Filename | Size |
| 1. Introduction/01. Welcome.en.srt | 3.8 KB |
| 1. Introduction/01. Welcome.mp4 | 40.6 MB |
| 1. Introduction/02. Application security.en.srt | 7.4 KB |
| 1. Introduction/02. Application security.mp4 | 10.2 MB |
| 2. 1. Software Development Lifecycle/03. Development methodologies.en.srt | 10.7 KB |
| 2. 1. Software Development Lifecycle/03. Development methodologies.mp4 | 17.7 MB |
| 2. 1. Software Development Lifecycle/04. Maturity models.en.srt | 5.9 KB |
| 2. 1. Software Development Lifecycle/04. Maturity models.mp4 | 6.8 MB |
| 2. 1. Software Development Lifecycle/05. Operation, maintenance, and change management.en.srt | 5.3 KB |
| 2. 1. Software Development Lifecycle/05. Operation, maintenance, and change management.mp4 | 7.1 MB |
| 2. 1. Software Development Lifecycle/06. DevOps.en.srt | 6.9 KB |
| 2. 1. Software Development Lifecycle/06. DevOps.mp4 | 6.5 MB |
| 3. 2. Software Security Issues/07. Understanding cross-site scripting.en.srt | 9.6 KB |
| 3. 2. Software Security Issues/07. Understanding cross-site scripting.mp4 | 14 MB |
| 3. 2. Software Security Issues/08. Preventing SQL injection.en.srt | 9.3 KB |
| 3. 2. Software Security Issues/08. Preventing SQL injection.mp4 | 12 MB |
| 3. 2. Software Security Issues/09. Privilege escalation.en.srt | 3.8 KB |
| 3. 2. Software Security Issues/09. Privilege escalation.mp4 | 3.8 MB |
| 3. 2. Software Security Issues/10. Directory traversal.en.srt | 5.8 KB |
| 3. 2. Software Security Issues/10. Directory traversal.mp4 | 7.6 MB |
| 3. 2. Software Security Issues/11. Overflow attacks.en.srt | 5.8 KB |
| 3. 2. Software Security Issues/11. Overflow attacks.mp4 | 10.2 MB |
| 3. 2. Software Security Issues/12. Cookies.en.srt | 5.4 KB |
| 3. 2. Software Security Issues/12. Cookies.mp4 | 6.5 MB |
| 3. 2. Software Security Issues/13. Session hijacking.en.srt | 6.7 KB |
| 3. 2. Software Security Issues/13. Session hijacking.mp4 | 9.1 MB |
| 3. 2. Software Security Issues/14. Malicious add-ons.en.srt | 4.4 KB |
| 3. 2. Software Security Issues/14. Malicious add-ons.mp4 | 6.6 MB |
| 3. 2. Software Security Issues/15. Code execution attacks.en.srt | 4.7 KB |
| 3. 2. Software Security Issues/15. Code execution attacks.mp4 | 7.1 MB |
| 4. 3. Secure Coding Practices/16. Error and exception handling.en.srt | 6.3 KB |
| 4. 3. Secure Coding Practices/16. Error and exception handling.mp4 | 7.5 MB |
| 4. 3. Secure Coding Practices/17. Code repositories.en.srt | 10.6 KB |
| 4. 3. Secure Coding Practices/17. Code repositories.mp4 | 14.6 MB |
| 4. 3. Secure Coding Practices/18. Third-party code.en.srt | 8.4 KB |
| 4. 3. Secure Coding Practices/18. Third-party code.mp4 | 10.2 MB |
| 4. 3. Secure Coding Practices/19. Code signing.en.srt | 5.1 KB |
| 4. 3. Secure Coding Practices/19. Code signing.mp4 | 5.3 MB |
| 5. 4. Software Security Assessment/20. Risk analysis and mitigation.en.srt | 5.8 KB |
| 5. 4. Software Security Assessment/20. Risk analysis and mitigation.mp4 | 6.3 MB |
| 5. 4. Software Security Assessment/21. Software testing.en.srt | 5.4 KB |
| 5. 4. Software Security Assessment/21. Software testing.mp4 | 5 MB |
| 5. 4. Software Security Assessment/22. Acquired software.en.srt | 5.1 KB |
| 5. 4. Software Security Assessment/22. Acquired software.mp4 | 5.7 MB |
| 6. Conclusion/23. What's next.en.srt | 2.4 KB |
| 6. Conclusion/23. What's next.mp4 | 3.6 MB |