RAR-files |
linkedin.learning.cissp.cert.prep.2021.8.software.development.security-xqzt.rar |
50,000,000 |
6E75CB53 |
linkedin.learning.cissp.cert.prep.2021.8.software.development.security-xqzt.r00 |
50,000,000 |
F5C014F5 |
linkedin.learning.cissp.cert.prep.2021.8.software.development.security-xqzt.r01 |
50,000,000 |
A0E08E0D |
linkedin.learning.cissp.cert.prep.2021.8.software.development.security-xqzt.r02 |
50,000,000 |
B27B1EA0 |
linkedin.learning.cissp.cert.prep.2021.8.software.development.security-xqzt.r03 |
50,000,000 |
445761C3 |
linkedin.learning.cissp.cert.prep.2021.8.software.development.security-xqzt.r04 |
50,000,000 |
D378F330 |
linkedin.learning.cissp.cert.prep.2021.8.software.development.security-xqzt.r05 |
50,000,000 |
33C4F4BC |
linkedin.learning.cissp.cert.prep.2021.8.software.development.security-xqzt.r06 |
50,000,000 |
69B5920D |
linkedin.learning.cissp.cert.prep.2021.8.software.development.security-xqzt.r07 |
50,000,000 |
35B3608D |
linkedin.learning.cissp.cert.prep.2021.8.software.development.security-xqzt.r08 |
50,000,000 |
EC47116C |
linkedin.learning.cissp.cert.prep.2021.8.software.development.security-xqzt.r09 |
50,000,000 |
F3B7BF04 |
linkedin.learning.cissp.cert.prep.2021.8.software.development.security-xqzt.r10 |
50,000,000 |
AB6C6483 |
linkedin.learning.cissp.cert.prep.2021.8.software.development.security-xqzt.r11 |
536,755 |
CFDF4F60 |
|
Total size: |
600,536,755 |
|
|
Archived
files |
01.01-software_development_security.mkv
[143b39e89ffa733a]
|
49,949,910 |
AC104719 |
01.02-what_you_need_to_know.mkv
[4438082fa03a1f00]
|
1,674,842 |
B7CEE2EA |
01.03-study_resources.mkv
[a98f85c55532d39a]
|
10,071,775 |
39BB3C5A |
02.01-software_platforms.mkv
[2f45c8185df7507e]
|
8,719,869 |
BB0ECC59 |
02.02-development_methodologies.mkv
[79848548ec1ace0d]
|
34,910,888 |
D9D33629 |
02.03-maturity_models.mkv
[87363e69d9a48c03]
|
12,211,408 |
FE4EE705 |
02.04-change_management.mkv
[bf823c71302ce90f]
|
16,584,165 |
0C90C046 |
02.05-automation_and_devops.mkv
[8e48c7022da2b15d]
|
11,862,975 |
3AA2D7CD |
02.06-programming_languages.mkv
[13f4b77e85e5557e]
|
9,463,586 |
AF2995B4 |
02.07-acquired_software.mkv
[345fd24465e6cd9e]
|
7,494,642 |
810F065E |
03.01-code_review.mkv
[98af0e1a2455a22a]
|
8,198,403 |
B219945E |
03.02-software_testing.mkv
[cb3c722cafb1b759]
|
9,150,667 |
1F87DCC4 |
03.03-code_security_tests.mkv
[cf474c8a8dce00c3]
|
5,200,692 |
2CC7B09C |
03.04-fuzz_testing.mkv
[8ed0263b5a824bb8]
|
20,823,738 |
55136866 |
03.05-code_repositories.mkv
[256e0b1afa664328]
|
20,018,591 |
3C74E533 |
03.06-application_management.mkv
[2055168e491a0977]
|
17,046,495 |
D13E97C4 |
