Linkedin Learning Developing Secure Software Online Class-ZH

Linkedin Learning Developing Secure Software Online Class-ZH | Apps-Tutorials | MP4 | 248.53 MiB

2 533 kb/s 1280×720 | AAC 160 kb/s 2 CH

NFO (Click to Show)

Zieg Heil
Linkedin.Learning.Developing.Secure.Software.Online.Class-ZH
     Title: Developing Secure Software Online Class
 Publisher: Linkedin.Learning
      Size: 249M (260605132 B)
     Files: 6F
      Date: 08/11/2020
  Course #: Linkedin.Learning
      Type: N/A
 Published: 
  Modified: N/A
       URL: www.linkedin.com/learning/developing-secure-software
    Author: Jungwoo Ryoo
  Duration: N/A
     Skill: N/A
 Exer/Code: [ ]
Installation:
Unpack that shit, run that shit
Of course we know its sieg heil, thats how fucking rebelious we are!
Description:
Software developers are constantly told to use secure coding
practices. Luckily, with todays tools, secure code doesnt take a
lot of time or effort. There are security frameworks
(authentication, authorization, etc.) developers can use as their
own. There are also static and dynamic code analysis tools to test
code. Plus, with security patterns that can be implemented at the
design levelbefore coding ever beginsyou can make sure

File List (Click to Show)

249M	Developing Secure Software
21M	Developing Secure Software/01 - Introduction
20M	Developing Secure Software/01 - Introduction/01 - Building security into software development.mp4
4.0K	Developing Secure Software/01 - Introduction/01 - Building security into software development.srt
860K	Developing Secure Software/01 - Introduction/02 - What you should know.mp4
4.0K	Developing Secure Software/01 - Introduction/02 - What you should know.srt
22M	Developing Secure Software/02 - Understanding Software Security
2.7M	Developing Secure Software/02 - Understanding Software Security/01 - What is software security.mp4
4.0K	Developing Secure Software/02 - Understanding Software Security/01 - What is software security.srt
5.2M	Developing Secure Software/02 - Understanding Software Security/02 - Significance of software security.mp4
4.0K	Developing Secure Software/02 - Understanding Software Security/02 - Significance of software security.srt
2.9M	Developing Secure Software/02 - Understanding Software Security/03 - Software security vocabulary.mp4
4.0K	Developing Secure Software/02 - Understanding Software Security/03 - Software security vocabulary.srt
3.7M	Developing Secure Software/02 - Understanding Software Security/04 - Software security risk management.mp4
4.0K	Developing Secure Software/02 - Understanding Software Security/04 - Software security risk management.srt
7.3M	Developing Secure Software/02 - Understanding Software Security/05 - Software security resources.mp4
4.0K	Developing Secure Software/02 - Understanding Software Security/05 - Software security resources.srt
36M	Developing Secure Software/03 - Software Security Threats
8.3M	Developing Secure Software/03 - Software Security Threats/01 - Threats to software security.mp4
4.0K	Developing Secure Software/03 - Software Security Threats/01 - Threats to software security.srt
4.5M	Developing Secure Software/03 - Software Security Threats/02 - Hardware-level threats.mp4
4.0K	Developing Secure Software/03 - Software Security Threats/02 - Hardware-level threats.srt
4.1M	Developing Secure Software/03 - Software Security Threats/03 - Code-level threats.mp4
4.0K	Developing Secure Software/03 - Software Security Threats/03 - Code-level threats.srt
4.8M	Developing Secure Software/03 - Software Security Threats/04 - Detailed design-level threats.mp4
4.0K	Developing Secure Software/03 - Software Security Threats/04 - Detailed design-level threats.srt
4.9M	Developing Secure Software/03 - Software Security Threats/05 - Architectural-level threats.mp4
4.0K	Developing Secure Software/03 - Software Security Threats/05 - Architectural-level threats.srt
4.0M	Developing Secure Software/03 - Software Security Threats/06 - Requirements-level threats.mp4
4.0K	Developing Secure Software/03 - Software Security Threats/06 - Requirements-level threats.srt
5.2M	Developing Secure Software/03 - Software Security Threats/07 - Threat modeling and tools.mp4
4.0K	Developing Secure Software/03 - Software Security Threats/07 - Threat modeling and tools.srt
44M	Developing Secure Software/04 - Secure Software Design
4.4M	Developing Secure Software/04 - Secure Software Design/01 - Introduction to secure design.mp4
4.0K	Developing Secure Software/04 - Secure Software Design/01 - Introduction to secure design.srt
3.9M	Developing Secure Software/04 - Secure Software Design/02 - Security tactics.mp4
4.0K	Developing Secure Software/04 - Secure Software Design/02 - Security tactics.srt
4.4M	Developing Secure Software/04 - Secure Software Design/03 - Security patterns.mp4
4.0K	Developing Secure Software/04 - Secure Software Design/03 - Security patterns.srt
5.2M	Developing Secure Software/04 - Secure Software Design/04 - Security vulnerabilities.mp4
4.0K	Developing Secure Software/04 - Secure Software Design/04 - Security vulnerabilities.srt
5.2M	Developing Secure Software/04 - Secure Software Design/05 - Architectural analysis for security.mp4
4.0K	Developing Secure Software/04 - Secure Software Design/05 - Architectural analysis for security.srt
1.5M	Developing Secure Software/04 - Secure Software Design/06 - Case study Setting the Stage.mp4
4.0K	Developing Secure Software/04 - Secure Software Design/06 - Case study Setting the Stage.srt
4.0M	Developing Secure Software/04 - Secure Software Design/07 - Case study Tactic-Oriented Architectural Analysis.mp4
4.0K	Developing Secure Software/04 - Secure Software Design/07 - Case study Tactic-Oriented Architectural Analysis.srt
6.0M	Developing Secure Software/04 - Secure Software Design/08 - Case study Pattern-Oriented Architectural Analysis.mp4
8.0K	Developing Secure Software/04 - Secure Software Design/08 - Case study Pattern-Oriented Architectural Analysis.srt
4.5M	Developing Secure Software/04 - Secure Software Design/09 - Case study Vulnerability-Oriented Architectural Analysis.mp4
4.0K	Developing Secure Software/04 - Secure Software Design/09 - Case study Vulnerability-Oriented Architectural Analysis.srt
5.3M	Developing Secure Software/04 - Secure Software Design/10 - Software security anti-patterns.mp4
4.0K	Developing Secure Software/04 - Secure Software Design/10 - Software security anti-patterns.srt
39M	Developing Secure Software/05 - Secure Coding
1.9M	Developing Secure Software/05 - Secure Coding/01 - Setting the stage.mp4
4.0K	Developing Secure Software/05 - Secure Coding/01 - Setting the stage.srt
4.6M	Developing Secure Software/05 - Secure Coding/02 - Buffer overflow attacks.mp4
4.0K	Developing Secure Software/05 - Secure Coding/02 - Buffer overflow attacks.srt
4.9M	Developing Secure Software/05 - Secure Coding/03 - Buffer overflow countermeasures.mp4
4.0K	Developing Secure Software/05 - Secure Coding/03 - Buffer overflow countermeasures.srt
3.0M	Developing Secure Software/05 - Secure Coding/04 - Broken authentication and session management.mp4
4.0K	Developing Secure Software/05 - Secure Coding/04 - Broken authentication and session management.srt
5.6M	Developing Secure Software/05 - Secure Coding/05 - Broken authentication and session management countermeasures.mp4
4.0K	Developing Secure Software/05 - Secure Coding/05 - Broken authentication and session management countermeasures.srt
3.8M	Developing Secure Software/05 - Secure Coding/06 - Insecure direct object references.mp4
4.0K	Developing Secure Software/05 - Secure Coding/06 - Insecure direct object references.srt
2.2M	Developing Secure Software/05 - Secure Coding/07 - Insecure direct object references countermeasures.mp4
4.0K	Developing Secure Software/05 - Secure Coding/07 - Insecure direct object references countermeasures.srt
3.0M	Developing Secure Software/05 - Secure Coding/08 - Sensitive information exposure.mp4
4.0K	Developing Secure Software/05 - Secure Coding/08 - Sensitive information exposure.srt
4.2M	Developing Secure Software/05 - Secure Coding/09 - Sensitive data exposure countermeasures.mp4
4.0K	Developing Secure Software/05 - Secure Coding/09 - Sensitive data exposure countermeasures.srt
6.0M	Developing Secure Software/05 - Secure Coding/10 - Other secure coding best practices.mp4
4.0K	Developing Secure Software/05 - Secure Coding/10 - Other secure coding best practices.srt
41M	Developing Secure Software/06 - Testing for Security
2.7M	Developing Secure Software/06 - Testing for Security/01 - Testing for security.mp4
4.0K	Developing Secure Software/06 - Testing for Security/01 - Testing for security.srt
4.6M	Developing Secure Software/06 - Testing for Security/02 - Static analysis.mp4
4.0K	Developing Secure Software/06 - Testing for Security/02 - Static analysis.srt
4.5M	Developing Secure Software/06 - Testing for Security/03 - Exploring tools for static analysis.mp4
4.0K	Developing Secure Software/06 - Testing for Security/03 - Exploring tools for static analysis.srt
4.2M	Developing Secure Software/06 - Testing for Security/04 - Dynamic analysis.mp4
4.0K	Developing Secure Software/06 - Testing for Security/04 - Dynamic analysis.srt
2.7M	Developing Secure Software/06 - Testing for Security/05 - Dynamic analysis tools.mp4
4.0K	Developing Secure Software/06 - Testing for Security/05 - Dynamic analysis tools.srt
4.2M	Developing Secure Software/06 - Testing for Security/06 - Penetration testing.mp4
4.0K	Developing Secure Software/06 - Testing for Security/06 - Penetration testing.srt
8.5M	Developing Secure Software/06 - Testing for Security/07 - Penetration testing tools.mp4
4.0K	Developing Secure Software/06 - Testing for Security/07 - Penetration testing tools.srt
4.6M	Developing Secure Software/06 - Testing for Security/08 - Vulnerability management.mp4
4.0K	Developing Secure Software/06 - Testing for Security/08 - Vulnerability management.srt
5.5M	Developing Secure Software/06 - Testing for Security/09 - Vulnerability management tools.mp4
4.0K	Developing Secure Software/06 - Testing for Security/09 - Vulnerability management tools.srt
47M	Developing Secure Software/07 - Recent Developments and Future Directions
8.0M	Developing Secure Software/07 - Recent Developments and Future Directions/01 - DevOps and software security.mp4
8.0K	Developing Secure Software/07 - Recent Developments and Future Directions/01 - DevOps and software security.srt
7.1M	Developing Secure Software/07 - Recent Developments and Future Directions/02 - Cloud security.mp4
8.0K	Developing Secure Software/07 - Recent Developments and Future Directions/02 - Cloud security.srt
7.3M	Developing Secure Software/07 - Recent Developments and Future Directions/03 - Developer-friendly software security.mp4
4.0K	Developing Secure Software/07 - Recent Developments and Future Directions/03 - Developer-friendly software security.srt
6.8M	Developing Secure Software/07 - Recent Developments and Future Directions/04 - IoT and software security.mp4
4.0K	Developing Secure Software/07 - Recent Developments and Future Directions/04 - IoT and software security.srt
7.3M	Developing Secure Software/07 - Recent Developments and Future Directions/05 - Rules and regulations.mp4
4.0K	Developing Secure Software/07 - Recent Developments and Future Directions/05 - Rules and regulations.srt
11M	Developing Secure Software/07 - Recent Developments and Future Directions/06 - Software security certifications.mp4
4.0K	Developing Secure Software/07 - Recent Developments and Future Directions/06 - Software security certifications.srt
912K	Developing Secure Software/08 - Conclusion
904K	Developing Secure Software/08 - Conclusion/01 - Next steps and additional resources.mp4
4.0K	Developing Secure Software/08 - Conclusion/01 - Next steps and additional resources.srt
249M	total

File: 01 - Building security into software development.mp4
Size: 20470787 bytes (19.52 MiB), duration: 00:01:04, avg.bitrate: 2559 kb/s
Audio: aac, 48000 Hz, stereo (und)
Video: h264, yuv420p, 1280x720, 30.00 fps(r) (eng)


Download Linkedin Learning Developing Secure Software Online Class-ZH ( Size: 248.53 MiB ) :

Filehosts: Nitroflare, Rapidgator

http://nitroflare.com/view/25C2B76BF465781/ejgiLiLeDeSeSoOnClZH.zip

http://rapidgator.net/file/f7f15a08e181aefaab57f9468726eeac/ejgiLiLeDeSeSoOnClZH.zip.html

Apps-Tutorials
Comments (0)
Add Comment