Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585б |
0 |
452б |
005 - Introduction.mp4 |
23.71Мб |
006 - Identify Security Requirements and Expectations.mp4 |
309.53Мб |
007 - Activity - Identifying Security Requirements and Expectations.mp4 |
129.38Мб |
008 - Identify Factors that Undermine Software Security.mp4 |
219.73Мб |
009 - Identify Factors that Undermine Software Security, Part 2.mp4 |
93.34Мб |
010 - Find Vulnerabilities in Your Software.mp4 |
265.17Мб |
011 - Activity - Identifying Vulnerabilities in an Application.mp4 |
120.29Мб |
012 - Building and Breaking Passwords.mp4 |
183.00Мб |
013 - Activity - Adding a Security Feature to Your Code.mp4 |
75.62Мб |
014 - Activity - Protect Against a Poison Null Byte.mp4 |
95.55Мб |
015 - Activity - Hashing a Password.mp4 |
60.51Мб |
016 - Activity - Securing the Password Hash.mp4 |
60.02Мб |
017 - Activity - Saving Hashes for Future Use.mp4 |
58.59Мб |
018 - Activity - Validating a Password.mp4 |
54.83Мб |
019 - Activity - Having Fun With a Modern Hashing Algorithm.mp4 |
66.10Мб |
020 - Gather Intelligence on Vulnerabilities and Exploits.mp4 |
93.59Мб |
021 - Handle Vulnerabilities Due to Software Defects and Misconfiguration.mp4 |
338.57Мб |
022 - Handle Vulnerabilities Due to Software Defects and Misconfiguration, Part 2.mp4 |
271.75Мб |
023 - Handle Vulnerabilities Due to Software Defects and Misconfiguration, Part 3.mp4 |
192.69Мб |
024 - Activity Examining the Web App Functionality.mp4 |
200.06Мб |
025 - Activity Examining the Project Files for Security Concerns.mp4 |
225.42Мб |
026 - Handle Error Messaging.mp4 |
266.41Мб |
027 - Activity Identifying Software Defects and Misconfiguration.mp4 |
136.18Мб |
028 - Handle Vulnerabilities Due to Human Factors.mp4 |
263.53Мб |
029 - Handle Vulnerabilities Due to Human Factors, Part 2.mp4 |
119.52Мб |
030 - Activity Managing People Risks.mp4 |
145.00Мб |
031 - Handle Vulnerabilities Due to Process Shortcomings.mp4 |
251.26Мб |
032 - Handle Vulnerabilities Due to Process Shortcomings, Part 2.mp4 |
116.87Мб |
033 - Handle Vulnerabilities Due to Process Shortcomings, Part 3.mp4 |
224.13Мб |
034 - Activity Managing Software Development Process Risks.mp4 |
84.11Мб |
035 - Apply General Principles for Secure Design.mp4 |
191.76Мб |
036 - Apply General Principles for Secure Design, Part 2.mp4 |
121.82Мб |
037 - Use Secure Design Patterns.mp4 |
272.14Мб |
038 - Activity Avoiding Common Security Design Flaws.mp4 |
39.30Мб |
039 - Design Software to Counter Specific Threats.mp4 |
311.84Мб |
040 - Design Software to Counter Specific Threats, Part 2.mp4 |
400.77Мб |
041 - Activity Identifying Threats and Countermeasures.mp4 |
70.82Мб |
042 - Follow Best Practices for Secure Coding.mp4 |
289.66Мб |
043 - Activity Researching Secure Coding Best Practices.mp4 |
190.55Мб |
044 - Prevent Memory Errors.mp4 |
193.04Мб |
045 - Prevent Memory Errors, Part 2.mp4 |
165.84Мб |
046 - Maintain Secure Formatting and Resource Access.mp4 |
250.61Мб |
047 - Activity Preventing a Race Condition.mp4 |
57.66Мб |
048 - Prevent Privacy Vulnerabilities.mp4 |
334.32Мб |
049 - Activity Handling Privacy Defects.mp4 |
61.75Мб |
050 - Prevent Platform Vulnerabilities, Part 1.mp4 |
268.46Мб |
051 - Prevent Platform Vulnerabilities, Part 2.mp4 |
343.94Мб |
052 - Activity Staging an XSS Attack on the Web App.mp4 |
149.35Мб |
053 - Prevent Mobile Platform Vulnerabilities.mp4 |
229.43Мб |
