资源详情

返回首页 | 相关搜索
[ FreeCourseWeb.com ] Learning Path - CSSLP (Certified Secure Software Lifecycle Professional)
大小 1.54 GB
文件数 306
Info Hash: CA280BB9BE7BD747F03F5A2222BD5A2DAD62A08F
收录时间 2026-01-01 19:19:13
更新时间 2026-01-01 20:02:00
文件列表 (306)
Get Bonus Downloads Here.url
183 B
~Get Your Files Here !/Bonus Resources.txt
386 B
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/01. Design Software Security Architecture.mp4
7.37 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/01. Design Software Security Architecture.vtt
6.11 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/02. Adequate Security.mp4
6.06 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/02. Adequate Security.vtt
5.14 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/03. Architecture Based Controls.mp4
10.06 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/03. Architecture Based Controls.vtt
8.01 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/04. Client Server.mp4
13.07 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/04. Client Server.vtt
8.79 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/05. Web-based Architecture Risk.mp4
6.89 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/05. Web-based Architecture Risk.vtt
5.89 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/06. Pervasive Computing.mp4
10.28 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/06. Pervasive Computing.vtt
8.27 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/07. Feature-based Risk.mp4
15.38 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/07. Feature-based Risk.vtt
11.09 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/08. Side Channel Vulnerabilities Speculative Execution.mp4
10.4 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/08. Side Channel Vulnerabilities Speculative Execution.vtt
8.58 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/09. Security Design Architecture - The Cloud.mp4
9.21 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/09. Security Design Architecture - The Cloud.vtt
7.48 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/10. Reasons to Migrate to the Cloud.mp4
10.74 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/10. Reasons to Migrate to the Cloud.vtt
9.56 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/11. Security Design Architecture - Mobile Applications.mp4
12.96 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/03. Design Software Security Architecture/11. Security Design Architecture - Mobile Applications.vtt
9.88 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4
2.65 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt
1.77 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/1. Categorize Threats to Software Applications.mp4
13.54 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/1. Categorize Threats to Software Applications.vtt
10.78 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/2. External Software Attack - Human.mp4
13.71 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/2. External Software Attack - Human.vtt
12.49 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/3. Compromise of Operations.mp4
7.39 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/3. Compromise of Operations.vtt
6.78 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/4. Document Security Properties and Constraints.mp4
13.8 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/4. Document Security Properties and Constraints.vtt
10.61 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/5. Security Properties.mp4
8.93 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/5. Security Properties.vtt
8.03 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/6. Performance.mp4
8.08 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/6. Performance.vtt
7.3 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/7. Examine Architectural Risk Assessment.mp4
10.27 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/2. Characterize Threats to Software/7. Examine Architectural Risk Assessment.vtt
8.77 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/1. Design Secure System Interfaces.mp4
8 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/1. Design Secure System Interfaces.vtt
6.33 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/2. Upstream and Downstream Dependencies.mp4
9.84 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/2. Upstream and Downstream Dependencies.vtt
8.8 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/3. Interfaces.mp4
5.67 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/3. Interfaces.vtt
4.88 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/4. Protocol Design Choices.mp4
9.07 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/4. Design Secure Interfaces/4. Protocol Design Choices.vtt
6.69 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/1. Design and Evaluate Software Security Architecture.mp4
12.81 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/1. Design and Evaluate Software Security Architecture.vtt
10.34 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/2. Operating System Security.mp4
15.12 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/2. Operating System Security.vtt
12.99 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/3. Credential Management.mp4
6.3 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/3. Credential Management.vtt
5.78 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/4. Data Protection.mp4
9.24 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/4. Data Protection.vtt
8.72 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/5. Database Security.mp4
12.18 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/5. Database Security.vtt
9.64 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/6. Programming Language Environments.mp4
7.78 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/6. Programming Language Environments.vtt
5.46 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/7. Secure Backup and Restoration Planning.mp4
