FileMood

Download Lynda - Techniques for Developing Secure Software

Lynda Techniques for Developing Secure Software

Name

Lynda - Techniques for Developing Secure Software

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

174.9 MB

Total Files

42

Hash

5AC4A67F2E225EAAEF4ACCF3B636B6DB348D8F97

/01. Introduction/

01_01-Welcome.mp4

3.6 MB

/02. Understanding Software Security/

02_01-What is software security.mp4

2.8 MB

02_02-Significance of software security.mp4

5.2 MB

02_03-Software security vocabulary.mp4

3.0 MB

02_04-Software security risk management.mp4

3.8 MB

02_05-Software security resources.mp4

4.5 MB

/03. Software Security Threats/

03_01-Hardwarelevel threats.mp4

4.6 MB

03_02-Codelevel threats.mp4

4.3 MB

03_03-Detailed designlevel threats.mp4

4.9 MB

03_04-Architecturallevel threats.mp4

5.1 MB

03_05-Requirementslevel threats.mp4

4.2 MB

03_06-Threat modeling and tools.mp4

4.0 MB

/04. Secure Software Design/

04_01-Introduction to secure design.mp4

4.6 MB

04_02-Security tactics.mp4

4.0 MB

04_03-Security patterns.mp4

4.5 MB

04_04-Security vulnerabilities.mp4

5.4 MB

04_05-Architectural analysis for security.mp4

5.3 MB

04_06-Case study Setting the Stage.mp4

1.6 MB

04_07-Case study TacticOriented Architectural Analysis.mp4

4.2 MB

04_08-Case study PatternOriented Architectural Analysis.mp4

6.3 MB

04_09-Case study VulnerabilityOriented Architectural Analysis.mp4

4.7 MB

04_10-Software security antipatterns.mp4

5.5 MB

/05. Secure Coding/

05_01-Introduction to secure coding.mp4

3.3 MB

05_02-Buffer overflow attacks.mp4

4.9 MB

05_03-Buffer overflow countermeasures.mp4

5.1 MB

05_04-Broken authentication and session management.mp4

3.1 MB

05_05-Broken authentication and session management countermeasures.mp4

5.9 MB

05_06-Insecure direct object references.mp4

4.0 MB

05_07-Insecure direct object references countermeasures.mp4

2.3 MB

05_08-Sensitive information exposure.mp4

3.1 MB

05_09-Sensitive data exposure countermeasures.mp4

4.3 MB

05_10-Other secure coding best practices.mp4

6.2 MB

/06. Testing for Security/

06_01-Testing for security.mp4

3.3 MB

06_02-Static analysis.mp4

4.8 MB

06_03-Exploring tools for static analysis.mp4

4.7 MB

06_04-Dynamic analysis.mp4

4.4 MB

06_05-Exploring tools for dynamic analysis.mp4

4.3 MB

06_06-Penetration testing.mp4

4.3 MB

06_07-Exploring tools for penetration testing.mp4

2.4 MB

06_08-Vulnerability management.mp4

4.8 MB

06_09-Exploring tools for vulnerabilty management.mp4

1.4 MB

/07. Conclusion/

07_01-Next steps.mp4

2.3 MB

 

Total files 42


Copyright © 2025 FileMood.com