:Search:

Information and Cyber Security Literacy Developing Security Con

Torrent:
Info Hash: 3C6C184204EFBFB03E62EF4886130D96EDA3B8AE
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Type: Tutorials
Language: English
Category: Other
Size: 257.7 MB
Added: Aug. 14, 2025, 12:21 a.m.
Peers: Seeders: 1, Leechers: 3 (Last updated: 8 months ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 0 0 0
udp://exodus.desync.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 1 1 0
udp://tracker.torrent.eu.org:451/announce 0 1 0
udp://explodie.org:6969/announce 0 0 0
udp://tracker.birkenwald.de:6969/announce 0 1 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.therarbg.to:6969/announce 0 0 0
Files:
  1. Get Bonus Downloads Here.url 180 bytes
  2. 1. Why Security Starts with Awareness.mp4 35.0 MB
  3. 1. Why Security Starts with Awareness.vtt 6.1 KB
  4. 2. Traditional SDLC vs. SSDLC.mp4 16.8 MB
  5. 2. Traditional SDLC vs. SSDLC.vtt 3.3 KB
  6. 3. Shifting Left and Relative Costs for Fixing Defects.mp4 18.5 MB
  7. 3. Shifting Left and Relative Costs for Fixing Defects.vtt 6.2 KB
  8. 4. SSDLC in Agile and DevOps Models.mp4 24.2 MB
  9. 4. SSDLC in Agile and DevOps Models.vtt 6.2 KB
  10. 5. Software Quality Assurance Manager and Secure Software Assessor Role.mp4 15.5 MB
  11. 5. Software Quality Assurance Manager and Secure Software Assessor Role.vtt 6.5 KB
  12. 6. Why Secure Coding Matters.mp4 6.7 MB
  13. 6. Why Secure Coding Matters.vtt 2.5 KB
  14. 7. OWASP Top 10, SAST and DAST.mp4 10.7 MB
  15. 7. OWASP Top 10, SAST and DAST.vtt 4.2 KB
  16. 8. DevSecOps Lifecycle Walkthrough.mp4 19.3 MB
  17. 8. DevSecOps Lifecycle Walkthrough.vtt 7.9 KB
  18. 9. Real-world Discussion - CrowdStrike Outage.mp4 18.6 MB
  19. 9. Real-world Discussion - CrowdStrike Outage.vtt 5.4 KB
  20. 1. 5G Security Implications.mp4 26.1 MB
  21. 1. 5G Security Implications.vtt 5.8 KB
  22. 2. Securing ICS and SCADA Systems.mp4 16.8 MB
  23. 2. Securing ICS and SCADA Systems.vtt 4.2 KB
  24. 3. Why IoT Devices are Hard to Secure.mp4 6.9 MB
  25. 3. Why IoT Devices are Hard to Secure.vtt 2.9 KB
  26. 4. IoT Supply Chain Attacks and Examples.mp4 10.4 MB
  27. 4. IoT Supply Chain Attacks and Examples.vtt 4.7 KB
  28. 5. Hardware Product Security Lifecycle and Threat Modeling.mp4 10.0 MB
  29. 5. Hardware Product Security Lifecycle and Threat Modeling.vtt 2.8 KB
  30. 6. Securing Devices in the Field.mp4 13.4 MB
  31. 6. Securing Devices in the Field.vtt 5.0 KB
  32. 7. What Product Teams Need to Do Differently.mp4 8.7 MB
  33. 7. What Product Teams Need to Do Differently.vtt 3.8 KB
  34. Bonus Resources.txt 70 bytes
  35. playlist.m3u 1.6 KB

Discussion