Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
452B |
005 - Introduction.mp4 |
23.71MB |
006 - Identify Security Requirements and Expectations.mp4 |
309.53MB |
007 - Activity - Identifying Security Requirements and Expectations.mp4 |
129.38MB |
008 - Identify Factors that Undermine Software Security.mp4 |
219.73MB |
009 - Identify Factors that Undermine Software Security, Part 2.mp4 |
93.34MB |
010 - Find Vulnerabilities in Your Software.mp4 |
265.17MB |
011 - Activity - Identifying Vulnerabilities in an Application.mp4 |
120.29MB |
012 - Building and Breaking Passwords.mp4 |
183.00MB |
013 - Activity - Adding a Security Feature to Your Code.mp4 |
75.62MB |
014 - Activity - Protect Against a Poison Null Byte.mp4 |
95.55MB |
015 - Activity - Hashing a Password.mp4 |
60.51MB |
016 - Activity - Securing the Password Hash.mp4 |
60.02MB |
017 - Activity - Saving Hashes for Future Use.mp4 |
58.59MB |
018 - Activity - Validating a Password.mp4 |
54.83MB |
019 - Activity - Having Fun With a Modern Hashing Algorithm.mp4 |
66.10MB |
020 - Gather Intelligence on Vulnerabilities and Exploits.mp4 |
93.59MB |
021 - Handle Vulnerabilities Due to Software Defects and Misconfiguration.mp4 |
338.57MB |
022 - Handle Vulnerabilities Due to Software Defects and Misconfiguration, Part 2.mp4 |
271.75MB |
023 - Handle Vulnerabilities Due to Software Defects and Misconfiguration, Part 3.mp4 |
192.69MB |
024 - Activity Examining the Web App Functionality.mp4 |
200.06MB |
025 - Activity Examining the Project Files for Security Concerns.mp4 |
225.42MB |
026 - Handle Error Messaging.mp4 |
266.41MB |
027 - Activity Identifying Software Defects and Misconfiguration.mp4 |
136.18MB |
028 - Handle Vulnerabilities Due to Human Factors.mp4 |
263.53MB |
029 - Handle Vulnerabilities Due to Human Factors, Part 2.mp4 |
119.52MB |
030 - Activity Managing People Risks.mp4 |
145.00MB |
031 - Handle Vulnerabilities Due to Process Shortcomings.mp4 |
251.26MB |
032 - Handle Vulnerabilities Due to Process Shortcomings, Part 2.mp4 |
116.87MB |
033 - Handle Vulnerabilities Due to Process Shortcomings, Part 3.mp4 |
224.13MB |
034 - Activity Managing Software Development Process Risks.mp4 |
84.11MB |
035 - Apply General Principles for Secure Design.mp4 |
191.76MB |
036 - Apply General Principles for Secure Design, Part 2.mp4 |
121.82MB |
037 - Use Secure Design Patterns.mp4 |
272.14MB |
038 - Activity Avoiding Common Security Design Flaws.mp4 |
39.30MB |
039 - Design Software to Counter Specific Threats.mp4 |
311.84MB |
040 - Design Software to Counter Specific Threats, Part 2.mp4 |
400.77MB |
041 - Activity Identifying Threats and Countermeasures.mp4 |
70.82MB |
042 - Follow Best Practices for Secure Coding.mp4 |
289.66MB |
043 - Activity Researching Secure Coding Best Practices.mp4 |
190.55MB |
044 - Prevent Memory Errors.mp4 |
193.04MB |
045 - Prevent Memory Errors, Part 2.mp4 |
165.84MB |
046 - Maintain Secure Formatting and Resource Access.mp4 |
250.61MB |
047 - Activity Preventing a Race Condition.mp4 |
57.66MB |
048 - Prevent Privacy Vulnerabilities.mp4 |
334.32MB |
049 - Activity Handling Privacy Defects.mp4 |
61.75MB |
050 - Prevent Platform Vulnerabilities, Part 1.mp4 |
268.46MB |
051 - Prevent Platform Vulnerabilities, Part 2.mp4 |
343.94MB |
052 - Activity Staging an XSS Attack on the Web App.mp4 |
149.35MB |
053 - Prevent Mobile Platform Vulnerabilities.mp4 |
229.43MB |
