MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

[ FreeCourseWeb.com ] Learning Path - CSSLP (Certified Secure Software Lifecycle Professional)

磁力链接/BT种子名称

[ FreeCourseWeb.com ] Learning Path - CSSLP (Certified Secure Software Lifecycle Professional)

磁力链接/BT种子简介

种子哈希:ca280bb9be7bd747f03f5a2222bd5a2dad62a08f
文件大小: 1.54G
已经下载:2092次
下载速度:极快
收录时间:2024-01-14
最近下载:2025-12-19

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:CA280BB9BE7BD747F03F5A2222BD5A2DAD62A08F
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 小蓝俱乐部 含羞草 欲漫涩 逼哩逼哩 成人快手 51品茶 母狗园 51动漫 91短视频 抖音Max 海王TV TikTok成人版 PornHub 暗网Xvideo 草榴社区 哆哔涩漫 呦乐园 萝莉岛 搜同 91暗网

最近搜索

车老板 hmhi-561 群大秀 幼女 letspostit pow040 12.23.ruri.narumiya nt-002 rd-1101 yaorenkeno aerosmith++discography 约了个有点酷的妹子 ffnn-034 heydouga4169 deeper 厕拍无毛 dde trinity psz-001 cock-hungry model mixes business with pleasure severance.s02e02 走光露 smad-042 福建兄妹 足 creative bubb-115 av内射甄选 精选厕拍+偷拍各式高颜值极品蜜桃臀美女放尿+ ongoing accelerate