03.07-third-party_code.mkv
[81a504efe69d3fca]
|
15,496,982 |
C49DB9D1 |
03.08-software_risk_analysis_and_mitigation.mkv
[107dd0b14ef207c6]
|
7,728,481 |
1E51EC25 |
04.01-owasp_top_ten.mkv
[38956f353e975c45]
|
19,289,021 |
7760581F |
04.02-application_security.mkv
[95c8edc843771458]
|
13,182,742 |
8FA041C5 |
04.03-preventing_sql_injection.mkv
[ec6134361da66d44]
|
13,130,398 |
73A05639 |
04.04-understanding_cross-site_scripting.mkv
[999953c771878144]
|
9,668,706 |
9784CCE3 |
04.05-request_forgery.mkv
[2718eb2fc4eed7f9]
|
14,087,159 |
B95CE3AB |
04.06-defending_against_directory_traversal.mkv
[499ab69762306c64]
|
10,263,486 |
0345B9C6 |
04.07-overflow_attacks.mkv
[720f26524c152e5e]
|
13,601,570 |
DAFDFFAF |
04.08-explaining_cookies_and_attachments.mkv
[be316292df9d1d41]
|
14,841,687 |
626AB3FC |
04.09-session_hijacking.mkv
[69c0025c8fe2a439]
|
13,144,081 |
8B94A2DD |
04.10-code_execution_attacks.mkv
[2d43c5b17e3cea2a]
|
9,082,853 |
EACC6E02 |
04.11-privilege_escalation.mkv
[e10e8ca22eb3c8bc]
|
4,889,757 |
F90F82E7 |
04.12-driver_manipulation.mkv
[f0183a84af1de894]
|
5,375,185 |
34DE7AEE |
04.13-memory_vulnerabiliities.mkv
[99cd8deb22de3092]
|
10,508,227 |
BC4322A5 |
04.14-race_condition_vulnerabilities.mkv
[cadcd6e7f8b7cd7a]
|
7,354,691 |
D6A3359B |
05.01-input_validation.mkv
[33625c37fff5c618]
|
9,674,197 |
0CEBE8ED |
05.02-parameterized_queries.mkv
[a45a2fb416b36a2]
|
10,676,078 |
A370F15E |
05.03-authenticationsession_management_issues.mkv
[7f6eed93c167f6a8]
|
4,927,053 |
74C769E8 |
05.04-output_encoding.mkv
[41ac31c23ec4a8e5]
|
10,021,406 |
6ED3B4F5 |
05.05-error_and_exception_handling.mkv
[b804beaa94cfab6f]
|
8,826,240 |
73A68BCB |
05.06-code_signing.mkv
[a0d66ef085b4ca5c]
|
8,155,241 |
34657DAD |
05.07-database_security.mkv
[1acf114be4e2934d]
|
11,889,983 |
F658C6E4 |
05.08-data_deidentification.mkv
[bad92bcad468443d]
|
11,933,142 |
B59E85CF |
05.09-data_obfuscation.mkv
[f83842c370774c72]
|
7,786,033 |
452E6875 |
06.01-what_is_the_cloud.mkv
[8563be67f2dc4c40]
|
14,933,498 |
FF26F25F |
06.02-cloud_computing_roles.mkv
[f7f52adec9c89161]
|
12,182,175 |
CF7655A3 |
06.03-drivers_for_cloud_computing.mkv
[b94510a81e49dcf]
|
11,540,527 |
19AE0D08 |
06.04-security_service_providers.mkv
[29b5ed91f5589efa]
|
11,171,124 |
AAB0C82F |
06.05-cloud_activities_and_the_cloud_reference_architecture.mkv
[cd255c00ee1d9812]
|
9,401,262 |
625B0E15 |
06.06-cloud_deployment_models.mkv
[6a9961773a2c58d]
|
10,003,901 |
E92D8F60 |
06.07-cloud_service_categories.mkv
[e8e3475bf3a42f]
|
19,103,874 |
9AB0C61A |
07.01-continuing_your_studies.mkv
[3d8e137f6aea847b]
|
3,278,626 |
A4D507F5 |
|
Total size: |
600,532,032 |
|
|