589689.xyz

[ ] Learning Path - CSSLP (Certified Secure Software Lifecycle Professional)

  • 收录时间:2024-04-01 04:11:49
  • 文件大小:2GB
  • 下载次数:1
  • 最近下载:2024-04-01 04:11:49
  • 磁力链接:

文件列表

  1. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/4. Documenting Software Requirements/2. Manage Security Requirements with Third-parties.mp4 24MB
  2. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/2. Software Development Methodologies/2. Incorporate Security into the SDLC.mp4 23MB
  3. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/5. Access Control Requirements.mp4 22MB
  4. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/1. Governance.mp4 21MB
  5. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/3. Security Metrics.mp4 21MB
  6. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/3. Vulnerability Assessments and Penetration Testing.mp4 20MB
  7. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/4. Support Incident Response.mp4 20MB
  8. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/4. Sensitive Data Exposure and Access Control.mp4 19MB
  9. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/4. Assess Software Supply Chain Operations/1. Assess Supply Chain Monitoring.mp4 19MB
  10. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Software Code Risks - 25min/2. Protected Code.mp4 19MB
  11. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/1. Managing Software Lifecycle Risk.mp4 18MB
  12. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/02. Programming Considerations.mp4 18MB
  13. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/1. Develop Security Testing Strategy and Plan.mp4 18MB
  14. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/1. Managing Software Operational Security.mp4 17MB
  15. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/3. Implementing Data Protection.mp4 17MB
  16. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/1. Develop Security Test Cases.mp4 16MB
  17. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/04. Error Handling and Logging.mp4 16MB
  18. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/2. Data Lifecycle.mp4 16MB
  19. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/1. Specify Secure Software Configuration.mp4 16MB
  20. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/1. Data Protection.mp4 16MB
  21. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/07. Feature-based Risk.mp4 15MB
  22. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/2. Operating System Security.mp4 15MB
  23. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Create Security Controls/2. Protected Code.mp4 15MB
  24. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/3. Continuous Monitoring.mp4 15MB
  25. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/2. Gathering (Security) Requirements.mp4 15MB
  26. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/3. Error Handling and Logging.mp4 15MB
  27. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/09. Resource and Memory Management.mp4 15MB
  28. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/1. Evaluate Operational Risk.mp4 14MB
  29. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/10. Sensitive Data Exposure and Access Control.mp4 14MB
  30. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/2. Testing the Box.mp4 14MB
  31. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/4. Document Security Properties and Constraints.mp4 14MB
  32. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/7. Disaster Recovery Planning.mp4 14MB
  33. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/2. External Software Attack - Human.mp4 14MB
  34. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/3. Documentation.mp4 14MB
  35. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/5. Decommissioning Software Securely/2. Data Destruction.mp4 14MB
  36. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/1. Categorize Threats to Software Applications.mp4 14MB
  37. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/1. Discovering Secure Software Requirements.mp4 13MB
  38. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/4. Documenting Software Requirements/1. Documenting Software Requirements.mp4 13MB
  39. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/5. Resource Management.mp4 13MB
  40. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/04. Client Server.mp4 13MB
  41. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/11. Security Design Architecture - Mobile Applications.mp4 13MB
  42. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/06. Session Management, Injection, and XSS.mp4 13MB
  43. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/1. Design and Evaluate Software Security Architecture.mp4 13MB
  44. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/4. Database Integrity.mp4 13MB
  45. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/1. Post-deployment and Resilience.mp4 13MB
  46. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/4. Data Sharing.mp4 13MB
  47. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/3. Testing Methodologies.mp4 12MB
  48. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/8. Support Patch and Vulnerability Management.mp4 12MB
  49. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/2. Legal and Regulatory Issues.mp4 12MB
  50. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/5. Database Security.mp4 12MB
  51. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/3. Securely Store and Manage Security Data.mp4 12MB
  52. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/3. Secure Build.mp4 12MB
  53. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/7. Accountability.mp4 12MB
  54. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/6. Configuration Management.mp4 12MB
  55. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/2. Post-implementation Support.mp4 12MB
  56. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/5. Credentials.mp4 12MB
  57. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/3. Software Security Standards.mp4 12MB