文件列表

  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/4. Documenting Software Requirements/2. Manage Security Requirements with Third-parties.mp4 25.3 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/2. Software Development Methodologies/2. Incorporate Security into the SDLC.mp4 24.2 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/5. Access Control Requirements.mp4 23.4 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/1. Governance.mp4 22.2 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/3. Security Metrics.mp4 21.7 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/3. Vulnerability Assessments and Penetration Testing.mp4 21.4 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/4. Support Incident Response.mp4 20.8 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/4. Sensitive Data Exposure and Access Control.mp4 19.7 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/4. Assess Software Supply Chain Operations/1. Assess Supply Chain Monitoring.mp4 19.5 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Software Code Risks - 25min/2. Protected Code.mp4 19.4 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/1. Managing Software Lifecycle Risk.mp4 19.1 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/02. Programming Considerations.mp4 18.7 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/1. Develop Security Testing Strategy and Plan.mp4 18.4 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/1. Managing Software Operational Security.mp4 18.2 MB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/3. Implementing Data Protection.mp4 17.4 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/1. Develop Security Test Cases.mp4 17.2 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/04. Error Handling and Logging.mp4 17.1 MB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/2. Data Lifecycle.mp4 17.1 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/1. Specify Secure Software Configuration.mp4 16.8 MB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/1. Data Protection.mp4 16.3 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/07. Feature-based Risk.mp4 16.1 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/2. Operating System Security.mp4 15.9 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Create Security Controls/2. Protected Code.mp4 15.8 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/3. Continuous Monitoring.mp4 15.8 MB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/2. Gathering (Security) Requirements.mp4 15.7 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/3. Error Handling and Logging.mp4 15.6 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/09. Resource and Memory Management.mp4 15.2 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/1. Evaluate Operational Risk.mp4 15.1 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/10. Sensitive Data Exposure and Access Control.mp4 15.0 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/2. Testing the Box.mp4 14.5 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/4. Document Security Properties and Constraints.mp4 14.5 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/7. Disaster Recovery Planning.mp4 14.4 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/2. External Software Attack - Human.mp4 14.4 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/3. Documentation.mp4 14.3 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/5. Decommissioning Software Securely/2. Data Destruction.mp4 14.3 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/1. Categorize Threats to Software Applications.mp4 14.2 MB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/1. Discovering Secure Software Requirements.mp4 14.1 MB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/4. Documenting Software Requirements/1. Documenting Software Requirements.mp4 14.0 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/5. Resource Management.mp4 13.9 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/04. Client Server.mp4 13.7 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/11. Security Design Architecture - Mobile Applications.mp4 13.6 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/06. Session Management, Injection, and XSS.mp4 13.5 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/1. Design and Evaluate Software Security Architecture.mp4 13.4 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/4. Database Integrity.mp4 13.4 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/1. Post-deployment and Resilience.mp4 13.3 MB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/4. Data Sharing.mp4 13.2 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/3. Testing Methodologies.mp4 12.9 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/8. Support Patch and Vulnerability Management.mp4 12.9 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/2. Legal and Regulatory Issues.mp4 12.8 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/5. Database Security.mp4 12.8 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/3. Securely Store and Manage Security Data.mp4 12.8 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/3. Secure Build.mp4 12.7 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/7. Accountability.mp4 12.4 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/6. Configuration Management.mp4 12.4 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/2. Post-implementation Support.mp4 12.4 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/5. Credentials.mp4 12.1 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/3. Software Security Standards.mp4 12.1 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/6. Economy of Mechanism.mp4 12.0 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/1. Secure Code Analysis.mp4 11.9 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/4. Third-party Contracts.mp4 11.8 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/5. Decommissioning Software Securely/1. Decommissioning Software Securely.mp4 11.8 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/4. Assess Software Supply Chain Operations/2. Supply Chain Risk Response.mp4 11.5 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/7. Secure Backup and Restoration Planning.mp4 11.5 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/10. Reasons to Migrate to the Cloud.mp4 11.3 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/4. Scanning.mp4 11.2 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/03. Input Validation.mp4 11.1 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/5. Support Continuity of Operations.mp4 11.1 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/01. Secure Coding Practices.mp4 10.9 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/08. Side Channel Vulnerabilities Speculative Execution.mp4 10.9 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/2. Software Deployment.mp4 10.8 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/2. Document the Supply Chain.mp4 10.8 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/1. Ascertain Code Repository Security.mp4 10.8 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/06. Pervasive Computing.mp4 10.8 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/7. Examine Architectural Risk Assessment.mp4 10.8 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/2. Resolving Errors Found During Testing.mp4 10.8 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/9. Perform Architectural Risk Assessment.mp4 10.7 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/2. Software Development Methodologies/1. Software Development Methodologies.mp4 10.6 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/6. Environment Testing.mp4 10.6 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/03. Architecture Based Controls.mp4 10.6 MB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/3. Identify Compliance Requirements.mp4 10.5 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/2. Scheduling.mp4 10.5 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/5. Ongoing Testing.mp4 10.5 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/5. Outsourcing Software Development.mp4 10.5 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/2. Deployment Environment Hardening.mp4 10.4 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/2. Upstream and Downstream Dependencies.mp4 10.3 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/6. Delayed Recovery.mp4 10.2 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/4. Access Control.mp4 10.2 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/1. Evaluate Software Supply Chain Risk Management.mp4 10.1 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/6. Encryption Keys.mp4 10.0 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/7. Programming Considerations.mp4 10.0 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/4. Data Protection.mp4 9.7 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/09. Security Design Architecture - The Cloud.mp4 9.7 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/1. Documentation, Verification, and Validation.mp4 9.6 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/8. Protection of Output.mp4 9.6 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/4. Protocol Design Choices.mp4 9.5 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/07. Configuration Management.mp4 9.5 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/08. Network and Storage Requirements.mp4 9.5 