TorBT - Torrents and Magnet Links Search Engine

[FreeCoursesOnline.Me] O`REILLY - Fundamentals of Secure Software

File Name
Size
0. Websites you may like/1. Get Free Premium Accounts Daily On Our Discord Server!.txt
1.3 kB
0. Websites you may like/2. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url
377 B
0. Websites you may like/3. FTUApps.com Download Cracked Developers Applications For Free.url
239 B
Chapter 1 Introduction to the Course/001. Introduction to Application Security.mp4
36 MB
Chapter 1 Introduction to the Course/002. Application Security Terms and Definitions.mp4
28 MB
Chapter 1 Introduction to the Course/003. Application Security Goals.mp4
42 MB
Chapter 1 Introduction to the Course/004. OWASP WebGoat Demo.mp4
61 MB
Chapter 10 Conclusion/001. Conclusion.mp4
74 MB
Chapter 2 Introduction to OWASP Top 10 and More Items/001. Introduction to OWASP Top 10.mp4
44 MB
Chapter 2 Introduction to OWASP Top 10 and More Items/002. SANS Top 25.mp4
25 MB
Chapter 2 Introduction to OWASP Top 10 and More Items/003. Threat Actors and More Definitions.mp4
61 MB
Chapter 2 Introduction to OWASP Top 10 and More Items/004. Defense In-Depth.mp4
21 MB
Chapter 2 Introduction to OWASP Top 10 and More Items/005. Proxy Tools.mp4
9.8 MB
Chapter 2 Introduction to OWASP Top 10 and More Items/006. Demo of Fiddler with JuiceShop.mp4
27 MB
Chapter 2 Introduction to OWASP Top 10 and More Items/007. API Security.mp4
46 MB
Chapter 3 Dive into the OWASP Top 10/001. Broken Access Control.mp4
33 MB
Chapter 3 Dive into the OWASP Top 10/002. Cryptographic Failures.mp4
29 MB
Chapter 3 Dive into the OWASP Top 10/003. Injection.mp4
40 MB
Chapter 3 Dive into the OWASP Top 10/004. Insecure Design.mp4
26 MB
Chapter 3 Dive into the OWASP Top 10/005. Security Misconfiguration.mp4
24 MB
Chapter 3 Dive into the OWASP Top 10/006. Vulnerable and Outdated Components.mp4
38 MB
Chapter 3 Dive into the OWASP Top 10/007. Identification and Authentication Failures.mp4
15 MB
Chapter 3 Dive into the OWASP Top 10/008. Software and Data Integrity Failures.mp4
13 MB
Chapter 3 Dive into the OWASP Top 10/009. Security Logging and Monitoring Failures.mp4
32 MB
Chapter 3 Dive into the OWASP Top 10/010. Server-Side Request Forgery.mp4
15 MB
Chapter 4 Defenses and Tools/001. OWASP ZAP (Zed Attack Proxy).mp4
12 MB
Chapter 4 Defenses and Tools/002. Running a ZAP Scan.mp4
51 MB
Chapter 4 Defenses and Tools/003. Cross-Site Scripting.mp4
10 MB
Chapter 4 Defenses and Tools/004. CSP (Content Security Policy).mp4
29 MB
Chapter 4 Defenses and Tools/005. CSP Demo.mp4
36 MB
Chapter 4 Defenses and Tools/006. Security Models.mp4
31 MB
Chapter 4 Defenses and Tools/007. Scanning for OSS Vulnerabilities with Software Composition Analysis.mp4
22 MB
Chapter 4 Defenses and Tools/008. SKF (Security Knowledge Framework).mp4
16 MB
Chapter 4 Defenses and Tools/009. SKF Demo.mp4
37 MB
Chapter 4 Defenses and Tools/010. SKF Labs Demo.mp4
27 MB
Chapter 4 Defenses and Tools/011. Source Code Review.mp4
35 MB
Chapter 5 Session Management/001. Introduction to Session Management.mp4
35 MB
Chapter 5 Session Management/002. Web Sessions.mp4
36 MB
Chapter 5 Session Management/003. JWT (JSON Web Token).mp4
27 MB
Chapter 5 Session Management/004. JWT Example.mp4
16 MB
Chapter 5 Session Management/005. OAuth.mp4
29 MB
Chapter 5 Session Management/006. OpenID and OpenID Connect.mp4
26 MB
Chapter 6 Risk Rating and Threat Modeling/001. Risk Rating Introduction.mp4
40 MB
Chapter 6 Risk Rating and Threat Modeling/002. Risk Rating Demo.mp4
60 MB
Chapter 6 Risk Rating and Threat Modeling/003. Introduction to Threat Modeling.mp4
43 MB
Chapter 6 Risk Rating and Threat Modeling/004. Type of Threat Modeling.mp4
27 MB
Chapter 6 Risk Rating and Threat Modeling/005. Introduction to Manual Threat Modeling.mp4
16 MB
Chapter 6 Risk Rating and Threat Modeling/006. Manual Threat Model demo.mp4
25 MB
Chapter 6 Risk Rating and Threat Modeling/007. Prepping for Microsoft Threat Model Tool.mp4
21 MB
Chapter 6 Risk Rating and Threat Modeling/008. Microsoft Threat Model Tool demo.mp4
53 MB
Chapter 7 Encryption and Hashing/001. Encryption Overview.mp4
18 MB
Chapter 7 Encryption and Hashing/002. Encryption Use Cases.mp4
26 MB
Chapter 7 Encryption and Hashing/003. Hashing Overview.mp4
32 MB
Chapter 7 Encryption and Hashing/004. Hashing Demo.mp4
11 MB
Chapter 7 Encryption and Hashing/005. PKI (Public Key Infrastructure).mp4
16 MB
Chapter 7 Encryption and Hashing/006. Password Management.mp4
34 MB
Chapter 7 Encryption and Hashing/007. Password Demo.mp4
11 MB
Chapter 8 Frameworks and Process/001. HIPAA (Health Insurance Portability and Accountability Act).mp4
42 MB
Chapter 8 Frameworks and Process/002. PCI DSS (Payment Card Industry Data Security Standard).mp4
15 MB
Chapter 8 Frameworks and Process/003. DevOps.mp4
18 MB
Chapter 8 Frameworks and Process/004. DevSecOps.mp4
26 MB
Chapter 8 Frameworks and Process/005. Use, Abuse, and Misuse cases.mp4
17 MB
Chapter 9 Security Scanning and Testing/001. SAST (Static Application Security Testing).mp4
28 MB
Chapter 9 Security Scanning and Testing/002. Spot Bugs Demo.mp4
40 MB
Chapter 9 Security Scanning and Testing/003. DAST (Dynamic Application Security Testing).mp4
9.5 MB
Chapter 9 Security Scanning and Testing/004. IAST (Interactive Application Security Testing).mp4
8.7 MB
Chapter 9 Security Scanning and Testing/005. RASP (Runtime Application Self-Protection).mp4
11 MB
Chapter 9 Security Scanning and Testing/006. WAF (Web Application Firewall).mp4
17 MB
Chapter 9 Security Scanning and Testing/007. Penetration Testing.mp4
12 MB
Chapter 9 Security Scanning and Testing/008. SCA (Software Composition Analysis).mp4
23 MB
FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url
290 B