Torrent Info
Title CertNexus Cyber Secure Coder
Category
Size 14.20GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[TGx]Downloaded from torrentgalaxy.to .txt 585B
0 452B
005 - Introduction.mp4 23.71MB
006 - Identify Security Requirements and Expectations.mp4 309.53MB
007 - Activity - Identifying Security Requirements and Expectations.mp4 129.38MB
008 - Identify Factors that Undermine Software Security.mp4 219.73MB
009 - Identify Factors that Undermine Software Security, Part 2.mp4 93.34MB
010 - Find Vulnerabilities in Your Software.mp4 265.17MB
011 - Activity - Identifying Vulnerabilities in an Application.mp4 120.29MB
012 - Building and Breaking Passwords.mp4 183.00MB
013 - Activity - Adding a Security Feature to Your Code.mp4 75.62MB
014 - Activity - Protect Against a Poison Null Byte.mp4 95.55MB
015 - Activity - Hashing a Password.mp4 60.51MB
016 - Activity - Securing the Password Hash.mp4 60.02MB
017 - Activity - Saving Hashes for Future Use.mp4 58.59MB
018 - Activity - Validating a Password.mp4 54.83MB
019 - Activity - Having Fun With a Modern Hashing Algorithm.mp4 66.10MB
020 - Gather Intelligence on Vulnerabilities and Exploits.mp4 93.59MB
021 - Handle Vulnerabilities Due to Software Defects and Misconfiguration.mp4 338.57MB
022 - Handle Vulnerabilities Due to Software Defects and Misconfiguration, Part 2.mp4 271.75MB
023 - Handle Vulnerabilities Due to Software Defects and Misconfiguration, Part 3.mp4 192.69MB
024 - Activity Examining the Web App Functionality.mp4 200.06MB
025 - Activity Examining the Project Files for Security Concerns.mp4 225.42MB
026 - Handle Error Messaging.mp4 266.41MB
027 - Activity Identifying Software Defects and Misconfiguration.mp4 136.18MB
028 - Handle Vulnerabilities Due to Human Factors.mp4 263.53MB
029 - Handle Vulnerabilities Due to Human Factors, Part 2.mp4 119.52MB
030 - Activity Managing People Risks.mp4 145.00MB
031 - Handle Vulnerabilities Due to Process Shortcomings.mp4 251.26MB
032 - Handle Vulnerabilities Due to Process Shortcomings, Part 2.mp4 116.87MB
033 - Handle Vulnerabilities Due to Process Shortcomings, Part 3.mp4 224.13MB
034 - Activity Managing Software Development Process Risks.mp4 84.11MB
035 - Apply General Principles for Secure Design.mp4 191.76MB
036 - Apply General Principles for Secure Design, Part 2.mp4 121.82MB
037 - Use Secure Design Patterns.mp4 272.14MB
038 - Activity Avoiding Common Security Design Flaws.mp4 39.30MB
039 - Design Software to Counter Specific Threats.mp4 311.84MB
040 - Design Software to Counter Specific Threats, Part 2.mp4 400.77MB
041 - Activity Identifying Threats and Countermeasures.mp4 70.82MB
042 - Follow Best Practices for Secure Coding.mp4 289.66MB
043 - Activity Researching Secure Coding Best Practices.mp4 190.55MB
044 - Prevent Memory Errors.mp4 193.04MB
045 - Prevent Memory Errors, Part 2.mp4 165.84MB
046 - Maintain Secure Formatting and Resource Access.mp4 250.61MB
047 - Activity Preventing a Race Condition.mp4 57.66MB
048 - Prevent Privacy Vulnerabilities.mp4 334.32MB
049 - Activity Handling Privacy Defects.mp4 61.75MB
050 - Prevent Platform Vulnerabilities, Part 1.mp4 268.46MB
051 - Prevent Platform Vulnerabilities, Part 2.mp4 343.94MB
052 - Activity Staging an XSS Attack on the Web App.mp4 149.35MB
053 - Prevent Mobile Platform Vulnerabilities.mp4 229.43MB
054 - Prevent Mobile Platform Vulnerabilities, Part 2.mp4 244.16MB
055 - Prevent IoT Platform Vulnerabilities.mp4 81.97MB
056 - Prevent Desktop Platform Vulnerabilities.mp4 233.47MB
057 - Limit Access Using Session Control.mp4 222.35MB
058 - Limit Access Using Session Control, Part 2.mp4 222.33MB
059 - Activity Handling Authentication and Authorization Defects.mp4 180.28MB
060 - Limit Access with User Accounts.mp4 266.40MB
061 - Protect Data with Cryptography.mp4 133.13MB
062 - Activity Having Fun with Symmetric Encryption.mp4 138.27MB
063 - Activity Having Fun with Asymmetric Encryption.mp4 119.13MB
064 - Extend Cryptosystems with PKI.mp4 204.27MB
065 - Extend Cryptosystems with PKI, Part 2.mp4 134.51MB
066 - Activity Protecting Data in Transit and at Rest.mp4 113.05MB
067 - Implement Error Handling and Logging.mp4 270.49MB
068 - Activity Reviewing Error Handling.mp4 55.48MB
069 - Activity Improving Error Handling.mp4 99.15MB
070 - Protect Sensitive Data and Functions, Part 1.mp4 239.21MB
071 - Protect Sensitive Data and Functions, Part 2.mp4 137.16MB
072 - Preparing Chrome to Tamper with a Website.mp4 56.28MB
073 - Activity Tampering with Website Data and Functions.mp4 154.42MB
074 - Protect Database Access.mp4 295.34MB
075 - Activity SQL Injection.mp4 210.17MB
076 - Activity SQL Injection, Part 2.mp4 114.92MB
077 - Perform Security Testing.mp4 313.13MB
078 - Analyze Code to Find Security Problems.mp4 104.90MB
079 - Activity Performing Code Analysis.mp4 86.42MB
080 - Use Automated Testing Tools to Find Security Problems.mp4 107.06MB
081 - Activity Using a Test Suite to Automate Unit Testing.mp4 52.99MB
082 - Monitor and Log Applications to Support Security.mp4 250.87MB
083 - Activity Monitoring and Logging a Deployed Application.mp4 85.67MB
084 - Maintain Security After Deployment.mp4 249.23MB
085 - Activity Analyzing Suspicious Binaries.mp4 140.14MB
086 - Course Summary.mp4 17.52MB
1 1.23MB
10 1.86MB
11 256.13KB
12 1.51MB
13 1.54MB
14 1.59MB
15 1.60MB
16 851.79KB
17 486.13KB
18 758.09KB
19 1.13MB
2 58.03KB
20 1.39MB
21 788.40KB
22 1.84MB
23 808.59KB
24 544.55KB
25 580.93KB
26 593.03KB
27 1.87MB
28 1.65MB
29 1.67MB
3 1.43MB
30 281.55KB
31 1.83MB
32 1.73MB
33 1.94MB
34 984.19KB
35 1.31MB
36 248.31KB
37 1.45MB
38 1.00MB
39 1.72MB
4 1.68MB
40 162.84KB
41 1.58MB
42 669.47KB
43 1.00MB
44 1.86MB
45 1.73MB
46 855.81KB
47 1.82MB
48 1.49MB
49 885.95KB
5 888.46KB
50 637.68KB
51 186.34KB
52 1.71MB
53 489.72KB
54 890.90KB
55 1.13MB
56 1.08MB
57 974.30KB
58 962.85KB
59 1.10MB
6 160.05KB
60 871.10KB
61 463.26KB
62 415.00KB
63 680.64KB
64 1.58MB
65 338.77KB
66 1.89MB
67 31.14KB
68 385.05KB
69 1.18MB
7 484.55KB
70 1.90MB
71 252.04KB
72 1.49MB
73 1.98MB
74 1.41MB
75 344.55KB
76 1.72MB
77 537.40KB
78 1.17MB
79 1.01MB
8 672.30KB
80 712.85KB
81 297.61KB
82 490.97KB
9 346.33KB
CSC-210 Lab Setup Guide.docx.pdf 468.19KB
CSC-210 Links.pdf 141.65KB
csclab.zip 431.40MB
Lab Troubleshooting.docx.pdf 2.89MB
TutsNode.com.txt 63B
Distribution statistics by country
Total 0
IP List List of IP addresses which were distributed this torrent