Cert Nexus CyberSecure Coder Video Training Course download
Duration : 12 Hours
Size: 14.1 GB (4 PART DOWNLOAD)
PART-01
005 - Introduction
006 - Identify Security Requirements and Expectations
007 - Activity - Identifying Security Requirements and Expectations
008 - Identify Factors that Undermine Software Security
009 - Identify Factors that Undermine Software Security, Part 2
010 - Find Vulnerabilities in Your Software
011 - Activity - Identifying Vulnerabilities in an Application
012 - Building and Breaking Passwords
013 - Activity - Adding a Security Feature to Your Code
014 - Activity - Protect Against a Poison Null Byte
015 - Activity - Hashing a Password
016 - Activity - Securing the Password Hash
017 - Activity - Saving Hashes for Future Use
018 - Activity - Validating a Password
019 - Activity - Having Fun With a Modern Hashing Algorithm
020 - Gather Intelligence on Vulnerabilities and Exploits
021 - Handle Vulnerabilities Due to Software Defects and Misconfiguration
022 - Handle Vulnerabilities Due to Software Defects and Misconfiguration, Part 2
023 - Handle Vulnerabilities Due to Software Defects and Misconfiguration, Part 3
024 - Activity Examining the Web App Functionality
025 - Activity Examining the Project Files for Security Concerns
026 - Handle Error Messaging
027 - Activity Identifying Software Defects and Misconfiguration
PART-02
028 - Handle Vulnerabilities Due to Human Factors
029 - Handle Vulnerabilities Due to Human Factors, Part 2
030 - Activity Managing People Risks
031 - Handle Vulnerabilities Due to Process Shortcomings
032 - Handle Vulnerabilities Due to Process Shortcomings, Part 2
033 - Handle Vulnerabilities Due to Process Shortcomings, Part 3
034 - Activity Managing Software Development Process Risks
035 - Apply General Principles for Secure Design
036 - Apply General Principles for Secure Design, Part 2
037 - Use Secure Design Patterns
038 - Activity Avoiding Common Security Design Flaws
039 - Design Software to Counter Specific Threats
040 - Design Software to Counter Specific Threats, Part 2
041 - Activity Identifying Threats and Countermeasures
042 - Follow Best Practices for Secure Coding
043 - Activity Researching Secure Coding Best Practices
044 - Prevent Memory Errors
045 - Prevent Memory Errors, Part 2
046 - Maintain Secure Formatting and Resource Access
PART-03
047 - Activity Preventing a Race Condition
048 - Prevent Privacy Vulnerabilities
049 - Activity Handling Privacy Defects
050 - Prevent Platform Vulnerabilities, Part 1
051 - Prevent Platform Vulnerabilities, Part 2
052 - Activity Staging an XSS Attack on the Web App
053 - Prevent Mobile Platform Vulnerabilities
054 - Prevent Mobile Platform Vulnerabilities, Part 2
055 - Prevent IoT Platform Vulnerabilities
056 - Prevent Desktop Platform Vulnerabilities
057 - Limit Access Using Session Control
058 - Limit Access Using Session Control, Part 2
059 - Activity Handling Authentication and Authorization Defects
060 - Limit Access with User Accounts
061 - Protect Data with Cryptography
062 - Activity Having Fun with Symmetric Encryption
063 - Activity Having Fun with Asymmetric Encryption
064 - Extend Cryptosystems with PKI
065 - Extend Cryptosystems with PKI, Part 2
PART-04
066 - Activity Protecting Data in Transit and at Rest
067 - Implement Error Handling and Logging
068 - Activity Reviewing Error Handling
069 - Activity Improving Error Handling
070 - Protect Sensitive Data and Functions, Part 1
071 - Protect Sensitive Data and Functions, Part 2
072 - Preparing Chrome to Tamper with a Website
073 - Activity Tampering with Website Data and Functions
074 - Protect Database Access
075 - Activity SQL Injection
076 - Activity SQL Injection, Part 2
077 - Perform Security Testing
078 - Analyze Code to Find Security Problems
079 - Activity Performing Code Analysis
080 - Use Automated Testing Tools to Find Security Problems
081 - Activity Using a Test Suite to Automate Unit Testing
082 - Monitor and Log Applications to Support Security
083 - Activity Monitoring and Logging a Deployed Application
084 - Maintain Security After Deployment
085 - Activity Analyzing Suspicious Binaries
086 - Course Summary
CSC-210 Lab Setup Guide.docx.pdf
CSC-210 Links.pdf
Lab Troubleshooting.docx.pdf
csclab.zip
Cert Nexus CyberSecure Coder Video Training Course download
You can Instant Download a PDF file
After successful payment ,
This PDF File Contains Course Download links
You can Download This Course immediately from click that Links.