Companies Home Search Profile

Cert Prep Cyber Secure Coder (CSC-110)

Focused View

9:57:28

12 View
  • 01 - Overview.mp4
    04:20
  • 01 - Prior knowledge and expectations.mp4
    04:50
  • 02 - Gather software requirements.mp4
    13:17
  • 03 - Challenge Identity requirements.mp4
    02:06
  • 04 - Solution Identify requirements.mp4
    08:18
  • 05 - Factors that undermine software security.mp4
    10:39
  • 06 - Software vulnerabilities and attack phases.mp4
    09:38
  • 07 - Attack patterns.mp4
    19:18
  • 08 - Challenge Find vulnerabilities.mp4
    03:08
  • 09 - Solution Find vulnerabilities.mp4
    10:18
  • 10 - Challenge New password requirements.mp4
    03:12
  • 11 - Solution New password requirements.mp4
    09:22
  • 12 - Challenge Hashing passwords.mp4
    03:42
  • 13 - Solution Hashing passwords.mp4
    19:01
  • 14 - Vulnerability intelligence.mp4
    13:13
  • 15 - Challenge Vulnerability search.mp4
    04:02
  • 16 - Solution Vulnerability search.mp4
    15:31
  • 01 - Bugs in software.mp4
    14:11
  • 02 - External libraries and services.mp4
    16:44
  • 03 - Handling errors securely.mp4
    17:28
  • 04 - Human-related security.mp4
    15:39
  • 05 - Security requirements and design.mp4
    10:34
  • 06 - Security through the software lifecycle.mp4
    17:00
  • 07 - Challenge Exploring leftover artifacts.mp4
    02:07
  • 08 - Solution Exploring leftover artifacts.mp4
    14:01
  • 01 - Principles of secure design.mp4
    13:26
  • 02 - Avoid common mistakes.mp4
    16:06
  • 03 - Challenge Common security design flaws.mp4
    04:25
  • 04 - Solution Common security design flaws.mp4
    16:19
  • 05 - Understand risk and threats.mp4
    13:06
  • 06 - Risk response strategies.mp4
    12:30
  • 07 - Exploit countermeasures.mp4
    13:57
  • 01 - Guidelines for secure coding.mp4
    14:16
  • 02 - Buffer overflows and prevention.mp4
    13:08
  • 03 - Race conditions.mp4
    10:09
  • 04 - Challenge Use locks to remediate race condition.mp4
    05:54
  • 05 - Solution Use locks to remediate race condition.mp4
    08:52
  • 06 - OWASP top ten platform vulnerabilities.mp4
    10:28
  • 07 - Web application vulnerabilities deep dive.mp4
    16:50
  • 08 - Mobile application vulnerabilities deep dive.mp4
    16:17
  • 09 - IoT vulnerabilities deep dive.mp4
    19:00
  • 10 - Desktop vulnerabilities deep dive.mp4
    13:37
  • 11 - Privacy vulnerability defects.mp4
    20:41
  • 01 - Secure session management.mp4
    12:12
  • 02 - Users, protections, and passwords.mp4
    16:42
  • 03 - Encryption and data protections.mp4
    17:01
  • 04 - Error handling and protections.mp4
    13:30
  • 01 - Testing software for security.mp4
    22:34
  • 02 - Monitoring and logging of production applications.mp4
    14:49
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    We created ITProTV [ITPro] because it is the IT training we wanted to have ourselves — engaging, conversational, affordable, and convenient.
    • language english
    • Training sessions 49
    • duration 9:57:28
    • English subtitles has
    • Release Date 2024/04/26