10.96 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/7. Secure Backup and Restoration Planning.vtt
9.03 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/8. Design Security Review.mp4
7.44 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/8. Design Security Review.vtt
5.55 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/9. Perform Architectural Risk Assessment.mp4
10.22 MB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/5. Design Security Architecture/9. Perform Architectural Risk Assessment.vtt
6.92 KB
~Get Your Files Here !/Secure Software Architecture and Design for CSSLP® By kevin-henry/playlist.m3u
2.26 KB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4
5.14 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt
2.32 KB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/1. Governance.mp4
21.16 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/1. Governance.vtt
14.15 KB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/2. Confidentiality.mp4
7.41 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/2. Confidentiality.vtt
5.85 KB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/3. Integrity.mp4
7.7 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/3. Integrity.vtt
6.85 KB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/4. Availability.mp4
7.43 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/4. Availability.vtt
6.36 KB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/5. Access Control Requirements.mp4
22.29 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/5. Access Control Requirements.vtt
19.62 KB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/6. Authorization.mp4
2.76 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/6. Authorization.vtt
2.33 KB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/7. Accountability.mp4
11.86 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/2. Core Security Principles/7. Accountability.vtt
11.01 KB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/1. Integrating Security into Software.mp4
5.58 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/1. Integrating Security into Software.vtt
4.18 KB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/2. Complete Mediation.mp4
4.6 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/2. Complete Mediation.vtt
2.37 KB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/3. Describe Psychological Acceptability.mp4
4.1 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/3. Describe Psychological Acceptability.vtt
3.68 KB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/4. Defence in Depth.mp4
6.4 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/4. Defence in Depth.vtt
5.86 KB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/5. Least Privilege.mp4
5.56 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/5. Least Privilege.vtt
4.87 KB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/6. Economy of Mechanism.mp4
11.42 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/6. Economy of Mechanism.vtt
9.65 KB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/7. Describe Resilience.mp4
4.19 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/3. Integrating Security into Software/7. Describe Resilience.vtt
3.58 KB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/4. Domain Summary/1. Domain Summary.mp4
6.52 MB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/4. Domain Summary/1. Domain Summary.vtt
4.42 KB
~Get Your Files Here !/Secure Software Concepts for CSSLP® By kevin-henry/playlist.m3u
913 B
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4
2.63 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt
1.73 KB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/1. Evaluate Operational Risk.mp4
14.36 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/1. Evaluate Operational Risk.vtt
10.31 KB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/2. Deployment Environment Hardening.mp4
9.96 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/2. Deployment Environment Hardening.vtt
8.51 KB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/3. Assess Personnel Training and Integration.mp4
4.91 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/2. Evaluate Operational Risk/3. Assess Personnel Training and Integration.vtt
4.08 KB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/1. Specify Secure Software Configuration.mp4
16.05 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/1. Specify Secure Software Configuration.vtt
13.29 KB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/2. Scheduling.mp4
10.04 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/2. Scheduling.vtt
9.99 KB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/3. Securely Store and Manage Security Data.mp4
12.16 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/3. Securely Store and Manage Security Data.vtt
11.92 KB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/4. Access Control.mp4
9.72 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/4. Access Control.vtt
7.57 KB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/5. Credentials.mp4
11.56 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/5. Credentials.vtt
10.47 KB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/6. Encryption Keys.mp4
9.5 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/6. Encryption Keys.vtt
7.95 KB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/7. Post-implementation Security Testing.mp4
4.31 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/3. Prepare Secure Software/7. Post-implementation Security Testing.vtt
3.63 KB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/1. Post-deployment and Resilience.mp4
12.68 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/1. Post-deployment and Resilience.vtt
10.89 KB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/2. Post-implementation Support.mp4
11.78 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/2. Post-implementation Support.vtt
9.61 KB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/3. Continuous Monitoring.mp4
