2017
1:24 hours
├── 1. Introduction
│ ├── 01. Welcome.en.srt
│ ├── 01. Welcome.mp4
│ ├── 02. Application security.en.srt
│ └── 02. Application security.mp4
├── 2. 1. Software Development Lifecycle
│ ├── 03. Development methodologies.en.srt
│ ├── 03. Development methodologies.mp4
│ ├── 04. Maturity models.en.srt
│ ├── 04. Maturity models.mp4
│ ├── 05. Operation, maintenance, and change management.en.srt
│ ├── 05. Operation, maintenance, and change management.mp4
│ ├── 06. DevOps.en.srt
│ └── 06. DevOps.mp4
├── 3. 2. Software Security Issues
│ ├── 07. Understanding cross-site scripting.en.srt
│ ├── 07. Understanding cross-site scripting.mp4
│ ├── 08. Preventing SQL injection.en.srt
│ ├── 08. Preventing SQL injection.mp4
│ ├── 09. Privilege escalation.en.srt
│ ├── 09. Privilege escalation.mp4
│ ├── 10. Directory traversal.en.srt
│ ├── 10. Directory traversal.mp4
│ ├── 11. Overflow attacks.en.srt
│ ├── 11. Overflow attacks.mp4
│ ├── 12. Cookies.en.srt
│ ├── 12. Cookies.mp4
│ ├── 13. Session hijacking.en.srt
│ ├── 13. Session hijacking.mp4
│ ├── 14. Malicious add-ons.en.srt
│ ├── 14. Malicious add-ons.mp4
│ ├── 15. Code execution attacks.en.srt
│ └── 15. Code execution attacks.mp4
├── 4. 3. Secure Coding Practices
│ ├── 16. Error and exception handling.en.srt
│ ├── 16. Error and exception handling.mp4
│ ├── 17. Code repositories.en.srt
│ ├── 17. Code repositories.mp4
│ ├── 18. Third-party code.en.srt
│ ├── 18. Third-party code.mp4
│ ├── 19. Code signing.en.srt
│ └── 19. Code signing.mp4
├── 5. 4. Software Security Assessment
│ ├── 20. Risk analysis and mitigation.en.srt
│ ├── 20. Risk analysis and mitigation.mp4
│ ├── 21. Software testing.en.srt
│ ├── 21. Software testing.mp4
│ ├── 22. Acquired software.en.srt
│ └── 22. Acquired software.mp4
└── 6. Conclusion
├── 23. What’s next.en.srt
└── 23. What’s next.mp4