  58. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/6. Economy of Mechanism.mp4 11MB
  59. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/1. Secure Code Analysis.mp4 11MB
  60. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/4. Third-party Contracts.mp4 11MB
  61. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/5. Decommissioning Software Securely/1. Decommissioning Software Securely.mp4 11MB
  62. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/4. Assess Software Supply Chain Operations/2. Supply Chain Risk Response.mp4 11MB
  63. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/7. Secure Backup and Restoration Planning.mp4 11MB
  64. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/10. Reasons to Migrate to the Cloud.mp4 11MB
  65. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/4. Scanning.mp4 11MB
  66. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/03. Input Validation.mp4 11MB
  67. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/5. Support Continuity of Operations.mp4 11MB
  68. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/01. Secure Coding Practices.mp4 10MB
  69. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/08. Side Channel Vulnerabilities Speculative Execution.mp4 10MB
  70. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/2. Software Deployment.mp4 10MB
  71. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/2. Document the Supply Chain.mp4 10MB
  72. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/1. Ascertain Code Repository Security.mp4 10MB
  73. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/06. Pervasive Computing.mp4 10MB
  74. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/7. Examine Architectural Risk Assessment.mp4 10MB
  75. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/2. Resolving Errors Found During Testing.mp4 10MB
  76. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/9. Perform Architectural Risk Assessment.mp4 10MB
  77. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/2. Software Development Methodologies/1. Software Development Methodologies.mp4 10MB
  78. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/6. Environment Testing.mp4 10MB
  79. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/03. Architecture Based Controls.mp4 10MB
  80. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/3. Identify Compliance Requirements.mp4 10MB
  81. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/2. Scheduling.mp4 10MB
  82. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/5. Ongoing Testing.mp4 10MB
  83. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/5. Outsourcing Software Development.mp4 10MB
  84. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/2. Deployment Environment Hardening.mp4 10MB
  85. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/2. Upstream and Downstream Dependencies.mp4 10MB
  86. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/6. Delayed Recovery.mp4 10MB
  87. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/4. Access Control.mp4 10MB
  88. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/1. Evaluate Software Supply Chain Risk Management.mp4 10MB
  89. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/6. Encryption Keys.mp4 10MB
  90. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/7. Programming Considerations.mp4 9MB
  91. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/4. Data Protection.mp4 9MB
  92. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/09. Security Design Architecture - The Cloud.mp4 9MB
  93. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/1. Documentation, Verification, and Validation.mp4 9MB
  94. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/8. Protection of Output.mp4 9MB
  95. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/4. Protocol Design Choices.mp4 9MB
  96. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/07. Configuration Management.mp4 9MB
  97. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/08. Network and Storage Requirements.mp4 9MB
  98. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/05. Protection of Output.mp4 9MB
  99. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/5. Security Properties.mp4 9MB
  100. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/3. Seeking out Vulnerabilities.mp4 9MB
  101. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/2. Code Review Methods.mp4 8MB
  102. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/1. Secure Coding Practices.mp4 8MB
  103. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Software Code Risks - 25min/1. Software Code Risks.mp4 8MB
  104. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/6. Performance.mp4 8MB
  105. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/1. Design Secure System Interfaces.mp4 8MB
  106. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/3. Seeking Out Vulnerabilities.mp4 8MB
  107. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/1. Analyze Code for Security Risks.mp4 8MB
  108. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/6. Programming Language Environments.mp4 8MB
  109. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/3. Integrity.mp4 8MB
  110. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/2. Develop or Obtain Security Test Data.mp4 8MB
  111. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Create Security Controls/1. Implement Software Security Controls.mp4 8MB
  112. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/6. Domain Summary/1. Domain Summary.mp4 7MB
  113. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/8. Design Security Review.mp4 7MB
  114. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/4. Availability.mp4 7MB
  115. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/2. Confidentiality.mp4 7MB
  116. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/3. Compromise of Operations.mp4 7MB
  117. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/01. Design Software Security Architecture.mp4 7MB
  118. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/5. Domain Summary/1. Domain Summary.mp4 7MB
  119. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/3. Assess Supply Chain Risk.mp4 7MB
  120. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/05. Web-based Architecture Risk.mp4 7MB
  121. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/2. Code Review.mp4 7MB
  122. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/4. Domain Summary/1. Domain Summary.mp4 7MB
  123. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/4. Defence in Depth.mp4 6MB
  124. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/3. Credential Management.mp4 6MB
  125. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/02. Adequate Security.mp4 6MB
  126. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/3. Interfaces.mp4 6MB
  127. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/5. Domain Summary - 5min/1. Domain Summary.mp4 6MB
  128. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/2. Input Validation.mp4 6MB
  129. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/1. Integrating Security into Software.mp4 6MB
  130. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/5. Least Privilege.mp4 6MB
  131. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/2. Version Control.mp4 5MB
  132. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 5MB
  133. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 5MB
  134. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 5MB
  135. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 5MB
  136. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/3. Assess Personnel Training and Integration.mp4 5MB
  137. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/2. Complete Mediation.mp4 5MB
  138. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/7. Post-implementation Security Testing.mp4 4MB
  139. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/7. Describe Resilience.mp4 4MB
  140. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/3. Describe Psychological Acceptability.mp4 4MB
  141. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02/confirm-adherence-to-secure-coding-practices-slides.pdf 3MB
  142. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/6. Authorization.mp4 3MB
  143. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 3MB
  144. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 3MB
  145. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 3MB
  146. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 3MB
  147. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview (1).mp4 2MB
  148. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/04/create-security-controls-slides.pdf 1MB
  149. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/03/assess-software-security-slides.pdf 618KB
  150. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/4. Documenting Software Requirements/2. Manage Security Requirements with Third-parties.vtt 20KB
  151. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/5. Access Control Requirements.vtt 20KB
  152. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/3. Security Metrics.vtt 18KB
  153. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/2. Software Development Methodologies/2. Incorporate Security into the SDLC.vtt 18KB
  154. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/3. Vulnerability Assessments and Penetration Testing.vtt 17KB
  155. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/4. Support Incident Response.vtt 17KB
  156. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/3. Implementing Data Protection.vtt 16KB
  157. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/4. Assess Software Supply Chain Operations/1. Assess Supply Chain Monitoring.vtt 16KB
  158. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/04. Error Handling and Logging.vtt 15KB
  159. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/3. Continuous Monitoring.vtt 15KB
  160. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Software Code Risks - 25min/2. Protected Code.vtt 14KB
  161. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/1. Governance.vtt 14KB
  162. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/1. Develop Security Test Cases.vtt 14KB
  163. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/2. Data Lifecycle.vtt 14KB
  164. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/2. Gathering (Security) Requirements.vtt 14KB
  165. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/1. Data Protection.vtt 14KB
  166. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/5. Decommissioning Software Securely/2. Data Destruction.vtt 14KB
  167. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/1. Discovering Secure Software Requirements.vtt 13KB
  168. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/1. Specify Secure Software Configuration.vtt 13KB
  169. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/1. Managing Software Lifecycle Risk.vtt 13KB
  170. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/2. Operating System Security.vtt 13KB
  171. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/1. Develop Security Testing Strategy and Plan.vtt 13KB
  172. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/2. External Software Attack - Human.vtt 12KB
  173. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/3. Error Handling and Logging.vtt 12KB
  174. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/09. Resource and Memory Management.vtt 12KB
  175. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/7. Disaster Recovery Planning.vtt 12KB
  176. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/1. Managing Software Operational Security.vtt 12KB
  177. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/4. Sensitive Data Exposure and Access Control.vtt 12KB
  178. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/02. Programming Considerations.vtt 12KB
  179. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/3. Securely Store and Manage Security Data.vtt 12KB
  180. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/5. Resource Management.vtt 12KB
  181. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Create Security Controls/2. Protected Code.vtt 11KB
  182. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/3. Documentation.vtt 11KB
  183. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/4. Data Sharing.vtt 11KB
  184. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/4. Documenting Software Requirements/1. Documenting Software Requirements.vtt 11KB
  185. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/07. Feature-based Risk.vtt 11KB
  186. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/7. Accountability.vtt 11KB
  187. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/10. Sensitive Data Exposure and Access Control.vtt 11KB
  188. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/1. Post-deployment and Resilience.vtt 11KB
  189. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/8. Support Patch and Vulnerability Management.vtt 11KB
  190. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/1. Categorize Threats to Software Applications.vtt 11KB
  191. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/4. Document Security Properties and Constraints.vtt 11KB
  192. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/4. Database Integrity.vtt 11KB
  193. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/5. Credentials.vtt 10KB
  194. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/1. Design and Evaluate Software Security Architecture.vtt 10KB
  195. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/1. Evaluate Operational Risk.vtt 10KB
  196. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/2. Testing the Box.vtt 10KB
  197. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/4. Third-party Contracts.vtt 10KB
  198. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/2. Scheduling.vtt 10KB
  199. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/11. Security Design Architecture - Mobile Applications.vtt 10KB
  200. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/1. Secure Code Analysis.vtt 10KB
  201. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/6. Economy of Mechanism.vtt 10KB
  202. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/5. Database Security.vtt 10KB
  203. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/4. Assess Software Supply Chain Operations/2. Supply Chain Risk Response.vtt 10KB
  204. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/2. Post-implementation Support.vtt 10KB
  205. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/3. Secure Build.vtt 10KB
  206. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/10. Reasons to Migrate to the Cloud.vtt 10KB
  207. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/1. Ascertain Code Repository Security.vtt 9KB
  208. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/2. Document the Supply Chain.vtt 9KB
  209. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/5. Outsourcing Software Development.vtt 9KB
  210. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/2. Software Deployment.vtt 9KB
  211. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/7. Secure Backup and Restoration Planning.vtt 9KB
  212. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/5. Decommissioning Software Securely/1. Decommissioning Software Securely.vtt 9KB
  213. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/5. Support Continuity of Operations.vtt 9KB
  214. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/06. Session Management, Injection, and XSS.vtt 9KB
  215. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/2. Resolving Errors Found During Testing.vtt 9KB
  216. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/01. Secure Coding Practices.vtt 9KB
  217. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/2. Upstream and Downstream Dependencies.vtt 9KB
  218. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/04. Client Server.vtt 9KB
  219. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/2. Legal and Regulatory Issues.vtt 9KB
  220. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/7. Examine Architectural Risk Assessment.vtt 9KB
  221. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/3. Identify Compliance Requirements.vtt 9KB
  222. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/6. Delayed Recovery.vtt 9KB
  223. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/4. Data Protection.vtt 9KB
  224. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/1. Evaluate Software Supply Chain Risk Management.vtt 9KB
  225. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/08. Side Channel Vulnerabilities Speculative Execution.vtt 9KB
  226. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/2. Deployment Environment Hardening.vtt 9KB
  227. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/5. Ongoing Testing.vtt 8KB
  228. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/4. Scanning.vtt 8KB
  229. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/06. Pervasive Computing.vtt 8KB
  230. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/6. Configuration Management.vtt 8KB
  231. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/08. Network and Storage Requirements.vtt 8KB
  232. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/03. Input Validation.vtt 8KB
  233. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/05. Protection of Output.vtt 8KB
  234. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/5. Security Properties.vtt 8KB
  235. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/03. Architecture Based Controls.vtt 8KB
  236. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/6. Encryption Keys.vtt 8KB
  237. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/6. Environment Testing.vtt 8KB
  238. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/3. Software Security Standards.vtt 8KB
  239. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/4. Access Control.vtt 8KB
  240. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/2. Code Review Methods.vtt 8KB
  241. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/09. Security Design Architecture - The Cloud.vtt 7KB
  242. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/1. Documentation, Verification, and Validation.vtt 7KB
  243. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/6. Performance.vtt 7KB
  244. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/3. Seeking out Vulnerabilities.vtt 7KB
  245. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/9. Perform Architectural Risk Assessment.vtt 7KB
  246. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/1. Secure Coding Practices.vtt 7KB
  247. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/3. Integrity.vtt 7KB
  248. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/2. Software Development Methodologies/1. Software Development Methodologies.vtt 7KB
  249. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/3. Compromise of Operations.vtt 7KB
  250. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/07. Configuration Management.vtt 7KB
  251. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/8. Protection of Output.vtt 7KB
  252. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/4. Protocol Design Choices.vtt 7KB
  253. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Software Code Risks - 25min/1. Software Code Risks.vtt 7KB
  254. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/4. Availability.vtt 6KB
  255. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/1. Design Secure System Interfaces.vtt 6KB
  256. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/3. Seeking Out Vulnerabilities.vtt 6KB
  257. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/3. Testing Methodologies.vtt 6KB
  258. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/01. Design Software Security Architecture.vtt 6KB
  259. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/1. Analyze Code for Security Risks.vtt 6KB
  260. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/7. Programming Considerations.vtt 6KB
  261. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/2. Code Review.vtt 6KB
  262. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/05. Web-based Architecture Risk.vtt 6KB
  263. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/4. Defence in Depth.vtt 6KB
  264. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/2. Confidentiality.vtt 6KB
  265. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/3. Assess Supply Chain Risk.vtt 6KB
  266. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/2. Develop or Obtain Security Test Data.vtt 6KB
  267. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/3. Credential Management.vtt 6KB
  268. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/8. Design Security Review.vtt 6KB
  269. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Create Security Controls/1. Implement Software Security Controls.vtt 5KB
  270. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/6. Programming Language Environments.vtt 5KB
  271. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/02. Adequate Security.vtt 5KB
  272. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/6. Domain Summary/1. Domain Summary.vtt 5KB
  273. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/5. Domain Summary/1. Domain Summary.vtt 5KB
  274. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/2. Version Control.vtt 5KB
  275. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/3. Interfaces.vtt 5KB
  276. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/5. Least Privilege.vtt 5KB
  277. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/4. Domain Summary/1. Domain Summary.vtt 4KB
  278. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/1. Integrating Security into Software.vtt 4KB
  279. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/3. Assess Personnel Training and Integration.vtt 4KB
  280. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/2. Input Validation.vtt 4KB
  281. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/3. Describe Psychological Acceptability.vtt 4KB
  282. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/7. Post-implementation Security Testing.vtt 4KB
  283. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/7. Describe Resilience.vtt 4KB
  284. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/5. Domain Summary - 5min/1. Domain Summary.vtt 4KB
  285. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 2KB
  286. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/2. Complete Mediation.vtt 2KB
  287. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/6. Authorization.vtt 2KB
  288. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 2KB
  289. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/playlist.m3u 2KB
  290. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 2KB
  291. ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 2KB
  292. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 2KB
  293. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 2KB
  294. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 2KB
  295. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 1KB
  296. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview (1).vtt 1KB
  297. ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/playlist.m3u 1KB
  298. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/playlist (1).m3u 987B
  299. ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/playlist.m3u 925B
  300. ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/playlist.m3u 913B
  301. ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/playlist.m3u 907B
  302. ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/playlist.m3u 873B
  303. ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/playlist.m3u 817B
  304. ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/playlist.m3u 689B
  305. ~Get Your Files Here !/Bonus Resources.txt 386B
  306. Get Bonus Downloads Here.url 183B