本站已收录 番号和无损神作磁力链接/BT种子 

[FreeCoursesOnline.Me] O`REILLY - Fundamentals of Secure Software

种子简介

种子名称: [FreeCoursesOnline.Me] O`REILLY - Fundamentals of Secure Software
文件类型: 视频
文件数目: 67个文件
文件大小: 1.87 GB
收录时间: 2023-2-22 03:05
已经下载: 3
资源热度: 243
最近下载: 2024-12-4 18:20

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:85c3d306d73bb041ec736b4ad5be8ae64a1f03b8&dn=[FreeCoursesOnline.Me] O`REILLY - Fundamentals of Secure Software 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

[FreeCoursesOnline.Me] O`REILLY - Fundamentals of Secure Software.torrent
  • Chapter 1 Introduction to the Course/001. Introduction to Application Security.mp435.98MB
  • Chapter 1 Introduction to the Course/002. Application Security Terms and Definitions.mp428.42MB
  • Chapter 1 Introduction to the Course/003. Application Security Goals.mp442.27MB
  • Chapter 1 Introduction to the Course/004. OWASP WebGoat Demo.mp460.72MB
  • Chapter 10 Conclusion/001. Conclusion.mp474.54MB
  • Chapter 2 Introduction to OWASP Top 10 and More Items/001. Introduction to OWASP Top 10.mp443.51MB
  • Chapter 2 Introduction to OWASP Top 10 and More Items/002. SANS Top 25.mp425.25MB
  • Chapter 2 Introduction to OWASP Top 10 and More Items/003. Threat Actors and More Definitions.mp460.72MB
  • Chapter 2 Introduction to OWASP Top 10 and More Items/004. Defense In-Depth.mp420.81MB
  • Chapter 2 Introduction to OWASP Top 10 and More Items/005. Proxy Tools.mp49.83MB
  • Chapter 2 Introduction to OWASP Top 10 and More Items/006. Demo of Fiddler with JuiceShop.mp427.03MB
  • Chapter 2 Introduction to OWASP Top 10 and More Items/007. API Security.mp446.18MB
  • Chapter 3 Dive into the OWASP Top 10/001. Broken Access Control.mp433.05MB
  • Chapter 3 Dive into the OWASP Top 10/002. Cryptographic Failures.mp428.62MB
  • Chapter 3 Dive into the OWASP Top 10/003. Injection.mp439.88MB
  • Chapter 3 Dive into the OWASP Top 10/004. Insecure Design.mp426.14MB
  • Chapter 3 Dive into the OWASP Top 10/005. Security Misconfiguration.mp423.92MB
  • Chapter 3 Dive into the OWASP Top 10/006. Vulnerable and Outdated Components.mp438.37MB
  • Chapter 3 Dive into the OWASP Top 10/007. Identification and Authentication Failures.mp415.15MB
  • Chapter 3 Dive into the OWASP Top 10/008. Software and Data Integrity Failures.mp412.91MB
  • Chapter 3 Dive into the OWASP Top 10/009. Security Logging and Monitoring Failures.mp432.04MB
  • Chapter 3 Dive into the OWASP Top 10/010. Server-Side Request Forgery.mp415.02MB
  • Chapter 4 Defenses and Tools/001. OWASP ZAP (Zed Attack Proxy).mp412.16MB
  • Chapter 4 Defenses and Tools/002. Running a ZAP Scan.mp451.21MB
  • Chapter 4 Defenses and Tools/003. Cross-Site Scripting.mp410.47MB
  • Chapter 4 Defenses and Tools/004. CSP (Content Security Policy).mp428.59MB
  • Chapter 4 Defenses and Tools/005. CSP Demo.mp436.3MB
  • Chapter 4 Defenses and Tools/006. Security Models.mp430.98MB
  • Chapter 4 Defenses and Tools/007. Scanning for OSS Vulnerabilities with Software Composition Analysis.mp422.49MB