15.03 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/3. Continuous Monitoring.vtt
14.59 KB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/4. Support Incident Response.mp4
19.85 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/4. Support Incident Response.vtt
16.96 KB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/5. Support Continuity of Operations.mp4
10.57 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/5. Support Continuity of Operations.vtt
8.97 KB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/6. Delayed Recovery.mp4
9.76 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/6. Delayed Recovery.vtt
8.73 KB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/7. Disaster Recovery Planning.mp4
13.73 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/7. Disaster Recovery Planning.vtt
12.41 KB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/8. Support Patch and Vulnerability Management.mp4
12.27 MB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/4. Design Resilient Software Operations/8. Support Patch and Vulnerability Management.vtt
10.86 KB
~Get Your Files Here !/Secure Software Deployment, Operations, and Maintenance for CSSLP® By kevin-henry/playlist.m3u
1.23 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/01. Secure Coding Practices.mp4
10.41 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/01. Secure Coding Practices.vtt
8.82 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/02. Programming Considerations.mp4
17.86 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/02. Programming Considerations.vtt
12.07 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/03. Input Validation.mp4
10.58 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/03. Input Validation.vtt
8.09 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/04. Error Handling and Logging.mp4
16.35 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/04. Error Handling and Logging.vtt
14.6 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/05. Protection of Output.mp4
8.97 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/05. Protection of Output.vtt
8.06 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/06. Session Management, Injection, and XSS.mp4
12.85 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/06. Session Management, Injection, and XSS.vtt
8.89 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/07. Configuration Management.mp4
9.04 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/07. Configuration Management.vtt
6.76 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/08. Network and Storage Requirements.mp4
9.04 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/08. Network and Storage Requirements.vtt
8.14 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/09. Resource and Memory Management.mp4
14.52 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/09. Resource and Memory Management.vtt
12.46 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/10. Sensitive Data Exposure and Access Control.mp4
14.3 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02. Secure Coding Practices/10. Sensitive Data Exposure and Access Control.vtt
11 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/02/confirm-adherence-to-secure-coding-practices-slides.pdf
2.76 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/03/assess-software-security-slides.pdf
617.93 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/04/create-security-controls-slides.pdf
1.15 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview (1).mp4
2.02 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview (1).vtt
1.27 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4
5 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt
1.4 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/1. Secure Coding Practices.mp4
8.25 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/1. Secure Coding Practices.vtt
6.91 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/2. Input Validation.mp4
5.6 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/2. Input Validation.vtt
3.94 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/3. Error Handling and Logging.mp4
14.92 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/3. Error Handling and Logging.vtt
12.46 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/4. Sensitive Data Exposure and Access Control.mp4
18.81 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/4. Sensitive Data Exposure and Access Control.vtt
12.24 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/5. Resource Management.mp4
13.25 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/5. Resource Management.vtt
11.77 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/6. Configuration Management.mp4
11.85 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/6. Configuration Management.vtt
8.2 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/7. Programming Considerations.mp4
9.49 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/7. Programming Considerations.vtt
5.99 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/8. Protection of Output.mp4
9.18 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/2. Secure Coding Practices - 40min/8. Protection of Output.vtt
6.76 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/1. Analyze Code for Security Risks.mp4
7.78 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/1. Analyze Code for Security Risks.vtt
6.04 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/2. Code Review.mp4
6.63 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/2. Code Review.vtt
5.97 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/3. Seeking out Vulnerabilities.mp4
8.79 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Assess Software Security/3. Seeking out Vulnerabilities.vtt
7.22 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Software Code Risks - 25min/1. Software Code Risks.mp4
8.15 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Software Code Risks - 25min/1. Software Code Risks.vtt
6.62 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Software Code Risks - 25min/2. Protected Code.mp4
18.51 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/3. Software Code Risks - 25min/2. Protected Code.vtt
14.23 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Create Security Controls/1. Implement Software Security Controls.mp4
7.5 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Create Security Controls/1. Implement Software Security Controls.vtt
5.48 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Create Security Controls/2. Protected Code.mp4
15.1 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Create Security Controls/2. Protected Code.vtt
11.42 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/1. Secure Code Analysis.mp4
11.35 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/1. Secure Code Analysis.vtt
9.68 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/2. Code Review Methods.mp4
8.43 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/2. Code Review Methods.vtt
7.5 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/3. Seeking Out Vulnerabilities.mp4
7.94 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/4. Secure Code Analysis - 20min/3. Seeking Out Vulnerabilities.vtt
6.31 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/5. Domain Summary - 5min/1. Domain Summary.mp4
5.61 MB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/5. Domain Summary - 5min/1. Domain Summary.vtt
3.54 KB
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/playlist (1).m3u
987 B
~Get Your Files Here !/Secure Software Implementation for CSSLP® By kevin-henry/playlist.m3u
925 B
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4
4.92 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt
2.46 KB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/2. Software Development Methodologies/1. Software Development Methodologies.mp4
10.16 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/2. Software Development Methodologies/1. Software Development Methodologies.vtt
6.85 KB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/2. Software Development Methodologies/2. Incorporate Security into the SDLC.mp4
23.1 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/2. Software Development Methodologies/2. Incorporate Security into the SDLC.vtt
17.7 KB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/1. Managing Software Lifecycle Risk.mp4
18.22 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/1. Managing Software Lifecycle Risk.vtt
13.03 KB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/2. Legal and Regulatory Issues.mp4
12.23 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/2. Legal and Regulatory Issues.vtt
8.77 KB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/3. Software Security Standards.mp4
11.55 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/3. Managing Software Lifecycle Risk/3. Software Security Standards.vtt
7.62 KB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/1. Managing Software Operational Security.mp4
17.35 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/1. Managing Software Operational Security.vtt
12.38 KB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/2. Version Control.mp4
5.32 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/2. Version Control.vtt
4.98 KB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/3. Security Metrics.mp4
20.71 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/4. Managing Software Operational Security/3. Security Metrics.vtt
18 KB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/5. Decommissioning Software Securely/1. Decommissioning Software Securely.mp4
11.27 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/5. Decommissioning Software Securely/1. Decommissioning Software Securely.vtt
9.03 KB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/5. Decommissioning Software Securely/2. Data Destruction.mp4
13.61 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/5. Decommissioning Software Securely/2. Data Destruction.vtt
13.54 KB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/6. Domain Summary/1. Domain Summary.mp4
7.49 MB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/6. Domain Summary/1. Domain Summary.vtt
5.11 KB
~Get Your Files Here !/Secure Software Lifecycle Management for CSSLP® By kevin-henry/playlist.m3u
817 B
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4
5.31 MB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt
2.24 KB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/1. Discovering Secure Software Requirements.mp4
13.41 MB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/1. Discovering Secure Software Requirements.vtt
13.31 KB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/2. Gathering (Security) Requirements.mp4
15 MB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/2. Gathering (Security) Requirements.vtt
13.69 KB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/3. Identify Compliance Requirements.mp4
10.05 MB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/2. Discovering Secure Software Requirements/3. Identify Compliance Requirements.vtt
8.74 KB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/1. Data Protection.mp4
15.56 MB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/1. Data Protection.vtt
13.65 KB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/2. Data Lifecycle.mp4
16.32 MB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/2. Data Lifecycle.vtt
13.96 KB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/3. Implementing Data Protection.mp4
16.6 MB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/3. Implementing Data Protection.vtt
15.89 KB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/4. Data Sharing.mp4
12.6 MB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/3. Data Protection/4. Data Sharing.vtt
11.25 KB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/4. Documenting Software Requirements/1. Documenting Software Requirements.mp4
