589689.xyz

[ ] Linkedin - CCSP Cert Prep - 4 Cloud Application Security (2022)

  • 收录时间:2022-08-11 18:11:53
  • 文件大小:341MB
  • 下载次数:1
  • 最近下载:2022-08-11 18:11:53
  • 磁力链接:

文件列表

  1. ~Get Your Files Here !/02 - 1. Secure Software Development Lifecycle/01 - Development methodologies.mp4 23MB
  2. ~Get Your Files Here !/06 - 5. Software Quality Assurance/05 - Fuzz testing.mp4 18MB
  3. ~Get Your Files Here !/06 - 5. Software Quality Assurance/06 - Code repositories.mp4 17MB
  4. ~Get Your Files Here !/06 - 5. Software Quality Assurance/07 - Application management.mp4 12MB
  5. ~Get Your Files Here !/03 - 2. Application Security Vulnerabilities/01 - Common cloud vulnerabilities.mp4 12MB
  6. ~Get Your Files Here !/03 - 2. Application Security Vulnerabilities/08 - Cookies and attachments.mp4 11MB
  7. ~Get Your Files Here !/03 - 2. Application Security Vulnerabilities/07 - Overflow attacks.mp4 11MB
  8. ~Get Your Files Here !/03 - 2. Application Security Vulnerabilities/03 - Preventing SQL injection.mp4 10MB
  9. ~Get Your Files Here !/03 - 2. Application Security Vulnerabilities/09 - Session hijacking.mp4 10MB
  10. ~Get Your Files Here !/07 - 6. Verified Secure Software/03 - Developer training and awareness.mp4 9MB
  11. ~Get Your Files Here !/07 - 6. Verified Secure Software/01 - Third party code.mp4 9MB
  12. ~Get Your Files Here !/03 - 2. Application Security Vulnerabilities/05 - Request forgery.mp4 9MB
  13. ~Get Your Files Here !/05 - 4. Software Threat Assessment/03 - Threat modeling.mp4 9MB
  14. ~Get Your Files Here !/03 - 2. Application Security Vulnerabilities/06 - Directory traversal.mp4 9MB
  15. ~Get Your Files Here !/08 - 7. Cloud Application Architecture/01 - Building secure cloud solutions.mp4 9MB
  16. ~Get Your Files Here !/02 - 1. Secure Software Development Lifecycle/04 - Operation, maintenance, and change management.mp4 9MB
  17. ~Get Your Files Here !/04 - 3. Secure Coding Practices/03 - Parameterized queries.mp4 9MB
  18. ~Get Your Files Here !/03 - 2. Application Security Vulnerabilities/02 - Application security.mp4 9MB
  19. ~Get Your Files Here !/06 - 5. Software Quality Assurance/04 - Abuse case testing.mp4 8MB
  20. ~Get Your Files Here !/01 - Introduction/01 - Securing cloud applications.mp4 8MB
  21. ~Get Your Files Here !/04 - 3. Secure Coding Practices/05 - Output encoding.mp4 8MB
  22. ~Get Your Files Here !/06 - 5. Software Quality Assurance/03 - Code security tests.mp4 8MB
  23. ~Get Your Files Here !/02 - 1. Secure Software Development Lifecycle/05 - DevOps.mp4 7MB
  24. ~Get Your Files Here !/04 - 3. Secure Coding Practices/08 - Database security.mp4 7MB
  25. ~Get Your Files Here !/08 - 7. Cloud Application Architecture/02 - Web application firewalls.mp4 6MB
  26. ~Get Your Files Here !/08 - 7. Cloud Application Architecture/03 - Database security controls.mp4 6MB
  27. ~Get Your Files Here !/03 - 2. Application Security Vulnerabilities/04 - Understanding cross-site scripting.mp4 6MB
  28. ~Get Your Files Here !/02 - 1. Secure Software Development Lifecycle/03 - Maturity models.mp4 6MB
  29. ~Get Your Files Here !/01 - Introduction/03 - Study resources.mp4 6MB
  30. ~Get Your Files Here !/04 - 3. Secure Coding Practices/07 - Code signing.mp4 5MB
  31. ~Get Your Files Here !/03 - 2. Application Security Vulnerabilities/10 - Code execution attacks.mp4 5MB
  32. ~Get Your Files Here !/07 - 6. Verified Secure Software/02 - Acquired software.mp4 5MB
  33. ~Get Your Files Here !/06 - 5. Software Quality Assurance/01 - Code review.mp4 5MB
  34. ~Get Your Files Here !/05 - 4. Software Threat Assessment/02 - Risk analysis and mitigation.mp4 5MB
  35. ~Get Your Files Here !/04 - 3. Secure Coding Practices/06 - Error and exception handling.mp4 5MB
  36. ~Get Your Files Here !/04 - 3. Secure Coding Practices/02 - Input validation.mp4 5MB
  37. ~Get Your Files Here !/04 - 3. Secure Coding Practices/01 - Secure coding guidance.mp4 4MB
  38. ~Get Your Files Here !/06 - 5. Software Quality Assurance/02 - Software testing.mp4 4MB
  39. ~Get Your Files Here !/02 - 1. Secure Software Development Lifecycle/06 - SOA and microservices.mp4 4MB
  40. ~Get Your Files Here !/05 - 4. Software Threat Assessment/01 - Identifying threats.mp4 3MB
  41. ~Get Your Files Here !/04 - 3. Secure Coding Practices/04 - Authentication and session management issues.mp4 3MB
  42. ~Get Your Files Here !/03 - 2. Application Security Vulnerabilities/11 - Privilege escalation.mp4 3MB
  43. ~Get Your Files Here !/02 - 1. Secure Software Development Lifecycle/02 - Secure software development life cycle (SDLC).mp4 3MB
  44. ~Get Your Files Here !/09 - Conclusion/01 - Continuing your CCSP certification journey.mp4 1MB
