[CourserHub.com] Coursera - Secure Software Design Specialization

mp4   Hot:29   Size:2.12 GB   Created:2023-05-30 09:20:01   Update:2024-07-21 08:19:25  

File List

  • 0. Websites you may like/[CourserHub.com].url 123 B
    Readme.txt 51 B
    software-design-abstraction/01_who-needs-abstractions/01_intro-to-design-as-an-abstraction/01_intro-to-design-as-an-abstraction.en.srt 8.65 KB
    software-design-abstraction/01_who-needs-abstractions/01_intro-to-design-as-an-abstraction/01_intro-to-design-as-an-abstraction.en.txt 5.4 KB
    software-design-abstraction/01_who-needs-abstractions/01_intro-to-design-as-an-abstraction/01_intro-to-design-as-an-abstraction.mp4 40.27 MB
    software-design-abstraction/01_who-needs-abstractions/01_intro-to-design-as-an-abstraction/02_additional-resource_instructions.html 1.07 KB
    software-design-abstraction/01_who-needs-abstractions/02_the-birds-eye-view/01_the-birds-eye-view.en.srt 10.78 KB
    software-design-abstraction/01_who-needs-abstractions/02_the-birds-eye-view/01_the-birds-eye-view.en.txt 6.85 KB
    software-design-abstraction/01_who-needs-abstractions/02_the-birds-eye-view/01_the-birds-eye-view.mp4 43.67 MB
    software-design-abstraction/01_who-needs-abstractions/02_the-birds-eye-view/02_additional-resource_abstraction.html 7.06 KB
    software-design-abstraction/01_who-needs-abstractions/02_the-birds-eye-view/02_additional-resource_instructions.html 1.2 KB
    software-design-abstraction/02_focus-on-the-users/01_user-interface-design/01_user-interface-design.en.srt 11.25 KB
    software-design-abstraction/02_focus-on-the-users/01_user-interface-design/01_user-interface-design.en.txt 6.94 KB
    software-design-abstraction/02_focus-on-the-users/01_user-interface-design/01_user-interface-design.mp4 57.46 MB
    software-design-abstraction/02_focus-on-the-users/01_user-interface-design/02_additional-resource_instructions.html 1.1 KB
    software-design-abstraction/02_focus-on-the-users/02_user-experience/01_user-experience.en.srt 10.74 KB
    software-design-abstraction/02_focus-on-the-users/02_user-experience/01_user-experience.en.txt 6.64 KB
    software-design-abstraction/02_focus-on-the-users/02_user-experience/01_user-experience.mp4 47.52 MB
    software-design-abstraction/02_focus-on-the-users/02_user-experience/02_additional-resource_instructions.html 1.14 KB
    software-design-abstraction/03_what-if-there-are-no-users/01_back-end-design/01_back-end-design.en.srt 12.82 KB
    software-design-abstraction/03_what-if-there-are-no-users/01_back-end-design/01_back-end-design.en.txt 7.76 KB
    software-design-abstraction/03_what-if-there-are-no-users/01_back-end-design/01_back-end-design.mp4 61.47 MB
    software-design-abstraction/03_what-if-there-are-no-users/01_back-end-design/02_additional-resource_instructions.html 1.22 KB
    software-design-abstraction/03_what-if-there-are-no-users/02_database-design/01_database-design.en.srt 8.79 KB
    software-design-abstraction/03_what-if-there-are-no-users/02_database-design/01_database-design.en.txt 5.37 KB
    software-design-abstraction/03_what-if-there-are-no-users/02_database-design/01_database-design.mp4 37.8 MB
    software-design-abstraction/03_what-if-there-are-no-users/02_database-design/02_additional-resource_instructions.html 1.17 KB
    software-design-abstraction/04_advanced-database-design/01_database-design-ii/01_database-design-ii.en.srt 11.29 KB
    software-design-abstraction/04_advanced-database-design/01_database-design-ii/01_database-design-ii.en.txt 7.13 KB
    software-design-abstraction/04_advanced-database-design/01_database-design-ii/01_database-design-ii.mp4 44.3 MB
    software-design-abstraction/04_advanced-database-design/01_database-design-ii/02_additional-resource_instructions.html 1.31 KB
    software-design-abstraction/04_advanced-database-design/01_database-design-ii/02_additional-resource_second-normal-form.htm 33.88 KB
    software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/01_database-design-iii-and-overall-database-security.en.srt 11.87 KB
