Torrent details for "Information and Cyber Security Literacy Developing Security Con" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
257.7 MB
Info Hash:
3C6C184204EFBFB03E62EF4886130D96EDA3B8AE
Added By:
Added:
Aug. 14, 2025, 12:21 a.m.
Stats:
|
(Last updated: Aug. 14, 2025, 12:46 a.m.)
| File | Size |
|---|---|
| Get Bonus Downloads Here.url | 180 bytes |
| 1. Why Security Starts with Awareness.mp4 | 35.0 MB |
| 1. Why Security Starts with Awareness.vtt | 6.1 KB |
| 2. Traditional SDLC vs. SSDLC.mp4 | 16.8 MB |
| 2. Traditional SDLC vs. SSDLC.vtt | 3.3 KB |
| 3. Shifting Left and Relative Costs for Fixing Defects.mp4 | 18.5 MB |
| 3. Shifting Left and Relative Costs for Fixing Defects.vtt | 6.2 KB |
| 4. SSDLC in Agile and DevOps Models.mp4 | 24.2 MB |
| 4. SSDLC in Agile and DevOps Models.vtt | 6.2 KB |
| 5. Software Quality Assurance Manager and Secure Software Assessor Role.mp4 | 15.5 MB |
| 5. Software Quality Assurance Manager and Secure Software Assessor Role.vtt | 6.5 KB |
| 6. Why Secure Coding Matters.mp4 | 6.7 MB |
| 6. Why Secure Coding Matters.vtt | 2.5 KB |
| 7. OWASP Top 10, SAST and DAST.mp4 | 10.7 MB |
| 7. OWASP Top 10, SAST and DAST.vtt | 4.2 KB |
| 8. DevSecOps Lifecycle Walkthrough.mp4 | 19.3 MB |
| 8. DevSecOps Lifecycle Walkthrough.vtt | 7.9 KB |
| 9. Real-world Discussion - CrowdStrike Outage.mp4 | 18.6 MB |
| 9. Real-world Discussion - CrowdStrike Outage.vtt | 5.4 KB |
| 1. 5G Security Implications.mp4 | 26.1 MB |
| 1. 5G Security Implications.vtt | 5.8 KB |
| 2. Securing ICS and SCADA Systems.mp4 | 16.8 MB |
| 2. Securing ICS and SCADA Systems.vtt | 4.2 KB |
| 3. Why IoT Devices are Hard to Secure.mp4 | 6.9 MB |
| 3. Why IoT Devices are Hard to Secure.vtt | 2.9 KB |
| 4. IoT Supply Chain Attacks and Examples.mp4 | 10.4 MB |
| 4. IoT Supply Chain Attacks and Examples.vtt | 4.7 KB |
| 5. Hardware Product Security Lifecycle and Threat Modeling.mp4 | 10.0 MB |
| 5. Hardware Product Security Lifecycle and Threat Modeling.vtt | 2.8 KB |
| 6. Securing Devices in the Field.mp4 | 13.4 MB |
| 6. Securing Devices in the Field.vtt | 5.0 KB |
| 7. What Product Teams Need to Do Differently.mp4 | 8.7 MB |
| 7. What Product Teams Need to Do Differently.vtt | 3.8 KB |
| Bonus Resources.txt | 70 bytes |
| playlist.m3u | 1.6 KB |
Name
DL
Uploader
Size
S/L
Added
-
257.7 MB
[1
/
3]
2025-08-14
| Uploaded by freecoursewb | Size 257.7 MB | Health [ 1 /3 ] | Added 2025-08-14 |
-
991.9 KB
[0
/
0]
2024-02-13
| Uploaded by FreeCourseWeb | Size 991.9 KB | Health [ 0 /0 ] | Added 2024-02-13 |
NOTE
SOURCE: Information and Cyber Security Literacy Developing Security Con
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×


