Details for this torrent 

Lynda - CISSP Cert Prep 8 Software Development Security
Type:
Other > E-books
Files:
46
Size:
224.13 MiB (235021526 Bytes)
Texted language(s):
English
Tag(s):
lynda
Uploaded:
2017-05-09 18:29:54 GMT
By:
MR-ZOPR
Seeders:
2
Leechers:
0
Comments
0  

Info Hash:
96B5279DA9BBC32FA20C515AAFE47D7DFA41DD1B




(Problems with magnets links are fixed by upgrading your torrent client!)
Date: 05/09/2017
Course #: 557997
Type: Security
Published: 5/5/2017
Modified: N/A
Author: Mike Chapple
Duration: 1h 24m
Skill: Advanced

Prepare for the Certified Information Systems Security
Professional (CISSP) exam by bolstering your knowledge of
software development security practices. In this course, follow
Mike Chapple as he walks through each topic in the eighth domain of
the CISSP examSoftware Development Security. He covers the
software development lifecycle and common software security
issues, such as cookies, session hijacking, and code
execution attacks. Mike also discusses secure coding
practices and software security assessment

1. Introduction/01. Welcome.mp440.63 MiB
1. Introduction/02. Application security.mp410.21 MiB
1. Introduction/02. Application security.en.srt7.37 KiB
1. Introduction/01. Welcome.en.srt3.8 KiB
2. 1. Software Development Lifecycle/03. Development methodologies.mp417.67 MiB
2. 1. Software Development Lifecycle/05. Operation, maintenance, and change management.mp47.08 MiB
2. 1. Software Development Lifecycle/04. Maturity models.mp46.84 MiB
2. 1. Software Development Lifecycle/06. DevOps.mp46.5 MiB
2. 1. Software Development Lifecycle/03. Development methodologies.en.srt10.7 KiB
2. 1. Software Development Lifecycle/06. DevOps.en.srt6.85 KiB
2. 1. Software Development Lifecycle/04. Maturity models.en.srt5.86 KiB
2. 1. Software Development Lifecycle/05. Operation, maintenance, and change management.en.srt5.34 KiB
3. 2. Software Security Issues/07. Understanding cross-site scripting.mp414.02 MiB
3. 2. Software Security Issues/08. Preventing SQL injection.mp411.95 MiB
3. 2. Software Security Issues/11. Overflow attacks.mp410.22 MiB
3. 2. Software Security Issues/13. Session hijacking.mp49.1 MiB
3. 2. Software Security Issues/10. Directory traversal.mp47.63 MiB
3. 2. Software Security Issues/15. Code execution attacks.mp47.06 MiB
3. 2. Software Security Issues/14. Malicious add-ons.mp46.63 MiB
3. 2. Software Security Issues/12. Cookies.mp46.49 MiB
3. 2. Software Security Issues/09. Privilege escalation.mp43.79 MiB
3. 2. Software Security Issues/07. Understanding cross-site scripting.en.srt9.6 KiB
3. 2. Software Security Issues/08. Preventing SQL injection.en.srt9.32 KiB
3. 2. Software Security Issues/13. Session hijacking.en.srt6.72 KiB
3. 2. Software Security Issues/10. Directory traversal.en.srt5.78 KiB
3. 2. Software Security Issues/11. Overflow attacks.en.srt5.77 KiB
3. 2. Software Security Issues/12. Cookies.en.srt5.38 KiB
3. 2. Software Security Issues/15. Code execution attacks.en.srt4.74 KiB
3. 2. Software Security Issues/14. Malicious add-ons.en.srt4.39 KiB
3. 2. Software Security Issues/09. Privilege escalation.en.srt3.79 KiB
4. 3. Secure Coding Practices/17. Code repositories.mp414.64 MiB
4. 3. Secure Coding Practices/18. Third-party code.mp410.16 MiB
4. 3. Secure Coding Practices/16. Error and exception handling.mp47.46 MiB
4. 3. Secure Coding Practices/19. Code signing.mp45.28 MiB
4. 3. Secure Coding Practices/17. Code repositories.en.srt10.63 KiB
4. 3. Secure Coding Practices/18. Third-party code.en.srt8.38 KiB
4. 3. Secure Coding Practices/16. Error and exception handling.en.srt6.34 KiB
4. 3. Secure Coding Practices/19. Code signing.en.srt5.08 KiB
5. 4. Software Security Assessment/20. Risk analysis and mitigation.mp46.3 MiB
5. 4. Software Security Assessment/22. Acquired software.mp45.71 MiB
5. 4. Software Security Assessment/21. Software testing.mp45.02 MiB
5. 4. Software Security Assessment/20. Risk analysis and mitigation.en.srt5.84 KiB
5. 4. Software Security Assessment/21. Software testing.en.srt5.38 KiB
5. 4. Software Security Assessment/22. Acquired software.en.srt5.14 KiB
6. Conclusion/23. What's next.mp43.62 MiB
6. Conclusion/23. What's next.en.srt2.44 KiB