    software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/01_database-design-iii-and-overall-database-security.en.txt 7.43 KB
    software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/01_database-design-iii-and-overall-database-security.mp4 56.26 MB
    software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/02_additional-reading_DataConsiten_Norm3NF.html 20.72 KB
    software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/02_additional-reading_index.html 43.91 KB
    software-design-abstraction/04_advanced-database-design/02_database-design-iii-and-overall-database-security/02_additional-reading_instructions.html 1.48 KB
    software-design-abstraction/05_the-good-and-bad-of-design-patterns/01_design-patterns/01_design-patterns.en.srt 7.34 KB
    software-design-abstraction/05_the-good-and-bad-of-design-patterns/01_design-patterns/01_design-patterns.en.txt 4.49 KB
    software-design-abstraction/05_the-good-and-bad-of-design-patterns/01_design-patterns/01_design-patterns.mp4 41.92 MB
    software-design-abstraction/05_the-good-and-bad-of-design-patterns/01_design-patterns/02_additional-resource_instructions.html 1.1 KB
    software-design-abstraction/05_the-good-and-bad-of-design-patterns/02_the-mindless-cobbling-together-of-existing-capabilities/01_the-mindless-cobbling-together-of-existing-capabilities.en.srt 3.67 KB
    software-design-abstraction/05_the-good-and-bad-of-design-patterns/02_the-mindless-cobbling-together-of-existing-capabilities/01_the-mindless-cobbling-together-of-existing-capabilities.en.txt 2.22 KB
    software-design-abstraction/05_the-good-and-bad-of-design-patterns/02_the-mindless-cobbling-together-of-existing-capabilities/01_the-mindless-cobbling-together-of-existing-capabilities.mp4 15.66 MB
    software-design-abstraction/05_the-good-and-bad-of-design-patterns/02_the-mindless-cobbling-together-of-existing-capabilities/02_additional-resource_instructions.html 1.36 KB
    software-design-abstraction/06_language-choices/01_languages-and-operating-systems/01_languages-and-operating-systems.en.srt 5.9 KB
    software-design-abstraction/06_language-choices/01_languages-and-operating-systems/01_languages-and-operating-systems.en.txt 3.68 KB
    software-design-abstraction/06_language-choices/01_languages-and-operating-systems/01_languages-and-operating-systems.mp4 29.7 MB
    software-design-abstraction/06_language-choices/01_languages-and-operating-systems/02_additional-resource_instructions.html 1.05 KB
    software-design-abstraction/06_language-choices/02_operating-system-selection/01_operating-system-selection.en.srt 11.14 KB
    software-design-abstraction/06_language-choices/02_operating-system-selection/01_operating-system-selection.en.txt 6.84 KB
    software-design-abstraction/06_language-choices/02_operating-system-selection/01_operating-system-selection.mp4 54.6 MB
    software-design-abstraction/06_language-choices/02_operating-system-selection/02_additional-resource_instructions.html 1.12 KB
    software-design-development-life-cycle/01_design-is-a-thoughtful-process/01_introduction-to-secure-software-design/01_introduction-to-software-design.en.srt 8.39 KB
    software-design-development-life-cycle/01_design-is-a-thoughtful-process/01_introduction-to-secure-software-design/01_introduction-to-software-design.en.txt 5.34 KB
    software-design-development-life-cycle/01_design-is-a-thoughtful-process/01_introduction-to-secure-software-design/01_introduction-to-software-design.mp4 48.25 MB
    software-design-development-life-cycle/01_design-is-a-thoughtful-process/01_introduction-to-secure-software-design/02_additional-resource_instructions.html 1.42 KB
    software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/01_thinking.en.srt 17.83 KB
    software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/01_thinking.en.txt 10.93 KB
    software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/01_thinking.mp4 92.51 MB
    software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/02_additional-resource_instructions.html 1.22 KB
    software-design-development-life-cycle/01_design-is-a-thoughtful-process/02_thinking/03_introduction-to-secure-software-design_quiz.html 7.88 KB
    software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/01_whats-an-sdlc.en.srt 17.78 KB
    software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/01_whats-an-sdlc.en.txt 11.16 KB
    software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/01_whats-an-sdlc.mp4 66.78 MB
    software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/02_additional-resource_instructions.html 1.05 KB
    software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/01_whats-an-sdlc/02_additional-resource_sdlc_overview.htm 34.21 KB
    software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/02_what-happens-in-design/01_what-happens-in-design.en.srt 7.54 KB
    software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/02_what-happens-in-design/01_what-happens-in-design.en.txt 4.79 KB
    software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/02_what-happens-in-design/01_what-happens-in-design.mp4 40.13 MB
    software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/02_what-happens-in-design/02_additional-resource_instructions.html 1.04 KB
    software-design-development-life-cycle/02_how-design-fits-into-the-flow-of-software-development/02_what-happens-in-design/03_how-design-fits_quiz.html 7.73 KB
    software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/01_design-in-different-sdlcs/01_design-in-different-sdlcs.en.srt 21.32 KB
    software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/01_design-in-different-sdlcs/01_design-in-different-sdlcs.en.txt 13.22 KB
    software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/01_design-in-different-sdlcs/01_design-in-different-sdlcs.mp4 99.87 MB
    software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/01_design-in-different-sdlcs/02_additional-resource_instructions.html 1.03 KB
    software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/01_interfacing-with-requirements-and-implementation.en.srt 17.41 KB
    software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/01_interfacing-with-requirements-and-implementation.en.txt 10.82 KB
    software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/01_interfacing-with-requirements-and-implementation.mp4 85.87 MB
    software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/02_additional-resource_instructions.html 1.22 KB
    software-design-development-life-cycle/03_design-in-the-context-of-different-sdlc-s/02_interfacing-with-requirements-and-implementation/03_design-in-the-context-of-different-sdlc-s_quiz.html 7.69 KB
    software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/01_the-role-of-architecture-in-design/01_the-role-of-architecture-in-design.en.srt 7.82 KB
    software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/01_the-role-of-architecture-in-design/01_the-role-of-architecture-in-design.en.txt 4.98 KB
    software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/01_the-role-of-architecture-in-design/01_the-role-of-architecture-in-design.mp4 32.68 MB
    software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/01_the-role-of-architecture-in-design/02_additional-resource_e_dta-sw-design-high-level.php 783 B
    software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/01_the-role-of-architecture-in-design/02_additional-resource_instructions.html 1.08 KB
    software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/02_permitted-activities-that-can-cause-problems/01_permitted-activities-that-can-cause-problems.en.srt 14.14 KB
    software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/02_permitted-activities-that-can-cause-problems/01_permitted-activities-that-can-cause-problems.en.txt 8.44 KB
    software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/02_permitted-activities-that-can-cause-problems/01_permitted-activities-that-can-cause-problems.mp4 68.13 MB
    software-design-development-life-cycle/04_how-high-level-design-or-architecture-handles-security-problems/02_permitted-activities-that-can-cause-problems/02_how-high-level-design-or-architecture-handles-security-problems_quiz.html 8.46 KB
    software-design-development-life-cycle/05_final-exam/01_final-exam/01_assessment-1_exam.html 7.85 KB
    software-design-development-life-cycle/05_final-exam/01_final-exam/02_assessment-2_exam.html 7.47 KB
    software-design-development-life-cycle/05_final-exam/01_final-exam/03_assessment-3_exam.html 8.17 KB
    software-design-development-life-cycle/05_final-exam/01_final-exam/04_assessment-4_exam.html 7.69 KB
    software-design-development-life-cycle/05_final-exam/01_final-exam/05_assessment-5_exam.html 8.21 KB
    software-design-methods-tools/01_general-design-notions/01_intro-to-design-methods-and-tools/01_intro-to-design-methods-and-tools.en.srt 4.46 KB
    software-design-methods-tools/01_general-design-notions/01_intro-to-design-methods-and-tools/01_intro-to-design-methods-and-tools.en.txt 2.71 KB
    software-design-methods-tools/01_general-design-notions/01_intro-to-design-methods-and-tools/01_intro-to-design-methods-and-tools.mp4 22.92 MB
    software-design-methods-tools/01_general-design-notions/01_intro-to-design-methods-and-tools/02_additional-resource_instructions.html 1.06 KB
    software-design-methods-tools/01_general-design-notions/02_jackson-structured-design/01_jackson-structured-design.en.srt 6.07 KB
    software-design-methods-tools/01_general-design-notions/02_jackson-structured-design/01_jackson-structured-design.en.txt 3.82 KB
    software-design-methods-tools/01_general-design-notions/02_jackson-structured-design/01_jackson-structured-design.mp4 19.79 MB
    software-design-methods-tools/01_general-design-notions/02_jackson-structured-design/02_additional-resource_instructions.html 1.16 KB
    software-design-methods-tools/01_general-design-notions/02_jackson-structured-design/02_additional-resource_ourusoff--introduction_to_jackson_design_method.pdf 971.85 KB
    software-design-methods-tools/02_dynamic-and-algebraic-designs/01_data-flow-diagrams/01_data-flow-diagrams.en.srt 7.61 KB
    software-design-methods-tools/02_dynamic-and-algebraic-designs/01_data-flow-diagrams/01_data-flow-diagrams.en.txt 4.8 KB
    software-design-methods-tools/02_dynamic-and-algebraic-designs/01_data-flow-diagrams/01_data-flow-diagrams.mp4 13.66 MB
    software-design-methods-tools/02_dynamic-and-algebraic-designs/01_data-flow-diagrams/02_additional-resource_instructions.html 1.04 KB
    software-design-methods-tools/02_dynamic-and-algebraic-designs/02_z/01_z.en.srt 5.57 KB
    software-design-methods-tools/02_dynamic-and-algebraic-designs/02_z/01_z.en.txt 3.52 KB
    software-design-methods-tools/02_dynamic-and-algebraic-designs/02_z/01_z.mp4 21.47 MB
    software-design-methods-tools/02_dynamic-and-algebraic-designs/02_z/02_additional-resource_instructions.html 1.05 KB
    software-design-methods-tools/02_dynamic-and-algebraic-designs/02_z/02_additional-resource_what-is-z.html 5.29 KB
    software-design-methods-tools/03_uml-tools/01_uml-obtaining-rhapsody-from-ibm/01_uml-obtaining-rhapsody-from-ibm.en.srt 7.01 KB
    software-design-methods-tools/03_uml-tools/01_uml-obtaining-rhapsody-from-ibm/01_uml-obtaining-rhapsody-from-ibm.en.txt 4.03 KB
    software-design-methods-tools/03_uml-tools/01_uml-obtaining-rhapsody-from-ibm/01_uml-obtaining-rhapsody-from-ibm.mp4 9.57 MB
    software-design-methods-tools/03_uml-tools/02_uml-class-diagrams-with-rhapsody/01_uml-class-diagrams-with-rhapsody.en.srt 10.82 KB
    software-design-methods-tools/03_uml-tools/02_uml-class-diagrams-with-rhapsody/01_uml-class-diagrams-with-rhapsody.en.txt 6.38 KB
    software-design-methods-tools/03_uml-tools/02_uml-class-diagrams-with-rhapsody/01_uml-class-diagrams-with-rhapsody.mp4 19.86 MB
    software-design-methods-tools/03_uml-tools/02_uml-class-diagrams-with-rhapsody/02_additional-resource_instructions.html 1.14 KB
    software-design-methods-tools/03_uml-tools/03_building-a-sequence-diagram-with-rhapsody/01_building-a-sequence-diagram-with-rhapsody.en.srt 6.24 KB
    software-design-methods-tools/03_uml-tools/03_building-a-sequence-diagram-with-rhapsody/01_building-a-sequence-diagram-with-rhapsody.en.txt 3.7 KB
    software-design-methods-tools/03_uml-tools/03_building-a-sequence-diagram-with-rhapsody/01_building-a-sequence-diagram-with-rhapsody.mp4 19.87 MB
    software-design-methods-tools/03_uml-tools/03_building-a-sequence-diagram-with-rhapsody/02_additional-resource_instructions.html 1.2 KB
    software-design-methods-tools/03_uml-tools/03_building-a-sequence-diagram-with-rhapsody/02_additional-resource_rhp_c_dm_designing_seq_dgrms.html 42.72 KB
    software-design-methods-tools/04_unit-testing/01_junit-install/01_junit-install.en.srt 6.8 KB
    software-design-methods-tools/04_unit-testing/01_junit-install/01_junit-install.en.txt 4.12 KB
    software-design-methods-tools/04_unit-testing/01_junit-install/01_junit-install.mp4 16.89 MB
    software-design-methods-tools/04_unit-testing/01_junit-install/02_testrunner-download_TestRunner.zip 19.86 KB
    software-design-methods-tools/04_unit-testing/01_junit-install/02_testrunner-download_instructions.html 1.02 KB
    software-design-methods-tools/04_unit-testing/02_using-junit/01_using-junit.en.srt 10.98 KB
    software-design-methods-tools/04_unit-testing/02_using-junit/01_using-junit.en.txt 6.71 KB
    software-design-methods-tools/04_unit-testing/02_using-junit/01_using-junit.mp4 34.63 MB
    software-design-methods-tools/04_unit-testing/02_using-junit/02_additional-resource_instructions.html 1.06 KB
    software-design-methods-tools/04_unit-testing/02_using-junit/02_additional-resource_junit_quick_guide.htm 117.22 KB
    software-design-methods-tools/05_ethics/01_ethics-i/01_ethics-i.en.srt 11.36 KB
    software-design-methods-tools/05_ethics/01_ethics-i/01_ethics-i.en.txt 7.16 KB
    software-design-methods-tools/05_ethics/01_ethics-i/01_ethics-i.mp4 68.04 MB
    software-design-methods-tools/05_ethics/01_ethics-i/02_additional-resource_instructions.html 1.16 KB
    software-design-methods-tools/05_ethics/02_project-ethics-ii/01_project-ethics-ii.en.srt 10.78 KB
    software-design-methods-tools/05_ethics/02_project-ethics-ii/01_project-ethics-ii.en.txt 6.82 KB
    software-design-methods-tools/05_ethics/02_project-ethics-ii/01_project-ethics-ii.mp4 43.88 MB
    software-design-methods-tools/05_ethics/02_project-ethics-ii/02_additional-resource_12-ethical-dilemmas-gnawing-at-developers-today.html 167.19 KB
    software-design-methods-tools/05_ethics/02_project-ethics-ii/02_additional-resource_instructions.html 1.18 KB
    software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/01_introduction-to-threats-and-mitigations/01_introduction-to-threats-and-mitigations.en.srt 1.73 KB
    software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/01_introduction-to-threats-and-mitigations/01_introduction-to-threats-and-mitigations.en.txt 1.11 KB
    software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/01_introduction-to-threats-and-mitigations/01_introduction-to-threats-and-mitigations.mp4 5.09 MB
    software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/01_introduction-to-threats-and-mitigations/02_additional-resource_instructions.html 1.12 KB
    software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/02_open-source-threat-and-mitigation-information/01_open-source-threat-and-mitigation-information.en.srt 4.85 KB
    software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/02_open-source-threat-and-mitigation-information/01_open-source-threat-and-mitigation-information.en.txt 2.97 KB
    software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/02_open-source-threat-and-mitigation-information/01_open-source-threat-and-mitigation-information.mp4 17.94 MB
    software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/02_open-source-threat-and-mitigation-information/02_additional-resource_instructions.html 1.22 KB
    software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/03_medical-analogies/01_medical-analogies.en.srt 8.16 KB
    software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/03_medical-analogies/01_medical-analogies.en.txt 4.95 KB
    software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/03_medical-analogies/01_medical-analogies.mp4 42.7 MB
    software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/03_medical-analogies/02_additional-resource_instructions.html 1.09 KB
    software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/03_medical-analogies/02_additional-resource_korthof78.htm 16.01 KB
    software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/04_secure-software-design-is-good-software-design/01_secure-software-design-is-good-software-design.en.srt 5.38 KB
    software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/04_secure-software-design-is-good-software-design/01_secure-software-design-is-good-software-design.en.txt 3.26 KB
    software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/04_secure-software-design-is-good-software-design/01_secure-software-design-is-good-software-design.mp4 29.16 MB
    software-design-threats-mitigations/01_common-vulnerabilities-and-weaknesses/04_secure-software-design-is-good-software-design/02_additional-resource_instructions.html 1.07 KB
    software-design-threats-mitigations/02_specific-design-considerations/01_design-principles-in-detail-i/01_design-principles-in-detail-i.en.srt 21.65 KB
    software-design-threats-mitigations/02_specific-design-considerations/01_design-principles-in-detail-i/01_design-principles-in-detail-i.en.txt 13.07 KB
    software-design-threats-mitigations/02_specific-design-considerations/01_design-principles-in-detail-i/01_design-principles-in-detail-i.mp4 97.96 MB
    software-design-threats-mitigations/02_specific-design-considerations/01_design-principles-in-detail-i/02_additional-resource_bb727010.aspx 48.23 KB
    software-design-threats-mitigations/02_specific-design-considerations/01_design-principles-in-detail-i/02_additional-resource_instructions.html 1.05 KB
    software-design-threats-mitigations/02_specific-design-considerations/02_design-principles-in-detail-ii/01_design-principles-in-detail-ii.en.srt 9.97 KB
    software-design-threats-mitigations/02_specific-design-considerations/02_design-principles-in-detail-ii/01_design-principles-in-detail-ii.en.txt 6.28 KB
    software-design-threats-mitigations/02_specific-design-considerations/02_design-principles-in-detail-ii/01_design-principles-in-detail-ii.mp4 41.72 MB
    software-design-threats-mitigations/02_specific-design-considerations/02_design-principles-in-detail-ii/02_additional-resource_C9.pdf 55.72 KB
    software-design-threats-mitigations/02_specific-design-considerations/02_design-principles-in-detail-ii/02_additional-resource_instructions.html 1.04 KB
    software-design-threats-mitigations/03_building-security-in/01_security-as-a-build-on-not-an-add-on/01_security-as-a-build-on-not-an-add-on.en.srt 5.12 KB
    software-design-threats-mitigations/03_building-security-in/01_security-as-a-build-on-not-an-add-on/01_security-as-a-build-on-not-an-add-on.en.txt 3.07 KB
    software-design-threats-mitigations/03_building-security-in/01_security-as-a-build-on-not-an-add-on/01_security-as-a-build-on-not-an-add-on.mp4 24.88 MB
    software-design-threats-mitigations/03_building-security-in/02_active-vs-passive-security/01_active-vs-passive-security.en.srt 9.44 KB
    software-design-threats-mitigations/03_building-security-in/02_active-vs-passive-security/01_active-vs-passive-security.en.txt 5.68 KB
    software-design-threats-mitigations/03_building-security-in/02_active-vs-passive-security/01_active-vs-passive-security.mp4 46.97 MB
    software-design-threats-mitigations/04_a-dramatic-failure/01_therac-25-case-study/01_therac-25-case-study.en.srt 17.42 KB
    software-design-threats-mitigations/04_a-dramatic-failure/01_therac-25-case-study/01_therac-25-case-study.en.txt 10.8 KB
    software-design-threats-mitigations/04_a-dramatic-failure/01_therac-25-case-study/01_therac-25-case-study.mp4 124.7 MB
    software-design-threats-mitigations/04_a-dramatic-failure/01_therac-25-case-study/02_additional-resource_instructions.html 1.11 KB
    software-design-threats-mitigations/05_bitcoin-foundations/01_intro-to-bitcoin/01_intro-to-bitcoin.en.srt 10.46 KB
    software-design-threats-mitigations/05_bitcoin-foundations/01_intro-to-bitcoin/01_intro-to-bitcoin.en.txt 6.29 KB
    software-design-threats-mitigations/05_bitcoin-foundations/01_intro-to-bitcoin/01_intro-to-bitcoin.mp4 62.72 MB
    software-design-threats-mitigations/05_bitcoin-foundations/01_intro-to-bitcoin/02_additional-resource_instructions.html 1.07 KB
    software-design-threats-mitigations/05_bitcoin-foundations/02_bitcoin-lecture-2/01_bitcoin-lecture-2.en.srt 10.14 KB
    software-design-threats-mitigations/05_bitcoin-foundations/02_bitcoin-lecture-2/01_bitcoin-lecture-2.en.txt 6.32 KB
    software-design-threats-mitigations/05_bitcoin-foundations/02_bitcoin-lecture-2/01_bitcoin-lecture-2.mp4 68.7 MB
    software-design-threats-mitigations/05_bitcoin-foundations/02_bitcoin-lecture-2/02_additional-resource_instructions.html 1.09 KB
    software-design-threats-mitigations/06_the-bitcoin-project/01_bitcoin-lecture-3/01_bitcoin-lecture-3.en.srt 9.72 KB
    software-design-threats-mitigations/06_the-bitcoin-project/01_bitcoin-lecture-3/01_bitcoin-lecture-3.en.txt 6.17 KB
    software-design-threats-mitigations/06_the-bitcoin-project/01_bitcoin-lecture-3/01_bitcoin-lecture-3.mp4 56.33 MB
    software-design-threats-mitigations/06_the-bitcoin-project/01_bitcoin-lecture-3/02_additional-reading_instructions.html 1.06 KB
    software-design-threats-mitigations/06_the-bitcoin-project/02_bitcoin-lecture-4/01_bitcoin-lecture-4.en.srt 12.57 KB
    software-design-threats-mitigations/06_the-bitcoin-project/02_bitcoin-lecture-4/01_bitcoin-lecture-4.en.txt 7.92 KB
    software-design-threats-mitigations/06_the-bitcoin-project/02_bitcoin-lecture-4/01_bitcoin-lecture-4.mp4 67.97 MB
    software-design-threats-mitigations/06_the-bitcoin-project/02_bitcoin-lecture-4/02_additional-resource_instructions.html 1.06 KB
    software-design-threats-mitigations/07_simple-software-compromises/01_buffer-overflow/01_buffer-overflow.en.srt 7.72 KB
    software-design-threats-mitigations/07_simple-software-compromises/01_buffer-overflow/01_buffer-overflow.en.txt 4.71 KB
    software-design-threats-mitigations/07_simple-software-compromises/01_buffer-overflow/01_buffer-overflow.mp4 38.43 MB
    software-design-threats-mitigations/07_simple-software-compromises/01_buffer-overflow/02_additional-resource_instructions.html 1.03 KB
    software-design-threats-mitigations/07_simple-software-compromises/02_sql-injection/01_sql-injection.en.srt 5.1 KB
    software-design-threats-mitigations/07_simple-software-compromises/02_sql-injection/01_sql-injection.en.txt 3.01 KB
    software-design-threats-mitigations/07_simple-software-compromises/02_sql-injection/01_sql-injection.mp4 27 MB
    software-design-threats-mitigations/07_simple-software-compromises/02_sql-injection/02_additional-resource_instructions.html 1.03 KB
    software-design-threats-mitigations/07_simple-software-compromises/03_software-life-cycle-and-management-considerations/01_software-life-cycle-and-management-considerations.en.srt 14.44 KB
    software-design-threats-mitigations/07_simple-software-compromises/03_software-life-cycle-and-management-considerations/01_software-life-cycle-and-management-considerations.en.txt 8.94 KB
    software-design-threats-mitigations/07_simple-software-compromises/03_software-life-cycle-and-management-considerations/01_software-life-cycle-and-management-considerations.mp4 60.15 MB
    software-design-threats-mitigations/07_simple-software-compromises/03_software-life-cycle-and-management-considerations/02_additional-resource_instructions.html 1.13 KB

Download Info

  • Tips

    “[CourserHub.com] Coursera - Secure Software Design Specialization” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.