CISSP- Software Development Security (2015)seeders: 0
leechers: 4
CISSP- Software Development Security (2015) (Size: 400.83 MB)
Description
CISSP® - Software Development Security By Lee Allen from Pluralsight
(3h 6m 33s) Introduction2m 20s Overview4m 33s Application Security36m 19s Overview1m 28s The Importance of Application Security11m 7s Governance7m 29s Controls, Versioning, and Change Control6m 41s Process Improvement7m 4s Personnel and Conclusion2m 26s Development Life Cycle31m 24s Introduction1m 36s Terminology and Introduction to SDLC4m 34s Injecting Security into the SDLC8m 58s Why Use Software Development Models?4m 45s Common Software Development Models7m 31s Agile Methodologies3m 6s Conclusion0m 51s Security Impact of Acquired Software20m 4s Introduction0m 47s Impact of Acquired Software8m 13s Governance10m 3s References and Conclusion1m 0s Software Threats26m 4s Introduction0m 45s Misconfigurations, Buffer Overflows, Injection4m 42s Path Traversal, Covert Channels, DOS, Trap Doors, Flaws9m 1s Social Engineering, Errors, XSS, Brute Force, CSRF5m 46s File Inclusion, Violations, Undocumented Functionality4m 12s Metadata and Conclusion1m 36s Programming Language Concepts and Concerns23m 17s Introduction1m 20s Programming Language Concepts7m 33s Introduction to Object Oriented Programming10m 39s Distributed Programming and Course Conclusion3m 42s Secure Coding and Security Control Concepts42m 31s Introduction1m 43s The Cause of Software Vulnerabilities3m 57s Defense in Depth and Input Validation4m 38s Outputs, Cryptography, and Fail Secure4m 41s Memory Protection, Architecture, and Code Review6m 0s Code Reuse, Security Testing, and Patching7m 6s Deployment and Well Defined Systems5m 23s Separation of Duties and Anti-malware4m 2s Audit Trails and Course Conclusion4m 58s Related Torrents
Sharing Widget |