Application Security - The Complete Guide

0dayddl

U P L O A D E R
dfd9c475b116c8a16f6497c8366d105c.jpg


Application Security - The Complete Guide
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 5.29 GB​

Genre: eLearning Video | Duration: 67 lectures (9 hour, 3 mins) | Language: English [/center]


Developing security in the Software Development Life Cycle (SDLC)

What you'll learn

Learn how to become an application security champion.
What is the OWASP Top 10 and how to defend against those vulnerabilities.
Use of threat modeling to identify threats and mitigation in development features.
How to perform a threat model on an application.
How to perform a vulnerability scan of an application.
Rating security vulnerabilities using standard and open processes.
How to correct common security vulnerabilities in code.
How application security fits in an overall cyber security program
Building security in to the software development life cycle.

Requirements

Basic programming knowledge
Understanding of IT systems and how software is deployed in operational environments

Description

This course will familiarize you with the common vulnerabilities that plague developed code as outlined in publications like the OWASP Top 10 and SANS Top 25. You will understand what type of development behaviors lead to vulnerabilities and how to avoid those behaviors when creating secure code. You will learn how to perform a threat model on development features to understand what threats could impact your code, where they come from and how to mitigate them. You will also review and operate analysis tools that are available to developers in order to analyze their code and discover vulnerabilities, allowing you to correct them early in the development life cycle. Finally you will understand how application security fits in an overall cyber security program.

Who this course is for:

Software developers interested in developing more secure software.
Security practitioners
Software and security engineering leaders
Cyber security professionals

For More Courses Visit & Bookmark Your Preferred Language Blog
From Here: - - - - - - - -

Download Links

CVbFSHhK_o.jpg


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!

Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!

