File | Size |
---|
01.Integrate Security within DevOps/0101.The Course Overview.mp4 | 21.75 MB |
01.Integrate Security within DevOps/0102.Integrate Security for a DevOps World.mp4 | 9.25 MB |
01.Integrate Security within DevOps/0103.Risk Management in a Rapidly Changing World.mp4 | 12.14 MB |
01.Integrate Security within DevOps/0104.Key Principles and Benefits of Secure DevOps.mp4 | 11.27 MB |
01.Integrate Security within DevOps/0105.Business-Driven Security Strategies.mp4 | 6.55 MB |
01.Integrate Security within DevOps/0106.OWASP Security Guidelines.mp4 | 7.16 MB |
02.Applying Shift Left Security Approach/0201.Integrating Security Into CICD Pipeline.mp4 | 44.69 MB |
02.Applying Shift Left Security Approach/0202.Automated Security Testing.mp4 | 29.27 MB |
02.Applying Shift Left Security Approach/0203.Tools of the Trade.mp4 | 59.28 MB |
02.Applying Shift Left Security Approach/0204.Red and Blue Teams.mp4 | 29.54 MB |
03.Securing Development Practices/0301.Security Requirements.mp4 | 43.98 MB |
03.Securing Development Practices/0302.Architectural Considerations.mp4 | 16.81 MB |
03.Securing Development Practices/0303.Threat Modeling, Data Flow Diagrams, and Attack Surface.mp4 | 71.96 MB |
03.Securing Development Practices/0304.Identity and Access Management.mp4 | 35.23 MB |
03.Securing Development Practices/0305.Code Inspection.mp4 | 30.10 MB |
03.Securing Development Practices/0306.Environment Hardening.mp4 | 89.13 MB |
04.Security Verification in the Pipeline/0401.What Is Static Application Security Testing.mp4 | 28.83 MB |
04.Security Verification in the Pipeline/0402.Embed SAST into the CICD Pipeline.mp4 | 36.93 MB |
04.Security Verification in the Pipeline/0403.What Is Dynamic Application Security Testing.mp4 | 20.06 MB |
04.Security Verification in the Pipeline/0404.Embed DAST Into the Pipeline.mp4 | 61.15 MB |
04.Security Verification in the Pipeline/0405.Runtime Application Self-Protection (RASP) versus Interactive Application Security Testing (IAST).mp4 | 22.06 MB |
04.Security Verification in the Pipeline/0406.Software Composition Analysis.mp4 | 13.56 MB |
05.Deploy Secure Software/0501.Infrastructure as Code.mp4 | 48.15 MB |
05.Deploy Secure Software/0502.Key Management and Identity Management.mp4 | 26.08 MB |
05.Deploy Secure Software/0503.Chaos Monkey and Fuzz Testing.mp4 | 25.08 MB |
06.Security in System Monitoring/0601.Security Monitoring.mp4 | 49.10 MB |
06.Security in System Monitoring/0602.Governance, Risk, Compliance and Audit.mp4 | 39.97 MB |
06.Security in System Monitoring/0603.Incident Response and Forensics.mp4 | 70.70 MB |
Discuss.FreeTutorials.Us.html | 165.68 kB |
Exercise Files/exercise_files.zip | 12.34 MB |
FreeCoursesOnline.Me.html | 108.30 kB |
FreeTutorials.Eu.html | 102.23 kB |
How you can help Team-FTU.txt | 259.00 B |
Torrent Downloaded From GloDls.to.txt | 84.00 B |
[TGx]Downloaded from torrentgalaxy.org.txt | 524.00 B |