"Dont ask to ask, just ask" -- Skalman
  • Anonymous
  • 2025-01-25 08:46:25
  • Unknown

RELEASE >

ReScene version pyReScene Auto 0.7 XQZT File size CRC
Download
13,270
Stored files
630 9EBEBA5A
1,533 C30F510B
RAR-files
linkedin.learning.cert.prep.cyber.secure.coder.csc-110-xqzt.rar 600,000,000 4A28F418
linkedin.learning.cert.prep.cyber.secure.coder.csc-110-xqzt.r00 600,000,000 E30FB59B
linkedin.learning.cert.prep.cyber.secure.coder.csc-110-xqzt.r01 600,000,000 3411F9F2
linkedin.learning.cert.prep.cyber.secure.coder.csc-110-xqzt.r02 600,000,000 DF56E32A
linkedin.learning.cert.prep.cyber.secure.coder.csc-110-xqzt.r03 600,000,000 69D68398
linkedin.learning.cert.prep.cyber.secure.coder.csc-110-xqzt.r04 600,000,000 8C3B2206
linkedin.learning.cert.prep.cyber.secure.coder.csc-110-xqzt.r05 600,000,000 55395B5E
linkedin.learning.cert.prep.cyber.secure.coder.csc-110-xqzt.r06 600,000,000 18B1F54F
linkedin.learning.cert.prep.cyber.secure.coder.csc-110-xqzt.r07 600,000,000 E091A437
linkedin.learning.cert.prep.cyber.secure.coder.csc-110-xqzt.r08 600,000,000 6E2D3E08
linkedin.learning.cert.prep.cyber.secure.coder.csc-110-xqzt.r09 600,000,000 836B8A51
linkedin.learning.cert.prep.cyber.secure.coder.csc-110-xqzt.r10 600,000,000 685E9AED
linkedin.learning.cert.prep.cyber.secure.coder.csc-110-xqzt.r11 600,000,000 13B5188C
linkedin.learning.cert.prep.cyber.secure.coder.csc-110-xqzt.r12 600,000,000 AA96D481
linkedin.learning.cert.prep.cyber.secure.coder.csc-110-xqzt.r13 600,000,000 624572F5
linkedin.learning.cert.prep.cyber.secure.coder.csc-110-xqzt.r14 600,000,000 37BD5ED3
linkedin.learning.cert.prep.cyber.secure.coder.csc-110-xqzt.r15 600,000,000 57506510
linkedin.learning.cert.prep.cyber.secure.coder.csc-110-xqzt.r16 600,000,000 70411D87
linkedin.learning.cert.prep.cyber.secure.coder.csc-110-xqzt.r17 600,000,000 3B2D188E
linkedin.learning.cert.prep.cyber.secure.coder.csc-110-xqzt.r18 600,000,000 C55E3E7D
linkedin.learning.cert.prep.cyber.secure.coder.csc-110-xqzt.r19 112,311,134 36D0C7EE