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/05. Protection of Output.mp4 9.4 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/5. Security Properties.mp4 9.4 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/3. Seeking out Vulnerabilities.mp4 9.2 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/2. Code Review Methods.mp4 8.8 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/1. Secure Coding Practices.mp4 8.6 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Software Code Risks - 25min/1. Software Code Risks.mp4 8.5 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/6. Performance.mp4 8.5 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/1. Design Secure System Interfaces.mp4 8.4 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/3. Seeking Out Vulnerabilities.mp4 8.3 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/1. Analyze Code for Security Risks.mp4 8.2 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/6. Programming Language Environments.mp4 8.2 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/3. Integrity.mp4 8.1 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/2. Develop or Obtain Security Test Data.mp4 8.0 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Create Security Controls/1. Implement Software Security Controls.mp4 7.9 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/6. Domain Summary/1. Domain Summary.mp4 7.9 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/8. Design Security Review.mp4 7.8 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/4. Availability.mp4 7.8 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/2. Confidentiality.mp4 7.8 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/3. Compromise of Operations.mp4 7.7 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/01. Design Software Security Architecture.mp4 7.7 MB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/5. Domain Summary/1. Domain Summary.mp4 7.3 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/3. Assess Supply Chain Risk.mp4 7.3 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/05. Web-based Architecture Risk.mp4 7.2 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/2. Code Review.mp4 7.0 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/4. Domain Summary/1. Domain Summary.mp4 6.8 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/4. Defence in Depth.mp4 6.7 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/3. Credential Management.mp4 6.6 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/02. Adequate Security.mp4 6.4 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/3. Interfaces.mp4 5.9 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/5. Domain Summary - 5min/1. Domain Summary.mp4 5.9 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/2. Input Validation.mp4 5.9 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/1. Integrating Security into Software.mp4 5.8 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/5. Least Privilege.mp4 5.8 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/2. Version Control.mp4 5.6 MB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 5.6 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 5.4 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 5.2 MB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 5.2 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/3. Assess Personnel Training and Integration.mp4 5.1 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/2. Complete Mediation.mp4 4.8 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/7. Post-implementation Security Testing.mp4 4.5 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/7. Describe Resilience.mp4 4.4 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/3. Describe Psychological Acceptability.mp4 4.3 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02/confirm-adherence-to-secure-coding-practices-slides.pdf 2.9 MB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/6. Authorization.mp4 2.9 MB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 2.8 MB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 2.8 MB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 2.8 MB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4 2.7 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview (1).mp4 2.1 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/04/create-security-controls-slides.pdf 1.2 MB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/03/assess-software-security-slides.pdf 632.8 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/4. Documenting Software Requirements/2. Manage Security Requirements with Third-parties.vtt 20.7 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/5. Access Control Requirements.vtt 20.1 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/3. Security Metrics.vtt 18.4 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/2. Software Development Methodologies/2. Incorporate Security into the SDLC.vtt 18.1 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/3. Vulnerability Assessments and Penetration Testing.vtt 17.6 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/4. Support Incident Response.vtt 17.4 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/3. Implementing Data Protection.vtt 16.3 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/4. Assess Software Supply Chain Operations/1. Assess Supply Chain Monitoring.vtt 16.2 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/04. Error Handling and Logging.vtt 15.0 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/3. Continuous Monitoring.vtt 14.9 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Software Code Risks - 25min/2. Protected Code.vtt 14.6 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/1. Governance.vtt 14.5 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/1. Develop Security Test Cases.vtt 14.4 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/2. Data Lifecycle.vtt 14.3 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/2. Gathering (Security) Requirements.vtt 14.0 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/1. Data Protection.vtt 14.0 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/5. Decommissioning Software Securely/2. Data Destruction.vtt 13.9 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/1. Discovering Secure Software Requirements.vtt 13.6 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/1. Specify Secure Software Configuration.vtt 13.6 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/1. Managing Software Lifecycle Risk.vtt 13.3 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/2. Operating System Security.vtt 13.3 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/1. Develop Security Testing Strategy and Plan.vtt 13.3 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/2. External Software Attack - Human.vtt 12.8 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/3. Error Handling and Logging.vtt 12.8 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/09. Resource and Memory Management.vtt 12.8 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/7. Disaster Recovery Planning.vtt 12.7 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/1. Managing Software Operational Security.vtt 12.7 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/4. Sensitive Data Exposure and Access Control.vtt 12.5 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/02. Programming Considerations.vtt 12.4 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/3. Securely Store and Manage Security Data.vtt 12.2 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/5. Resource Management.vtt 12.1 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Create Security Controls/2. Protected Code.vtt 11.7 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/3. Documentation.vtt 11.6 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/4. Data Sharing.vtt 11.5 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/4. Documenting Software Requirements/1. Documenting Software Requirements.vtt 11.5 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/07. Feature-based Risk.vtt 11.4 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/7. Accountability.vtt 11.3 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/10. Sensitive Data Exposure and Access Control.vtt 11.3 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/1. Post-deployment and Resilience.vtt 11.2 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/8. Support Patch and Vulnerability Management.vtt 11.1 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/1. Categorize Threats to Software Applications.vtt 11.0 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/4. Document Security Properties and Constraints.vtt 10.9 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/4. Database Integrity.vtt 10.9 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/5. Credentials.vtt 10.7 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/1. Design and Evaluate Software Security Architecture.vtt 10.6 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/1. Evaluate Operational Risk.vtt 10.6 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/2. Testing the Box.vtt 10.2 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/4. Third-party Contracts.vtt 10.2 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/2. Scheduling.vtt 10.2 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/11. Security Design Architecture - Mobile Applications.vtt 10.1 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/1. Secure Code Analysis.vtt 9.9 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/6. Economy of Mechanism.vtt 9.9 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/5. Database Security.vtt 9.9 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/4. Assess Software Supply Chain Operations/2. Supply Chain Risk Response.vtt 9.9 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/2. Post-implementation Support.vtt 9.8 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/3. Secure Build.vtt 9.8 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/10. Reasons to Migrate to the Cloud.vtt 9.8 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/1. Ascertain Code Repository Security.vtt 9.6 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/2. Document the Supply Chain.vtt 9.5 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/5. Outsourcing Software Development.vtt 9.4 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/2. Software Deployment.vtt 9.4 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/7. Secure Backup and Restoration Planning.vtt 9.2 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/5. Decommissioning Software Securely/1. Decommissioning Software Securely.vtt 9.2 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/5. Support Continuity of Operations.vtt 9.2 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/06. Session Management, Injection, and XSS.vtt 9.1 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/2. Resolving Errors Found During Testing.vtt 9.1 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/01. Secure Coding Practices.vtt 9.0 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/2. Upstream and Downstream Dependencies.vtt 9.0 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/04. Client Server.vtt 9.0 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/2. Legal and Regulatory Issues.vtt 9.0 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/7. Examine Architectural Risk Assessment.vtt 9.0 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/3. Identify Compliance Requirements.vtt 9.0 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/6. Delayed Recovery.vtt 8.9 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/4. Data Protection.vtt 8.9 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/1. Evaluate Software Supply Chain Risk Management.vtt 8.8 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/08. Side Channel Vulnerabilities Speculative Execution.vtt 8.8 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/2. Deployment Environment Hardening.vtt 8.7 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/5. Ongoing Testing.vtt 8.7 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/4. Scanning.vtt 8.6 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/06. Pervasive Computing.vtt 8.5 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/6. Configuration Management.vtt 8.4 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/08. Network and Storage Requirements.vtt 8.3 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/03. Input Validation.vtt 8.3 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/05. Protection of Output.vtt 8.2 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/5. Security Properties.vtt 8.2 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/03. Architecture Based Controls.vtt 8.2 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/6. Encryption Keys.vtt 8.1 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/6. Environment Testing.vtt 8.0 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/3. Software Security Standards.vtt 7.8 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/4. Access Control.vtt 7.7 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/2. Code Review Methods.vtt 7.7 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/09. Security Design Architecture - The Cloud.vtt 7.7 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/1. Documentation, Verification, and Validation.vtt 7.6 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/6. Performance.vtt 7.5 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/3. Seeking out Vulnerabilities.vtt 7.4 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/9. Perform Architectural Risk Assessment.vtt 7.1 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/1. Secure Coding Practices.vtt 7.1 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/3. Integrity.vtt 7.0 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/2. Software Development Methodologies/1. Software Development Methodologies.vtt 7.0 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/3. Compromise of Operations.vtt 6.9 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/07. Configuration Management.vtt 6.9 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/8. Protection of Output.vtt 6.9 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/4. Protocol Design Choices.vtt 6.9 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Software Code Risks - 25min/1. Software Code Risks.vtt 6.8 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/4. Availability.vtt 6.5 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/1. Design Secure System Interfaces.vtt 6.5 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/3. Seeking Out Vulnerabilities.vtt 6.5 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/3. Testing Methodologies.vtt 6.3 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/01. Design Software Security Architecture.vtt 6.3 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/1. Analyze Code for Security Risks.vtt 6.2 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/7. Programming Considerations.vtt 6.1 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/2. Code Review.vtt 6.1 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/05. Web-based Architecture Risk.vtt 6.0 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/4. Defence in Depth.vtt 6.0 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/2. Confidentiality.vtt 6.0 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/3. Assess Supply Chain Risk.vtt 6.0 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/2. Develop or Obtain Security Test Data.vtt 6.0 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/3. Credential Management.vtt 5.9 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/8. Design Security Review.vtt 5.7 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Create Security Controls/1. Implement Software Security Controls.vtt 5.6 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/6. Programming Language Environments.vtt 5.6 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/02. Adequate Security.vtt 5.3 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/6. Domain Summary/1. Domain Summary.vtt 5.2 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/5. Domain Summary/1. Domain Summary.vtt 5.2 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/2. Version Control.vtt 5.1 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/3. Interfaces.vtt 5.0 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/5. Least Privilege.vtt 5.0 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/4. Domain Summary/1. Domain Summary.vtt 4.5 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/1. Integrating Security into Software.vtt 4.3 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/3. Assess Personnel Training and Integration.vtt 4.2 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/2. Input Validation.vtt 4.0 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/3. Describe Psychological Acceptability.vtt 3.8 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/7. Post-implementation Security Testing.vtt 3.7 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/7. Describe Resilience.vtt 3.7 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/5. Domain Summary - 5min/1. Domain Summary.vtt 3.6 kB
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 2.5 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/2. Complete Mediation.vtt 2.4 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/6. Authorization.vtt 2.4 kB
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 2.4 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/playlist.m3u 2.3 kB
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 2.3 kB
  • ~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 1.8 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 1.8 kB
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 1.7 kB
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 1.6 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt 1.4 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview (1).vtt 1.3 kB
  • ~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/playlist.m3u 1.3 kB
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/playlist (1).m3u 987 Bytes
  • ~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/playlist.m3u 925 Bytes
  • ~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/playlist.m3u 913 Bytes
  • ~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/playlist.m3u 907 Bytes
  • ~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/playlist.m3u 873 Bytes
  • ~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/playlist.m3u 817 Bytes
  • ~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/playlist.m3u 689 Bytes
  • ~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • Get Bonus Downloads Here.url 183 Bytes

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!