Pluralsight Secure Coding Using Components with Known Vulnerabilities\01.Course Overview\0101.Course Overview.mp4
[619b86b4aa49d31f]
|
5,328,345 |
CDF1AAFF |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\02.Using Components with Known Vulnerabilities\0201.Course and Module Introduction.mp4
[67de6f61abb0f1e8]
|
7,732,225 |
FEF4BF85 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\02.Using Components with Known Vulnerabilities\0202.Demo Finding Exploitable Components.mp4
[cf38c4c91595f37b]
|
15,867,628 |
BE2BD147 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\02.Using Components with Known Vulnerabilities\0203.What Is Using Components with Known Vulnerabilities.mp4
[fed1d2579e83513d]
|
9,708,183 |
6D73E981 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\02.Using Components with Known Vulnerabilities\0204.OWASP Top 10 2017 and Using Components with Known Vulnerabilities.mp4
[172ecee93cd3f330]
|
5,071,564 |
6CBB5D6F |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\02.Using Components with Known Vulnerabilities\0205.Software Life Cycle.mp4
[88e1cf6a544be31b]
|
3,947,587 |
D0A2F0D8 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\02.Using Components with Known Vulnerabilities\0206.Module Summary.mp4
[82671d5cfb223765]
|
2,033,411 |
9EF56525 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\03.Managing Unsupported or Out-of-date Commercial Software\0301.Module Introduction.mp4
[b82773fe3f1ac598]
|
2,380,958 |
5514A7F5 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\03.Managing Unsupported or Out-of-date Commercial Software\0302.Common Platform Enumeration (CPE).mp4
[331bdd3c1e0772bf]
|
4,833,972 |
28F67DD1 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\03.Managing Unsupported or Out-of-date Commercial Software\0303.Finding Published Vulnerabilities.mp4
[a682a2e3f937e6b2]
|
6,380,455 |
DD7EFB5C |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\03.Managing Unsupported or Out-of-date Commercial Software\0304.Virtual Patching.mp4
[d121771c97484332]
|
4,832,365 |
9F0C0CE3 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\03.Managing Unsupported or Out-of-date Commercial Software\0305.Demo Finding Vulnerabilities and Creating a Virtual Patch.mp4
[77b64bf83276ccee]
|
17,247,645 |
99BC724B |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\03.Managing Unsupported or Out-of-date Commercial Software\0306.Trust When Installing or Updating Components.mp4
[90e5f219440a4f6e]
|
3,086,218 |
5EC70EA2 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\03.Managing Unsupported or Out-of-date Commercial Software\0307.Demo Secure Installation of Node.js.mp4
[cbbf063732776c6]
|
14,115,556 |
FD0DFE51 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\03.Managing Unsupported or Out-of-date Commercial Software\0308.Module Summary.mp4
[697394f905b30e8a]
|
1,933,939 |
9B4AE747 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\04.Managing Bespoke Software That Uses Third Party Libraries\0401.Module Introduction.mp4
[24d4b07e636da3a]
|
2,391,735 |
1654AC1C |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\04.Managing Bespoke Software That Uses Third Party Libraries\0402.Versioning.mp4
[20c4d18f17eb3e60]
|
4,976,832 |
0AA38D3E |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\04.Managing Bespoke Software That Uses Third Party Libraries\0403.Software Composition Analysis.mp4
[eb2552629674d8bc]
|
5,984,410 |
5E33B6B3 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\04.Managing Bespoke Software That Uses Third Party Libraries\0404.Automatically Mapping Software Versions against Vulnerabilities.mp4
[731fd5d3831383b8]
|
2,985,596 |
13237082 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\04.Managing Bespoke Software That Uses Third Party Libraries\0405.Demo Automatically Mapping Software Versions against Vulnerabilities.mp4
[be63bc662144b5fa]
|
20,691,411 |
56DF92B9 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\04.Managing Bespoke Software That Uses Third Party Libraries\0406.Module Summary.mp4
[45874044881bcf41]
|
1,157,558 |
C72C74F1 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\05.Patch Management Process\0501.Module Introduction.mp4
[706e27d8ea108109]
|
735,909 |
93D010B8 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\05.Patch Management Process\0502.Hardening.mp4
[3e9efec12c7f0d10]
|
2,216,122 |
9FF61EA7 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\05.Patch Management Process\0503.Patch Management Process.mp4
[6b453e9e895d02f2]
|
2,725,751 |
932D7314 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\05.Patch Management Process\0504.Module and Course Summary.mp4
[4acc9491b45d26d3]
|
2,306,813 |
147539BF |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\Exercise Files\secure-coding-using-components-known-vulnerabilities.zip |
15,058,104 |
ABCC6356 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\01.Course Overview |
0 |
00000000 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\02.Using Components with Known Vulnerabilities |
0 |
00000000 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\03.Managing Unsupported or Out-of-date Commercial Software |
0 |
00000000 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\04.Managing Bespoke Software That Uses Third Party Libraries |
0 |
00000000 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\05.Patch Management Process |
0 |
00000000 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities\Exercise Files |
0 |
00000000 |
Pluralsight Secure Coding Using Components with Known Vulnerabilities |
0 |
00000000 |
|
Total size: |
165,730,292 |
|