054 - Prevent Mobile Platform Vulnerabilities, Part 2.mp4 |
244.16Мб |
055 - Prevent IoT Platform Vulnerabilities.mp4 |
81.97Мб |
056 - Prevent Desktop Platform Vulnerabilities.mp4 |
233.47Мб |
057 - Limit Access Using Session Control.mp4 |
222.35Мб |
058 - Limit Access Using Session Control, Part 2.mp4 |
222.33Мб |
059 - Activity Handling Authentication and Authorization Defects.mp4 |
180.28Мб |
060 - Limit Access with User Accounts.mp4 |
266.40Мб |
061 - Protect Data with Cryptography.mp4 |
133.13Мб |
062 - Activity Having Fun with Symmetric Encryption.mp4 |
138.27Мб |
063 - Activity Having Fun with Asymmetric Encryption.mp4 |
119.13Мб |
064 - Extend Cryptosystems with PKI.mp4 |
204.27Мб |
065 - Extend Cryptosystems with PKI, Part 2.mp4 |
134.51Мб |
066 - Activity Protecting Data in Transit and at Rest.mp4 |
113.05Мб |
067 - Implement Error Handling and Logging.mp4 |
270.49Мб |
068 - Activity Reviewing Error Handling.mp4 |
55.48Мб |
069 - Activity Improving Error Handling.mp4 |
99.15Мб |
070 - Protect Sensitive Data and Functions, Part 1.mp4 |
239.21Мб |
071 - Protect Sensitive Data and Functions, Part 2.mp4 |
137.16Мб |
072 - Preparing Chrome to Tamper with a Website.mp4 |
56.28Мб |
073 - Activity Tampering with Website Data and Functions.mp4 |
154.42Мб |
074 - Protect Database Access.mp4 |
295.34Мб |
075 - Activity SQL Injection.mp4 |
210.17Мб |
076 - Activity SQL Injection, Part 2.mp4 |
114.92Мб |
077 - Perform Security Testing.mp4 |
313.13Мб |
078 - Analyze Code to Find Security Problems.mp4 |
104.90Мб |
079 - Activity Performing Code Analysis.mp4 |
86.42Мб |
080 - Use Automated Testing Tools to Find Security Problems.mp4 |
107.06Мб |
081 - Activity Using a Test Suite to Automate Unit Testing.mp4 |
52.99Мб |
082 - Monitor and Log Applications to Support Security.mp4 |
250.87Мб |
083 - Activity Monitoring and Logging a Deployed Application.mp4 |
85.67Мб |
084 - Maintain Security After Deployment.mp4 |
249.23Мб |
085 - Activity Analyzing Suspicious Binaries.mp4 |
140.14Мб |
086 - Course Summary.mp4 |
17.52Мб |
1 |
1.23Мб |
10 |
1.86Мб |
11 |
256.13Кб |
12 |
1.51Мб |
13 |
1.54Мб |
14 |
1.59Мб |
15 |
1.60Мб |
16 |
851.79Кб |
17 |
486.13Кб |
18 |
758.09Кб |
19 |
1.13Мб |
2 |
58.03Кб |
20 |
1.39Мб |
21 |
788.40Кб |
22 |
1.84Мб |
23 |
808.59Кб |
24 |
544.55Кб |
25 |
580.93Кб |
26 |
593.03Кб |
27 |
1.87Мб |
28 |
1.65Мб |
29 |
1.67Мб |
3 |
1.43Мб |
30 |
281.55Кб |
31 |
1.83Мб |
32 |
1.73Мб |
33 |
1.94Мб |
34 |
984.19Кб |
35 |
1.31Мб |
36 |
248.31Кб |
37 |
1.45Мб |
38 |
1.00Мб |
39 |
1.72Мб |
4 |
1.68Мб |
40 |
162.84Кб |
41 |
1.58Мб |
42 |
669.47Кб |
43 |
1.00Мб |
44 |
1.86Мб |
45 |
1.73Мб |
46 |
855.81Кб |
47 |
1.82Мб |
48 |
1.49Мб |
49 |
885.95Кб |
5 |
888.46Кб |
50 |
637.68Кб |
51 |
186.34Кб |
52 |
1.71Мб |
53 |
489.72Кб |
54 |
890.90Кб |
55 |
1.13Мб |
56 |
1.08Мб |
57 |
974.30Кб |
58 |
962.85Кб |
59 |
1.10Мб |
6 |
160.05Кб |
60 |
871.10Кб |
61 |
463.26Кб |
62 |
415.00Кб |
63 |
680.64Кб |
64 |
1.58Мб |
65 |
338.77Кб |
66 |
1.89Мб |
67 |
31.14Кб |
68 |
385.05Кб |
69 |
1.18Мб |
7 |
484.55Кб |
70 |
1.90Мб |
71 |
252.04Кб |
72 |
1.49Мб |
73 |
1.98Мб |
74 |
1.41Мб |
75 |
344.55Кб |
76 |
1.72Мб |
77 |
537.40Кб |
78 |
1.17Мб |
79 |
1.01Мб |
8 |
672.30Кб |
80 |
712.85Кб |
81 |
297.61Кб |
82 |
490.97Кб |
9 |
346.33Кб |
CSC-210 Lab Setup Guide.docx.pdf |
468.19Кб |
CSC-210 Links.pdf |
141.65Кб |
csclab.zip |
431.40Мб |
Lab Troubleshooting.docx.pdf |
2.89Мб |
TutsNode.com.txt |
63б |