies.mp4
10.6 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/6. Environment Testing.mp4
10.6 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/03. Architecture Based Controls.mp4
10.6 MB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/3. Identify Compliance Requirements.mp4
10.5 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/2. Scheduling.mp4
10.5 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/5. Ongoing Testing.mp4
10.5 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/5. Outsourcing Software Development.mp4
10.5 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/2. Deployment Environment Hardening.mp4
10.4 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/2. Upstream and Downstream Dependencies.mp4
10.3 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/6. Delayed Recovery.mp4
10.2 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/4. Access Control.mp4
10.2 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/1. Evaluate Software Supply Chain Risk Management.mp4
10.1 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/6. Encryption Keys.mp4
10.0 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/7. Programming Considerations.mp4
10.0 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/4. Data Protection.mp4
9.7 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/09. Security Design Architecture - The Cloud.mp4
9.7 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/1. Documentation, Verification, and Validation.mp4
9.6 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/8. Protection of Output.mp4
9.6 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/4. Protocol Design Choices.mp4
9.5 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/07. Configuration Management.mp4
9.5 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/08. Network and Storage Requirements.mp4
9.5 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/05. Protection of Output.mp4
9.4 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/5. Security Properties.mp4
9.4 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/3. Seeking out Vulnerabilities.mp4
9.2 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/2. Code Review Methods.mp4
8.8 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/1. Secure Coding Practices.mp4
8.6 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Software Code Risks - 25min/1. Software Code Risks.mp4
8.5 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/6. Performance.mp4
8.5 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/1. Design Secure System Interfaces.mp4
8.4 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/3. Seeking Out Vulnerabilities.mp4
8.3 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/1. Analyze Code for Security Risks.mp4
8.2 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/6. Programming Language Environments.mp4
8.2 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/3. Integrity.mp4
8.1 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/2. Develop or Obtain Security Test Data.mp4
8.0 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Create Security Controls/1. Implement Software Security Controls.mp4
7.9 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/6. Domain Summary/1. Domain Summary.mp4
7.9 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/8. Design Security Review.mp4
7.8 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/4. Availability.mp4
7.8 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/2. Confidentiality.mp4
7.8 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/3. Compromise of Operations.mp4
7.7 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/01. Design Software Security Architecture.mp4
7.7 MB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/5. Domain Summary/1. Domain Summary.mp4
7.3 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/3. Assess Supply Chain Risk.mp4
7.3 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/05. Web-based Architecture Risk.mp4
7.2 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/2. Code Review.mp4
7.0 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/4. Domain Summary/1. Domain Summary.mp4
6.8 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/4. Defence in Depth.mp4
6.7 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/3. Credential Management.mp4
6.6 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/02. Adequate Security.mp4
6.4 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/3. Interfaces.mp4
5.9 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/5. Domain Summary - 5min/1. Domain Summary.mp4
5.9 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/2. Input Validation.mp4
5.9 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/1. Integrating Security into Software.mp4
5.8 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/5. Least Privilege.mp4
5.8 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/2. Version Control.mp4
5.6 MB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4
5.6 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4
5.4 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4
5.2 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4
5.2 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/3. Assess Personnel Training and Integration.mp4
5.1 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/2. Complete Mediation.mp4
4.8 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/7. Post-implementation Security Testing.mp4
4.5 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/7. Describe Resilience.mp4
4.4 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/3. Describe Psychological Acceptability.mp4
4.3 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02/confirm-adherence-to-secure-coding-practices-slides.pdf
2.9 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/6. Authorization.mp4
2.9 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4
2.8 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4
2.8 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4
2.8 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4
2.7 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview (1).mp4
2.1 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/04/create-security-controls-slides.pdf
1.2 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/03/assess-software-security-slides.pdf
632.8 kB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/4. Documenting Software Requirements/2. Manage Security Requirements with Third-parties.vtt
20.7 kB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/5. Access Control Requirements.vtt
20.1 kB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/3. Security Metrics.vtt
18.4 kB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/2. Software Development Methodologies/2. Incorporate Security into the SDLC.vtt
18.1 kB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/3. Vulnerability Assessments and Penetration Testing.vtt
17.6 kB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/4. Support Incident Response.vtt