  • Chapter 4 Defenses and Tools/008. SKF (Security Knowledge Framework).mp415.67MB
  • Chapter 4 Defenses and Tools/009. SKF Demo.mp437.18MB
  • Chapter 4 Defenses and Tools/010. SKF Labs Demo.mp427.11MB
  • Chapter 4 Defenses and Tools/011. Source Code Review.mp434.88MB
  • Chapter 5 Session Management/001. Introduction to Session Management.mp435.07MB
  • Chapter 5 Session Management/002. Web Sessions.mp436.52MB
  • Chapter 5 Session Management/003. JWT (JSON Web Token).mp427.09MB
  • Chapter 5 Session Management/004. JWT Example.mp416.04MB
  • Chapter 5 Session Management/005. OAuth.mp429.28MB
  • Chapter 5 Session Management/006. OpenID and OpenID Connect.mp425.64MB
  • Chapter 6 Risk Rating and Threat Modeling/001. Risk Rating Introduction.mp439.68MB
  • Chapter 6 Risk Rating and Threat Modeling/002. Risk Rating Demo.mp460.09MB
  • Chapter 6 Risk Rating and Threat Modeling/003. Introduction to Threat Modeling.mp442.66MB
  • Chapter 6 Risk Rating and Threat Modeling/004. Type of Threat Modeling.mp426.96MB
  • Chapter 6 Risk Rating and Threat Modeling/005. Introduction to Manual Threat Modeling.mp415.95MB
  • Chapter 6 Risk Rating and Threat Modeling/006. Manual Threat Model demo.mp424.84MB
  • Chapter 6 Risk Rating and Threat Modeling/007. Prepping for Microsoft Threat Model Tool.mp421.1MB
  • Chapter 6 Risk Rating and Threat Modeling/008. Microsoft Threat Model Tool demo.mp452.67MB
  • Chapter 7 Encryption and Hashing/001. Encryption Overview.mp418.16MB
  • Chapter 7 Encryption and Hashing/002. Encryption Use Cases.mp425.85MB
  • Chapter 7 Encryption and Hashing/003. Hashing Overview.mp431.75MB
  • Chapter 7 Encryption and Hashing/004. Hashing Demo.mp410.95MB
  • Chapter 7 Encryption and Hashing/005. PKI (Public Key Infrastructure).mp415.7MB
  • Chapter 7 Encryption and Hashing/006. Password Management.mp433.81MB
  • Chapter 7 Encryption and Hashing/007. Password Demo.mp410.77MB
  • Chapter 8 Frameworks and Process/001. HIPAA (Health Insurance Portability and Accountability Act).mp442.47MB
  • Chapter 8 Frameworks and Process/002. PCI DSS (Payment Card Industry Data Security Standard).mp415.39MB
  • Chapter 8 Frameworks and Process/003. DevOps.mp418.14MB
  • Chapter 8 Frameworks and Process/004. DevSecOps.mp425.56MB
  • Chapter 8 Frameworks and Process/005. Use, Abuse, and Misuse cases.mp417.05MB
  • Chapter 9 Security Scanning and Testing/001. SAST (Static Application Security Testing).mp428.4MB
  • Chapter 9 Security Scanning and Testing/002. Spot Bugs Demo.mp440.46MB
  • Chapter 9 Security Scanning and Testing/003. DAST (Dynamic Application Security Testing).mp49.54MB
  • Chapter 9 Security Scanning and Testing/004. IAST (Interactive Application Security Testing).mp48.68MB
  • Chapter 9 Security Scanning and Testing/005. RASP (Runtime Application Self-Protection).mp410.59MB
  • Chapter 9 Security Scanning and Testing/006. WAF (Web Application Firewall).mp416.74MB
  • Chapter 9 Security Scanning and Testing/007. Penetration Testing.mp412.2MB
  • Chapter 9 Security Scanning and Testing/008. SCA (Software Composition Analysis).mp423.39MB