054 - Prevent Mobile Platform Vulnerabilities, Part 2.mp4 |
244.16MB |
055 - Prevent IoT Platform Vulnerabilities.mp4 |
81.97MB |
056 - Prevent Desktop Platform Vulnerabilities.mp4 |
233.47MB |
057 - Limit Access Using Session Control.mp4 |
222.35MB |
058 - Limit Access Using Session Control, Part 2.mp4 |
222.33MB |
059 - Activity Handling Authentication and Authorization Defects.mp4 |
180.28MB |
060 - Limit Access with User Accounts.mp4 |
266.40MB |
061 - Protect Data with Cryptography.mp4 |
133.13MB |
062 - Activity Having Fun with Symmetric Encryption.mp4 |
138.27MB |
063 - Activity Having Fun with Asymmetric Encryption.mp4 |
119.13MB |
064 - Extend Cryptosystems with PKI.mp4 |
204.27MB |
065 - Extend Cryptosystems with PKI, Part 2.mp4 |
134.51MB |
066 - Activity Protecting Data in Transit and at Rest.mp4 |
113.05MB |
067 - Implement Error Handling and Logging.mp4 |
270.49MB |
068 - Activity Reviewing Error Handling.mp4 |
55.48MB |
069 - Activity Improving Error Handling.mp4 |
99.15MB |
070 - Protect Sensitive Data and Functions, Part 1.mp4 |
239.21MB |
071 - Protect Sensitive Data and Functions, Part 2.mp4 |
137.16MB |
072 - Preparing Chrome to Tamper with a Website.mp4 |
56.28MB |
073 - Activity Tampering with Website Data and Functions.mp4 |
154.42MB |
074 - Protect Database Access.mp4 |
295.34MB |
075 - Activity SQL Injection.mp4 |
210.17MB |
076 - Activity SQL Injection, Part 2.mp4 |
114.92MB |
077 - Perform Security Testing.mp4 |
313.13MB |
078 - Analyze Code to Find Security Problems.mp4 |
104.90MB |
079 - Activity Performing Code Analysis.mp4 |
86.42MB |
080 - Use Automated Testing Tools to Find Security Problems.mp4 |
107.06MB |
081 - Activity Using a Test Suite to Automate Unit Testing.mp4 |
52.99MB |
082 - Monitor and Log Applications to Support Security.mp4 |
250.87MB |
083 - Activity Monitoring and Logging a Deployed Application.mp4 |
85.67MB |
084 - Maintain Security After Deployment.mp4 |
249.23MB |
085 - Activity Analyzing Suspicious Binaries.mp4 |
140.14MB |
086 - Course Summary.mp4 |
17.52MB |
1 |
1.23MB |
10 |
1.86MB |
11 |
256.13KB |
12 |
1.51MB |
13 |
1.54MB |
14 |
1.59MB |
15 |
1.60MB |
16 |
851.79KB |
17 |
486.13KB |
18 |
758.09KB |
19 |
1.13MB |
2 |
58.03KB |
20 |
1.39MB |
21 |
788.40KB |
22 |
1.84MB |
23 |
808.59KB |
24 |
544.55KB |
25 |
580.93KB |
26 |
593.03KB |
27 |
1.87MB |
28 |
1.65MB |
29 |
1.67MB |
3 |
1.43MB |
30 |
281.55KB |
31 |
1.83MB |
32 |
1.73MB |
33 |
1.94MB |
34 |
984.19KB |
35 |
1.31MB |
36 |
248.31KB |
37 |
1.45MB |
38 |
1.00MB |
39 |
1.72MB |
4 |
1.68MB |
40 |
162.84KB |
41 |
1.58MB |
42 |
669.47KB |
43 |
1.00MB |
44 |
1.86MB |
45 |
1.73MB |
46 |
855.81KB |
47 |
1.82MB |
48 |
1.49MB |
49 |
885.95KB |
5 |
888.46KB |
50 |
637.68KB |
51 |
186.34KB |
52 |
1.71MB |
53 |
489.72KB |
54 |
890.90KB |
55 |
1.13MB |
56 |
1.08MB |
57 |
974.30KB |
58 |
962.85KB |
59 |
1.10MB |
6 |
160.05KB |
60 |
871.10KB |
61 |
463.26KB |
62 |
415.00KB |
63 |
680.64KB |
64 |
1.58MB |
65 |
338.77KB |
66 |
1.89MB |
67 |
31.14KB |
68 |
385.05KB |
69 |
1.18MB |
7 |
484.55KB |
70 |
1.90MB |
71 |
252.04KB |
72 |
1.49MB |
73 |
1.98MB |
74 |
1.41MB |
75 |
344.55KB |
76 |
1.72MB |
77 |
537.40KB |
78 |
1.17MB |
79 |
1.01MB |
8 |
672.30KB |
80 |
712.85KB |
81 |
297.61KB |
82 |
490.97KB |
9 |
346.33KB |
CSC-210 Lab Setup Guide.docx.pdf |
468.19KB |
CSC-210 Links.pdf |
141.65KB |
csclab.zip |
431.40MB |
Lab Troubleshooting.docx.pdf |
2.89MB |
TutsNode.com.txt |
63B |