本站已收录 番号和无损神作磁力链接/BT种子 

[FreeCoursesOnline.Me] [Packt] Practical DevOps Security - [FCO]

种子简介

种子名称: [FreeCoursesOnline.Me] [Packt] Practical DevOps Security - [FCO]
文件类型: 视频
文件数目: 28个文件
文件大小: 959.77 MB
收录时间: 2019-3-4 19:12
已经下载: 3
资源热度: 123
最近下载: 2024-7-6 01:45

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:066df487fb17b0058e564900e2d8ff12060a9a5c&dn=[FreeCoursesOnline.Me] [Packt] Practical DevOps Security - [FCO] 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

[FreeCoursesOnline.Me] [Packt] Practical DevOps Security - [FCO].torrent
  • 01.Integrate Security within DevOps/0101.The Course Overview.mp421.75MB
  • 01.Integrate Security within DevOps/0102.Integrate Security for a DevOps World.mp49.25MB
  • 01.Integrate Security within DevOps/0103.Risk Management in a Rapidly Changing World.mp412.14MB
  • 01.Integrate Security within DevOps/0104.Key Principles and Benefits of Secure DevOps.mp411.27MB
  • 01.Integrate Security within DevOps/0105.Business-Driven Security Strategies.mp46.55MB
  • 01.Integrate Security within DevOps/0106.OWASP Security Guidelines.mp47.16MB
  • 02.Applying Shift Left Security Approach/0201.Integrating Security Into CICD Pipeline.mp444.69MB
  • 02.Applying Shift Left Security Approach/0202.Automated Security Testing.mp429.27MB
  • 02.Applying Shift Left Security Approach/0203.Tools of the Trade.mp459.28MB
  • 02.Applying Shift Left Security Approach/0204.Red and Blue Teams.mp429.54MB
  • 03.Securing Development Practices/0301.Security Requirements.mp443.98MB
  • 03.Securing Development Practices/0302.Architectural Considerations.mp416.81MB
  • 03.Securing Development Practices/0303.Threat Modeling, Data Flow Diagrams, and Attack Surface.mp471.96MB
  • 03.Securing Development Practices/0304.Identity and Access Management.mp435.23MB
  • 03.Securing Development Practices/0305.Code Inspection.mp430.1MB
  • 03.Securing Development Practices/0306.Environment Hardening.mp489.13MB
  • 04.Security Verification in the Pipeline/0401.What Is Static Application Security Testing.mp428.83MB
  • 04.Security Verification in the Pipeline/0402.Embed SAST into the CICD Pipeline.mp436.93MB
  • 04.Security Verification in the Pipeline/0403.What Is Dynamic Application Security Testing.mp420.06MB
  • 04.Security Verification in the Pipeline/0404.Embed DAST Into the Pipeline.mp461.15MB
  • 04.Security Verification in the Pipeline/0405.Runtime Application Self-Protection (RASP) versus Interactive Application Security Testing (IAST).mp422.06MB
  • 04.Security Verification in the Pipeline/0406.Software Composition Analysis.mp413.56MB
  • 05.Deploy Secure Software/0501.Infrastructure as Code.mp448.15MB
  • 05.Deploy Secure Software/0502.Key Management and Identity Management.mp426.08MB
  • 05.Deploy Secure Software/0503.Chaos Monkey and Fuzz Testing.mp425.08MB
  • 06.Security in System Monitoring/0601.Security Monitoring.mp449.1MB
  • 06.Security in System Monitoring/0602.Governance, Risk, Compliance and Audit.mp439.97MB
  • 06.Security in System Monitoring/0603.Incident Response and Forensics.mp470.7MB