17.4 kB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/3. Implementing Data Protection.vtt
16.3 kB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/4. Assess Software Supply Chain Operations/1. Assess Supply Chain Monitoring.vtt
16.2 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/04. Error Handling and Logging.vtt
15.0 kB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/3. Continuous Monitoring.vtt
14.9 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Software Code Risks - 25min/2. Protected Code.vtt
14.6 kB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/1. Governance.vtt
14.5 kB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/1. Develop Security Test Cases.vtt
14.4 kB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/2. Data Lifecycle.vtt
14.3 kB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/2. Gathering (Security) Requirements.vtt
14.0 kB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/1. Data Protection.vtt
14.0 kB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/5. Decommissioning Software Securely/2. Data Destruction.vtt
13.9 kB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/1. Discovering Secure Software Requirements.vtt
13.6 kB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/1. Specify Secure Software Configuration.vtt
13.6 kB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/1. Managing Software Lifecycle Risk.vtt
13.3 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/2. Operating System Security.vtt
13.3 kB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/1. Develop Security Testing Strategy and Plan.vtt
13.3 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/2. External Software Attack - Human.vtt
12.8 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/3. Error Handling and Logging.vtt
12.8 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/09. Resource and Memory Management.vtt
12.8 kB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/7. Disaster Recovery Planning.vtt
12.7 kB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/1. Managing Software Operational Security.vtt
12.7 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/4. Sensitive Data Exposure and Access Control.vtt
12.5 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/02. Programming Considerations.vtt
12.4 kB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/3. Securely Store and Manage Security Data.vtt
12.2 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/5. Resource Management.vtt
12.1 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Create Security Controls/2. Protected Code.vtt
11.7 kB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/3. Documentation.vtt
11.6 kB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/4. Data Sharing.vtt
11.5 kB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/4. Documenting Software Requirements/1. Documenting Software Requirements.vtt
11.5 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/07. Feature-based Risk.vtt
11.4 kB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/7. Accountability.vtt
11.3 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/10. Sensitive Data Exposure and Access Control.vtt
11.3 kB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/1. Post-deployment and Resilience.vtt
11.2 kB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/8. Support Patch and Vulnerability Management.vtt
11.1 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/1. Categorize Threats to Software Applications.vtt
11.0 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/4. Document Security Properties and Constraints.vtt
10.9 kB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/4. Database Integrity.vtt
10.9 kB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/5. Credentials.vtt
10.7 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/1. Design and Evaluate Software Security Architecture.vtt
10.6 kB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/1. Evaluate Operational Risk.vtt
10.6 kB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/2. Testing the Box.vtt
10.2 kB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/4. Third-party Contracts.vtt
10.2 kB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/2. Scheduling.vtt
10.2 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/11. Security Design Architecture - Mobile Applications.vtt
10.1 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/1. Secure Code Analysis.vtt
9.9 kB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/6. Economy of Mechanism.vtt
9.9 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/5. Database Security.vtt
9.9 kB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/4. Assess Software Supply Chain Operations/2. Supply Chain Risk Response.vtt
9.9 kB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/2. Post-implementation Support.vtt
9.8 kB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/3. Secure Build.vtt
9.8 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/10. Reasons to Migrate to the Cloud.vtt
9.8 kB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/1. Ascertain Code Repository Security.vtt
9.6 kB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/2. Document the Supply Chain.vtt
9.5 kB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/5. Outsourcing Software Development.vtt
9.4 kB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/2. Software Deployment.vtt
9.4 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/7. Secure Backup and Restoration Planning.vtt
9.2 kB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/5. Decommissioning Software Securely/1. Decommissioning Software Securely.vtt
9.2 kB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/5. Support Continuity of Operations.vtt
9.2 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/06. Session Management, Injection, and XSS.vtt
9.1 kB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/2. Resolving Errors Found During Testing.vtt
9.1 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/01. Secure Coding Practices.vtt
9.0 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/2. Upstream and Downstream Dependencies.vtt
9.0 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/04. Client Server.vtt
9.0 kB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/2. Legal and Regulatory Issues.vtt
9.0 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/7. Examine Architectural Risk Assessment.vtt
9.0 kB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/3. Identify Compliance Requirements.vtt
9.0 kB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/6. Delayed Recovery.vtt
8.9 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/4. Data Protection.vtt
8.9 kB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/1. Evaluate Software Supply Chain Risk Management.vtt
8.8 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/08. Side Channel Vulnerabilities Speculative Execution.vtt
8.8 kB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/2. Deployment Environment Hardening.vtt
8.7 kB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/5. Ongoing Testing.vtt
8.7 kB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/4. Scanning.vtt
8.6 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/06. Pervasive Computing.vtt
8.5 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/6. Configuration Management.vtt
8.4 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/08. Network and Storage Requirements.vtt
8.3 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/03. Input Validation.vtt
8.3 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/05. Protection of Output.vtt
8.2 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/5. Security Properties.vtt
8.2 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/03. Architecture Based Controls.vtt
8.2 kB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/6. Encryption Keys.vtt
8.1 kB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/6. Environment Testing.vtt
8.0 kB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/3. Software Security Standards.vtt
7.8 kB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/4. Access Control.vtt
7.7 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/2. Code Review Methods.vtt
7.7 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/09. Security Design Architecture - The Cloud.vtt
7.7 kB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/1. Documentation, Verification, and Validation.vtt
7.6 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/6. Performance.vtt
7.5 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/3. Seeking out Vulnerabilities.vtt
7.4 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/9. Perform Architectural Risk Assessment.vtt
7.1 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/1. Secure Coding Practices.vtt
7.1 kB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/3. Integrity.vtt
7.0 kB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/2. Software Development Methodologies/1. Software Development Methodologies.vtt
7.0 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/3. Compromise of Operations.vtt
6.9 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/07. Configuration Management.vtt
6.9 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/8. Protection of Output.vtt
6.9 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/4. Protocol Design Choices.vtt
6.9 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Software Code Risks - 25min/1. Software Code Risks.vtt
6.8 kB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/4. Availability.vtt
6.5 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/1. Design Secure System Interfaces.vtt
6.5 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/3. Seeking Out Vulnerabilities.vtt
6.5 kB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/3. Testing Methodologies.vtt
6.3 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/01. Design Software Security Architecture.vtt
6.3 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/1. Analyze Code for Security Risks.vtt
6.2 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/7. Programming Considerations.vtt
6.1 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/2. Code Review.vtt
6.1 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/05. Web-based Architecture Risk.vtt
6.0 kB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/4. Defence in Depth.vtt
6.0 kB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/2. Confidentiality.vtt
6.0 kB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/3. Assess Supply Chain Risk.vtt
6.0 kB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/2. Develop or Obtain Security Test Data.vtt
6.0 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/3. Credential Management.vtt
5.9 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/8. Design Security Review.vtt
5.7 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Create Security Controls/1. Implement Software Security Controls.vtt
5.6 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/6. Programming Language Environments.vtt
5.6 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/02. Adequate Security.vtt
5.3 kB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/6. Domain Summary/1. Domain Summary.vtt
5.2 kB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/5. Domain Summary/1. Domain Summary.vtt
5.2 kB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/2. Version Control.vtt
5.1 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/3. Interfaces.vtt
5.0 kB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/5. Least Privilege.vtt
5.0 kB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/4. Domain Summary/1. Domain Summary.vtt
4.5 kB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/1. Integrating Security into Software.vtt
4.3 kB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/3. Assess Personnel Training and Integration.vtt
4.2 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/2. Input Validation.vtt
4.0 kB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/3. Describe Psychological Acceptability.vtt
3.8 kB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/7. Post-implementation Security Testing.vtt
3.7 kB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/7. Describe Resilience.vtt
3.7 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/5. Domain Summary - 5min/1. Domain Summary.vtt
3.6 kB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt
2.5 kB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/2. Complete Mediation.vtt
2.4 kB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/6. Authorization.vtt
2.4 kB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt
2.4 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/playlist.m3u
2.3 kB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt
2.3 kB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt
1.8 kB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt
1.8 kB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt
1.7 kB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt
1.6 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt
1.4 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview (1).vtt
1.3 kB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/playlist.m3u
1.3 kB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/playlist (1).m3u
987 Bytes
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/playlist.m3u
925 Bytes
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/playlist.m3u
913 Bytes
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/playlist.m3u
907 Bytes
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/playlist.m3u
873 Bytes
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/playlist.m3u
817 Bytes
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/playlist.m3u
689 Bytes
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
Get Bonus Downloads Here.url
183 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!