  45. ~Get Your Files Here !/01 - Introduction/02 - What you need To know.mp4 1MB
  46. ~Get Your Files Here !/06 - 5. Software Quality Assurance/05 - Fuzz testing.srt 13KB
  47. ~Get Your Files Here !/02 - 1. Secure Software Development Lifecycle/01 - Development methodologies.srt 13KB
  48. ~Get Your Files Here !/06 - 5. Software Quality Assurance/06 - Code repositories.srt 12KB
  49. ~Get Your Files Here !/06 - 5. Software Quality Assurance/07 - Application management.srt 11KB
  50. ~Get Your Files Here !/03 - 2. Application Security Vulnerabilities/01 - Common cloud vulnerabilities.srt 10KB
  51. ~Get Your Files Here !/05 - 4. Software Threat Assessment/03 - Threat modeling.srt 10KB
  52. ~Get Your Files Here !/02 - 1. Secure Software Development Lifecycle/05 - DevOps.srt 9KB
  53. ~Get Your Files Here !/07 - 6. Verified Secure Software/03 - Developer training and awareness.srt 9KB
  54. ~Get Your Files Here !/03 - 2. Application Security Vulnerabilities/05 - Request forgery.srt 8KB
  55. ~Get Your Files Here !/04 - 3. Secure Coding Practices/08 - Database security.srt 8KB
  56. ~Get Your Files Here !/03 - 2. Application Security Vulnerabilities/02 - Application security.srt 8KB
  57. ~Get Your Files Here !/03 - 2. Application Security Vulnerabilities/08 - Cookies and attachments.srt 8KB
  58. ~Get Your Files Here !/07 - 6. Verified Secure Software/01 - Third party code.srt 7KB
  59. ~Get Your Files Here !/03 - 2. Application Security Vulnerabilities/09 - Session hijacking.srt 7KB
  60. ~Get Your Files Here !/02 - 1. Secure Software Development Lifecycle/04 - Operation, maintenance, and change management.srt 7KB
  61. ~Get Your Files Here !/06 - 5. Software Quality Assurance/03 - Code security tests.srt 7KB
  62. ~Get Your Files Here !/08 - 7. Cloud Application Architecture/01 - Building secure cloud solutions.srt 6KB
  63. ~Get Your Files Here !/08 - 7. Cloud Application Architecture/02 - Web application firewalls.srt 6KB
  64. ~Get Your Files Here !/07 - 6. Verified Secure Software/02 - Acquired software.srt 6KB
  65. ~Get Your Files Here !/05 - 4. Software Threat Assessment/02 - Risk analysis and mitigation.srt 6KB
  66. ~Get Your Files Here !/03 - 2. Application Security Vulnerabilities/04 - Understanding cross-site scripting.srt 6KB
  67. ~Get Your Files Here !/04 - 3. Secure Coding Practices/06 - Error and exception handling.srt 6KB
  68. ~Get Your Files Here !/04 - 3. Secure Coding Practices/05 - Output encoding.srt 6KB
  69. ~Get Your Files Here !/02 - 1. Secure Software Development Lifecycle/03 - Maturity models.srt 6KB
  70. ~Get Your Files Here !/03 - 2. Application Security Vulnerabilities/07 - Overflow attacks.srt 6KB
  71. ~Get Your Files Here !/04 - 3. Secure Coding Practices/03 - Parameterized queries.srt 6KB
  72. ~Get Your Files Here !/03 - 2. Application Security Vulnerabilities/06 - Directory traversal.srt 6KB
  73. ~Get Your Files Here !/03 - 2. Application Security Vulnerabilities/10 - Code execution attacks.srt 6KB
  74. ~Get Your Files Here !/08 - 7. Cloud Application Architecture/03 - Database security controls.srt 5KB
  75. ~Get Your Files Here !/06 - 5. Software Quality Assurance/01 - Code review.srt 5KB
  76. ~Get Your Files Here !/06 - 5. Software Quality Assurance/02 - Software testing.srt 5KB
  77. ~Get Your Files Here !/04 - 3. Secure Coding Practices/02 - Input validation.srt 5KB
  78. ~Get Your Files Here !/06 - 5. Software Quality Assurance/04 - Abuse case testing.srt 4KB
  79. ~Get Your Files Here !/04 - 3. Secure Coding Practices/07 - Code signing.srt 4KB
  80. ~Get Your Files Here !/05 - 4. Software Threat Assessment/01 - Identifying threats.srt 4KB
  81. ~Get Your Files Here !/03 - 2. Application Security Vulnerabilities/11 - Privilege escalation.srt 4KB
  82. ~Get Your Files Here !/04 - 3. Secure Coding Practices/01 - Secure coding guidance.srt 4KB
  83. ~Get Your Files Here !/04 - 3. Secure Coding Practices/04 - Authentication and session management issues.srt 4KB
  84. ~Get Your Files Here !/01 - Introduction/03 - Study resources.srt 3KB
  85. ~Get Your Files Here !/02 - 1. Secure Software Development Lifecycle/02 - Secure software development life cycle (SDLC).srt 3KB
  86. ~Get Your Files Here !/02 - 1. Secure Software Development Lifecycle/06 - SOA and microservices.srt 3KB
  87. ~Get Your Files Here !/01 - Introduction/01 - Securing cloud applications.srt 2KB
  88. ~Get Your Files Here !/01 - Introduction/02 - What you need To know.srt 1KB
  89. ~Get Your Files Here !/09 - Conclusion/01 - Continuing your CCSP certification journey.srt 1KB
  90. ~Get Your Files Here !/Bonus Resources.txt 386B
  91. Get Bonus Downloads Here.url 180B