Total size: 12,112,311,134
Archived files
01.01-overview.mkv [21fbee338d6e4009] 83,526,013 A1271EFD
02.01-prior_knowledge_and_expectations.mkv [1e051f45c177e078] 96,198,914 A9028E33
02.02-gather_software_requirements.mkv [35364f8693c12cff] 265,642,539 17D5D0D3
02.03-challenge_identity_requirements.mkv [52b530eb0ab19915] 41,473,225 F6C3B9E8
02.04-solution_identify_requirements.mkv [e664ec28a8d34d92] 166,990,285 FA39E4F8
02.05-factors_that_undermine_software_security.mkv [7533034436fc3c20] 216,739,368 DD19B749
02.06-software_vulnerabilities_and_attack_phases.mkv [789a9dca47a7fc7d] 198,394,577 595B5795
02.07-attack_patterns.mkv [701ca29a6cb65d33] 392,691,615 9A0490D1
02.08-challenge_find_vulnerabilities.mkv [e8820c883450898f] 64,576,358 679D2E76
02.09-solution_find_vulnerabilities.mkv [3c834964cb7bf17d] 211,901,414 FEF9179E
02.10-challenge_new_password_requirements.mkv [ae45ebc7eef59c15] 66,213,314 162C22FD
02.11-solution_new_password_requirements.mkv [31111f6384bd8007] 191,211,818 311AF834
02.12-challenge_hashing_passwords.mkv [cadda10bb8770762] 75,745,989 A9EB5304
02.13-solution_hashing_passwords.mkv [5ae85842ce375271] 382,561,820 A9C6A5A7
02.14-vulnerability_intelligence.mkv [e887d1a139bcbab4] 271,400,741 9432A316
02.15-challenge_vulnerability_search.mkv [bc0c547f217c903c] 82,378,361 97F7E3E2
02.16-solution_vulnerability_search.mkv [310425c006ba46af] 314,176,456 7D63E4E4
03.01-bugs_in_software.mkv [d648e341adafc171] 287,507,674 BD7CE553
03.02-external_libraries_and_services.mkv [5dc57efab7abfb65] 335,632,125 2B977FDD
03.03-handling_errors_securely.mkv [b23226d80bd93333] 356,230,132 7D2EDAF0
03.04-human-related_security.mkv [d543701643fc5169] 315,337,239 781219BB
03.05-security_requirements_and_design.mkv [8edb8897756f66bf] 217,423,271 7A141507
03.06-security_through_the_software_lifecycle.mkv [8506dc6b995d34aa] 337,655,782 D1097D1B
03.07-challenge_exploring_leftover_artifacts.mkv [8d8eb5be601686f9] 44,232,120 ABE7C8F5
03.08-solution_exploring_leftover_artifacts.mkv [4c5660e60e9bd933] 288,392,274 04B0172C
04.01-principles_of_secure_design.mkv [b40bc07fc88f7b88] 266,564,035 C3E429AB
04.02-avoid_common_mistakes.mkv [5d0d053053df8954] 328,502,953 05D27170
04.03-challenge_common_security_design_flaws.mkv [7269fb4655f7f4b9] 90,104,364 28D18042
04.04-solution_common_security_design_flaws.mkv [521448bff718b103] 329,266,775 2543AF58
04.05-understand_risk_and_threats.mkv [f798e29ffaad63ec] 264,941,966 77693CE3
04.06-risk_response_strategies.mkv [fbc0f045d4669efd] 254,528,908 F4BCC732
04.07-exploit_countermeasures.mkv [b19494d7d4b13f7e] 283,768,063 0AC264B3
05.01-guidelines_for_secure_coding.mkv [feae46a14070027b] 288,099,900 EE4C066D
05.02-buffer_overflows_and_prevention.mkv [6e9b2e53b38babba] 265,381,385 504DFFC6
05.03-race_conditions.mkv [9e4c1c83fdf84b8c] 206,220,143 A3F14D18
05.04-challenge_use_locks_to_remediate_race_condition.mkv [d84b926709770e0c] 119,333,544 F4EEA3D2
05.05-solution_use_locks_to_remediate_race_condition.mkv [d43c4abc8703b74b] 180,987,918 F058E182
05.06-owasp_top_ten_platform_vulnerabilities.mkv [c9595f0e65b47067] 214,355,831 C875745C
05.07-web_application_vulnerabilities_deep_dive.mkv [f09d988237d54d5b] 344,148,936 A0795FFB
05.08-mobile_application_vulnerabilities_deep_dive.mkv [631e67876ff825b5] 327,093,733 36DF5E90
05.09-iot_vulnerabilities_deep_dive.mkv [75f918e9b59c100e] 379,692,136 341BF006
05.10-desktop_vulnerabilities_deep_dive.mkv [300e28ca1449095b] 278,623,920 D42DEC95
05.11-privacy_vulnerability_defects.mkv [7ea90f93dbd159f8] 421,325,325 767BC195
06.01-secure_session_management.mkv [36a67df9a1109901] 245,256,008 C98EA4D6
06.02-users_protections_and_passwords.mkv [859195ac8fb929a1] 342,458,753 43C23EFB
06.03-encryption_and_data_protections.mkv [e29665f0cd13b2da] 346,523,728 9F600EFD
06.04-error_handling_and_protections.mkv [392347e1916638aa] 275,276,317 50BF2C7D
07.01-testing_software_for_security.mkv [d556a642bdcb33d3] 456,537,250 72CA83A9
07.02-monitoring_and_logging_of_production_applications.mkv [453543480eab95a8] 299,079,622 E10817E3

Total size: 12,112,304,937
RAR Recovery
Not Present
Labels UNKNOWN