Free search engine download: Udemy - Application Security - The Complete Guide
 
Kommentar
537368816_que-es-udemy-analisis-opiniones.jpg

5.23 GB | 13min 38s | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English


Files Included :
1 Welcome to Understanding Application Security!.mp4 (3.75 MB)
1 Application Security Introduction.mp4 (129.05 MB)
2 Top 10s.mp4 (38.6 MB)
3 Application Security Terms and Definitions.mp4 (10.71 MB)
4 Application Security Goals.mp4 (43.31 MB)
5 Introduction to NIST.mp4 (60.67 MB)
6 Introduction to CSA.mp4 (25.41 MB)
1 Defense in Depth.mp4 (90.3 MB)
2 Roles and Terms in Cybersecurity.mp4 (58.07 MB)
3 API Security.mp4 (38.67 MB)
4 Content Security Policy (CSP).mp4 (21.49 MB)
5 Server Side Request Forgery - SSRF.mp4 (73.28 MB)
6 Vulnerability Management.mp4 (129.7 MB)
1 Broken Access Control.mp4 (10.86 MB)
10 Identification Failures Demo.mp4 (21.27 MB)
11 Software and Data Integrity Failures.mp4 (166.12 MB)
12 Security Logging and Monitoring Failures.mp4 (148.63 MB)
13 Cross Site Scripting (XSS).mp4 (137.69 MB)
14 XXS Demo.mp4 (22.57 MB)
2 Broken Access Control - Demo.mp4 (28.79 MB)
3 Cryptographic Failures.mp4 (177.97 MB)
4 1 Injection.mp4 (19.61 MB)
4 Injection.mp4 (13.76 MB)
5 Injection Demo.mp4 (68.26 MB)
6 Insecure Design.mp4 (137.2 MB)
7 Security Misconfiguration.mp4 (13.86 MB)
8 Vulnerable and Outdated Components.mp4 (124.54 MB)
9 Identification and Authentication Failures.mp4 (101.81 MB)
1 Introduction to Supply Chain Security.mp4 (11.96 MB)
2 Supply Chain Defenses.mp4 (176.26 MB)
3 Software Composition Analysis SCA.mp4 (180.51 MB)
4 Introducing SLSA.mp4 (90 MB)
5 Software Bill of Material - SBOM.mp4 (28.56 MB)
6 Dependency-Track and CycloneDX.mp4 (26.34 MB)
1 Introduction to Cloud.mp4 (24.53 MB)
10 Container Security.mp4 (11.19 MB)
11 Azure and GCP.mp4 (19.83 MB)
2 Cloud Security Concepts.mp4 (6.24 MB)
3 AWS Security Pillar.mp4 (15.37 MB)
4 AWS Identity and Access Management.mp4 (55.75 MB)
5 AWS Detection Controls.mp4 (10.63 MB)
6 AWS Infrastructure.mp4 (74.38 MB)
7 AWS Data Protection.mp4 (58.07 MB)
8 AWS Incident Response.mp4 (5.05 MB)
9 AWS Application Security.mp4 (5.56 MB)
1 Introduction to session management.mp4 (228.98 MB)
2 Web sessions.mp4 (13.51 MB)
3 JWT (JSON Web Token).mp4 (45.65 MB)
4 JWT Example.mp4 (10.61 MB)
5 JWE (JSON Web Encryption).mp4 (76.39 MB)
6 OAuth.mp4 (75.29 MB)
7 OpenID & OpenID Connect.mp4 (7.4 MB)
1 Risk Rating Introduction.mp4 (31.29 MB)
2 Risk Rating Demo.mp4 (21.41 MB)
3 Security Controls.mp4 (21.89 MB)
4 Introduction to Threat Modeling.mp4 (74.87 MB)
5 Type of Threat Modeling.mp4 (23.66 MB)
6 Introduction to Manual Threat Modeling.mp4 (132.72 MB)
7 Prepping for Microsoft Threat Model Tool.mp4 (13.8 MB)
8 Microsoft Threat Model Tool demo.mp4 (66.75 MB)
9 OWASP Threat Dragon demo.mp4 (30.83 MB)
1 Additional Methods of Threat Modeling.mp4 (8.02 MB)
2 Using DREAD.mp4 (13.3 MB)
3 Using MITRE ATT&CK.mp4 (82.92 MB)
4 Other Advanced Threat Modeling Techniques.mp4 (8.02 MB)
5 Attack Trees.mp4 (11.67 MB)
6 Attack Tree Demo.mp4 (6.53 MB)
7 Continuous Threat Modeling.mp4 (125.93 MB)
8 Threagile Demo.mp4 (94.96 MB)
9 Threat Modeling the Cloud.mp4 (6.93 MB)
1 Encryption Overview.mp4 (48.16 MB)
2 Encryption Use Cases.mp4 (211.59 MB)
3 Hashing Overview.mp4 (5.51 MB)
4 Hashing Demo.mp4 (10 MB)
5 PKI (Public Key Infrastructure).mp4 (171.08 MB)
6 Password Management.mp4 (25.58 MB)
7 Password Demo.mp4 (7.21 MB)
1 DevOps.mp4 (246.83 MB)
2 DevSecOps.mp4 (106.5 MB)
3 DevSecOps Design.mp4 (3.4 MB)
4 DevSecOps Code.mp4 (7.11 MB)
5 DevSecOps Analysis.mp4 (12.34 MB)
6 DevSecOps Build.mp4 (18.92 MB)
7 DevSecOps Operations.mp4 (5.02 MB)
8 Secure CICD.mp4 (11.82 MB)
9 Secure CICD Demo.mp4 (28.91 MB)
1 SAST (Static Application Security Testing).mp4 (91.66 MB)
10 Penetration Testing.mp4 (4.23 MB)
11 Fuzz Testing.mp4 (44.01 MB)
2 CodeQL Demo.mp4 (19.78 MB)
3 DAST (Dynamic Application Security Testing).mp4 (75.1 MB)
4 DAST Demo.mp4 (18.58 MB)
5 IAST (Interactive Application Security Testing).mp4 (3.79 MB)
6 ASPM (Application Security Posture Management).mp4 (88.07 MB)
7 ASPM Demo.mp4 (19.21 MB)
8 RASP (Runtime Application Self-Protection).mp4 (6.17 MB)
9 WAF (Web Application Firewall).mp4 (98.62 MB)
1 Conclusion.mp4 (15.37 MB)
]
Screenshot
OG7PN19t_o.jpg


AusFile
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
RapidGator
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten