Общая информация
Название CertNexus Cyber Secure Coder
Тип
Размер 14.20Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[TGx]Downloaded from torrentgalaxy.to .txt 585б
0 452б
005 - Introduction.mp4 23.71Мб
006 - Identify Security Requirements and Expectations.mp4 309.53Мб
007 - Activity - Identifying Security Requirements and Expectations.mp4 129.38Мб
008 - Identify Factors that Undermine Software Security.mp4 219.73Мб
009 - Identify Factors that Undermine Software Security, Part 2.mp4 93.34Мб
010 - Find Vulnerabilities in Your Software.mp4 265.17Мб
011 - Activity - Identifying Vulnerabilities in an Application.mp4 120.29Мб
012 - Building and Breaking Passwords.mp4 183.00Мб
013 - Activity - Adding a Security Feature to Your Code.mp4 75.62Мб
014 - Activity - Protect Against a Poison Null Byte.mp4 95.55Мб
015 - Activity - Hashing a Password.mp4 60.51Мб
016 - Activity - Securing the Password Hash.mp4 60.02Мб
017 - Activity - Saving Hashes for Future Use.mp4 58.59Мб
018 - Activity - Validating a Password.mp4 54.83Мб
019 - Activity - Having Fun With a Modern Hashing Algorithm.mp4 66.10Мб
020 - Gather Intelligence on Vulnerabilities and Exploits.mp4 93.59Мб
021 - Handle Vulnerabilities Due to Software Defects and Misconfiguration.mp4 338.57Мб
022 - Handle Vulnerabilities Due to Software Defects and Misconfiguration, Part 2.mp4 271.75Мб
023 - Handle Vulnerabilities Due to Software Defects and Misconfiguration, Part 3.mp4 192.69Мб
024 - Activity Examining the Web App Functionality.mp4 200.06Мб
025 - Activity Examining the Project Files for Security Concerns.mp4 225.42Мб
026 - Handle Error Messaging.mp4 266.41Мб
027 - Activity Identifying Software Defects and Misconfiguration.mp4 136.18Мб
028 - Handle Vulnerabilities Due to Human Factors.mp4 263.53Мб
029 - Handle Vulnerabilities Due to Human Factors, Part 2.mp4 119.52Мб
030 - Activity Managing People Risks.mp4 145.00Мб
031 - Handle Vulnerabilities Due to Process Shortcomings.mp4 251.26Мб
032 - Handle Vulnerabilities Due to Process Shortcomings, Part 2.mp4 116.87Мб
033 - Handle Vulnerabilities Due to Process Shortcomings, Part 3.mp4 224.13Мб
034 - Activity Managing Software Development Process Risks.mp4 84.11Мб
035 - Apply General Principles for Secure Design.mp4 191.76Мб
036 - Apply General Principles for Secure Design, Part 2.mp4 121.82Мб
037 - Use Secure Design Patterns.mp4 272.14Мб
038 - Activity Avoiding Common Security Design Flaws.mp4 39.30Мб
039 - Design Software to Counter Specific Threats.mp4 311.84Мб
040 - Design Software to Counter Specific Threats, Part 2.mp4 400.77Мб
041 - Activity Identifying Threats and Countermeasures.mp4 70.82Мб
042 - Follow Best Practices for Secure Coding.mp4 289.66Мб
043 - Activity Researching Secure Coding Best Practices.mp4 190.55Мб
044 - Prevent Memory Errors.mp4 193.04Мб
045 - Prevent Memory Errors, Part 2.mp4 165.84Мб
046 - Maintain Secure Formatting and Resource Access.mp4 250.61Мб
047 - Activity Preventing a Race Condition.mp4 57.66Мб
048 - Prevent Privacy Vulnerabilities.mp4 334.32Мб
049 - Activity Handling Privacy Defects.mp4 61.75Мб
050 - Prevent Platform Vulnerabilities, Part 1.mp4 268.46Мб
051 - Prevent Platform Vulnerabilities, Part 2.mp4 343.94Мб
052 - Activity Staging an XSS Attack on the Web App.mp4 149.35Мб
053 - Prevent Mobile Platform Vulnerabilities.mp4 229.43Мб
054 - Prevent Mobile Platform Vulnerabilities, Part 2.mp4 244.16Мб
055 - Prevent IoT Platform Vulnerabilities.mp4 81.97Мб
056 - Prevent Desktop Platform Vulnerabilities.mp4 233.47Мб
057 - Limit Access Using Session Control.mp4 222.35Мб
058 - Limit Access Using Session Control, Part 2.mp4 222.33Мб
059 - Activity Handling Authentication and Authorization Defects.mp4 180.28Мб
060 - Limit Access with User Accounts.mp4 266.40Мб
061 - Protect Data with Cryptography.mp4 133.13Мб
062 - Activity Having Fun with Symmetric Encryption.mp4 138.27Мб
063 - Activity Having Fun with Asymmetric Encryption.mp4 119.13Мб
064 - Extend Cryptosystems with PKI.mp4 204.27Мб
065 - Extend Cryptosystems with PKI, Part 2.mp4 134.51Мб
066 - Activity Protecting Data in Transit and at Rest.mp4 113.05Мб
067 - Implement Error Handling and Logging.mp4 270.49Мб
068 - Activity Reviewing Error Handling.mp4 55.48Мб
069 - Activity Improving Error Handling.mp4 99.15Мб
070 - Protect Sensitive Data and Functions, Part 1.mp4 239.21Мб
071 - Protect Sensitive Data and Functions, Part 2.mp4 137.16Мб
072 - Preparing Chrome to Tamper with a Website.mp4 56.28Мб
073 - Activity Tampering with Website Data and Functions.mp4 154.42Мб
074 - Protect Database Access.mp4 295.34Мб
075 - Activity SQL Injection.mp4 210.17Мб
076 - Activity SQL Injection, Part 2.mp4 114.92Мб
077 - Perform Security Testing.mp4 313.13Мб
078 - Analyze Code to Find Security Problems.mp4 104.90Мб
079 - Activity Performing Code Analysis.mp4 86.42Мб
080 - Use Automated Testing Tools to Find Security Problems.mp4 107.06Мб
081 - Activity Using a Test Suite to Automate Unit Testing.mp4 52.99Мб
082 - Monitor and Log Applications to Support Security.mp4 250.87Мб
083 - Activity Monitoring and Logging a Deployed Application.mp4 85.67Мб
084 - Maintain Security After Deployment.mp4 249.23Мб
085 - Activity Analyzing Suspicious Binaries.mp4 140.14Мб
086 - Course Summary.mp4 17.52Мб
1 1.23Мб
10 1.86Мб
11 256.13Кб
12 1.51Мб
13 1.54Мб
14 1.59Мб
15 1.60Мб
16 851.79Кб
17 486.13Кб
18 758.09Кб
19 1.13Мб
2 58.03Кб
20 1.39Мб
21 788.40Кб
22 1.84Мб
23 808.59Кб
24 544.55Кб
25 580.93Кб
26 593.03Кб
27 1.87Мб
28 1.65Мб
29 1.67Мб
3 1.43Мб
30 281.55Кб
31 1.83Мб
32 1.73Мб
33 1.94Мб
34 984.19Кб
35 1.31Мб
36 248.31Кб
37 1.45Мб
38 1.00Мб
39 1.72Мб
4 1.68Мб
40 162.84Кб
41 1.58Мб
42 669.47Кб
43 1.00Мб
44 1.86Мб
45 1.73Мб
46 855.81Кб
47 1.82Мб
48 1.49Мб
49 885.95Кб
5 888.46Кб
50 637.68Кб
51 186.34Кб
52 1.71Мб
53 489.72Кб
54 890.90Кб
55 1.13Мб
56 1.08Мб
57 974.30Кб
58 962.85Кб
59 1.10Мб
6 160.05Кб
60 871.10Кб
61 463.26Кб
62 415.00Кб
63 680.64Кб
64 1.58Мб
65 338.77Кб
66 1.89Мб
67 31.14Кб
68 385.05Кб
69 1.18Мб
7 484.55Кб
70 1.90Мб
71 252.04Кб
72 1.49Мб
73 1.98Мб
74 1.41Мб
75 344.55Кб
76 1.72Мб
77 537.40Кб
78 1.17Мб
79 1.01Мб
8 672.30Кб
80 712.85Кб
81 297.61Кб
82 490.97Кб
9 346.33Кб
CSC-210 Lab Setup Guide.docx.pdf 468.19Кб
CSC-210 Links.pdf 141.65Кб
csclab.zip 431.40Мб
Lab Troubleshooting.docx.pdf 2.89Мб
TutsNode.com.txt 63б
Статистика распространения по странам
Всего 0
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент