Cert Prep Cyber Secure Coder (CSC-110)
Focused View
9:57:28
12 View
01 - Overview.mp4
04:20
01 - Prior knowledge and expectations.mp4
04:50
02 - Gather software requirements.mp4
13:17
03 - Challenge Identity requirements.mp4
02:06
04 - Solution Identify requirements.mp4
08:18
05 - Factors that undermine software security.mp4
10:39
06 - Software vulnerabilities and attack phases.mp4
09:38
07 - Attack patterns.mp4
19:18
08 - Challenge Find vulnerabilities.mp4
03:08
09 - Solution Find vulnerabilities.mp4
10:18
10 - Challenge New password requirements.mp4
03:12
11 - Solution New password requirements.mp4
09:22
12 - Challenge Hashing passwords.mp4
03:42
13 - Solution Hashing passwords.mp4
19:01
14 - Vulnerability intelligence.mp4
13:13
15 - Challenge Vulnerability search.mp4
04:02
16 - Solution Vulnerability search.mp4
15:31
01 - Bugs in software.mp4
14:11
02 - External libraries and services.mp4
16:44
03 - Handling errors securely.mp4
17:28
04 - Human-related security.mp4
15:39
05 - Security requirements and design.mp4
10:34
06 - Security through the software lifecycle.mp4
17:00
07 - Challenge Exploring leftover artifacts.mp4
02:07
08 - Solution Exploring leftover artifacts.mp4
14:01
01 - Principles of secure design.mp4
13:26
02 - Avoid common mistakes.mp4
16:06
03 - Challenge Common security design flaws.mp4
04:25
04 - Solution Common security design flaws.mp4
16:19
05 - Understand risk and threats.mp4
13:06
06 - Risk response strategies.mp4
12:30
07 - Exploit countermeasures.mp4
13:57
01 - Guidelines for secure coding.mp4
14:16
02 - Buffer overflows and prevention.mp4
13:08
03 - Race conditions.mp4
10:09
04 - Challenge Use locks to remediate race condition.mp4
05:54
05 - Solution Use locks to remediate race condition.mp4
08:52
06 - OWASP top ten platform vulnerabilities.mp4
10:28
07 - Web application vulnerabilities deep dive.mp4
16:50
08 - Mobile application vulnerabilities deep dive.mp4
16:17
09 - IoT vulnerabilities deep dive.mp4
19:00
10 - Desktop vulnerabilities deep dive.mp4
13:37
11 - Privacy vulnerability defects.mp4
20:41
01 - Secure session management.mp4
12:12
02 - Users, protections, and passwords.mp4
16:42
03 - Encryption and data protections.mp4
17:01
04 - Error handling and protections.mp4
13:30
01 - Testing software for security.mp4
22:34
02 - Monitoring and logging of production applications.mp4
14:49
More details
User Reviews
Rating
average 0
Focused display
Category

ITProTV
View courses ITProTVWe created ITProTV [ITPro] because it is the IT training we wanted to have ourselves — engaging, conversational, affordable, and convenient.
- language english
- Training sessions 49
- duration 9:57:28
- English subtitles has
- Release Date 2024/04/26