13.31 MB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/4. Documenting Software Requirements/1. Documenting Software Requirements.vtt
11.2 KB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/4. Documenting Software Requirements/2. Manage Security Requirements with Third-parties.mp4
24.18 MB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/4. Documenting Software Requirements/2. Manage Security Requirements with Third-parties.vtt
20.24 KB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/5. Domain Summary/1. Domain Summary.mp4
6.97 MB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/5. Domain Summary/1. Domain Summary.vtt
5.11 KB
~Get Your Files Here !/Secure Software Requirements for CSSLP® By kevin-henry/playlist.m3u
689 B
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4
2.53 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt
1.61 KB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/1. Evaluate Software Supply Chain Risk Management.mp4
9.64 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/1. Evaluate Software Supply Chain Risk Management.vtt
8.62 KB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/2. Document the Supply Chain.mp4
10.32 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/2. Document the Supply Chain.vtt
9.23 KB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/3. Assess Supply Chain Risk.mp4
6.94 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/3. Assess Supply Chain Risk.vtt
5.84 KB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/4. Third-party Contracts.mp4
11.3 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/4. Third-party Contracts.vtt
9.99 KB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/5. Outsourcing Software Development.mp4
9.99 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/2. Evaluate Software Supply Chain Risk Management/5. Outsourcing Software Development.vtt
9.23 KB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/1. Ascertain Code Repository Security.mp4
10.32 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/1. Ascertain Code Repository Security.vtt
9.33 KB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/2. Software Deployment.mp4
10.35 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/2. Software Deployment.vtt
9.18 KB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/3. Secure Build.mp4
12.15 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/3. Manage Software Supply Chain Acquisition Risk/3. Secure Build.vtt
9.58 KB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/4. Assess Software Supply Chain Operations/1. Assess Supply Chain Monitoring.mp4
18.55 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/4. Assess Software Supply Chain Operations/1. Assess Supply Chain Monitoring.vtt
15.8 KB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/4. Assess Software Supply Chain Operations/2. Supply Chain Risk Response.mp4
10.97 MB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/4. Assess Software Supply Chain Operations/2. Supply Chain Risk Response.vtt
9.62 KB
~Get Your Files Here !/Secure Software Supply Chain for CSSLP® By kevin-henry/playlist.m3u
873 B
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.mp4
2.65 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/1. Course Overview/1. Course Overview.vtt
1.7 KB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/1. Develop Security Test Cases.mp4
16.43 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/1. Develop Security Test Cases.vtt
14.06 KB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/2. Testing the Box.mp4
13.84 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/2. Testing the Box.vtt
10 KB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/3. Vulnerability Assessments and Penetration Testing.mp4
20.41 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/3. Vulnerability Assessments and Penetration Testing.vtt
17.23 KB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/4. Scanning.mp4
10.68 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/4. Scanning.vtt
8.37 KB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/5. Ongoing Testing.mp4
10.03 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/5. Ongoing Testing.vtt
8.48 KB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/6. Environment Testing.mp4
10.14 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/2. Develop Security Test Cases/6. Environment Testing.vtt
7.86 KB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/1. Develop Security Testing Strategy and Plan.mp4
17.58 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/1. Develop Security Testing Strategy and Plan.vtt
12.98 KB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/2. Develop or Obtain Security Test Data.mp4
7.63 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/2. Develop or Obtain Security Test Data.vtt
5.84 KB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/3. Testing Methodologies.mp4
12.33 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/3. Testing Methodologies.vtt
6.18 KB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/4. Database Integrity.mp4
12.76 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/3. Developing and Acquiring Test Data/4. Database Integrity.vtt
10.6 KB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/1. Documentation, Verification, and Validation.mp4
9.2 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/1. Documentation, Verification, and Validation.vtt
7.43 KB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/2. Resolving Errors Found During Testing.mp4
10.27 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/2. Resolving Errors Found During Testing.vtt
8.89 KB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/3. Documentation.mp4
13.61 MB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/4. Executing the Test Plan/3. Documentation.vtt
11.32 KB
~Get Your Files Here !/Secure Software Testing for CSSLP® By kevin-henry/playlist.m3u
907 B

免责声明

本网站仅提供DHT网络资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 fuckatgfw@protonmail.com。