01.Integrate Security within DevOps/0101.The Course Overview.mp421.75MB
01.Integrate Security within DevOps/0102.Integrate Security for a DevOps World.mp49.25MB
01.Integrate Security within DevOps/0103.Risk Management in a Rapidly Changing World.mp412.14MB
01.Integrate Security within DevOps/0104.Key Principles and Benefits of Secure DevOps.mp411.27MB
01.Integrate Security within DevOps/0105.Business-Driven Security Strategies.mp46.55MB
01.Integrate Security within DevOps/0106.OWASP Security Guidelines.mp47.16MB
02.Applying Shift Left Security Approach/0201.Integrating Security Into CICD Pipeline.mp444.69MB
02.Applying Shift Left Security Approach/0202.Automated Security Testing.mp429.27MB
02.Applying Shift Left Security Approach/0203.Tools of the Trade.mp459.28MB
02.Applying Shift Left Security Approach/0204.Red and Blue Teams.mp429.54MB
03.Securing Development Practices/0301.Security Requirements.mp443.98MB
03.Securing Development Practices/0302.Architectural Considerations.mp416.81MB
03.Securing Development Practices/0303.Threat Modeling, Data Flow Diagrams, and Attack Surface.mp471.96MB
03.Securing Development Practices/0304.Identity and Access Management.mp435.23MB
03.Securing Development Practices/0305.Code Inspection.mp430.1MB
03.Securing Development Practices/0306.Environment Hardening.mp489.13MB
04.Security Verification in the Pipeline/0401.What Is Static Application Security Testing.mp428.83MB
04.Security Verification in the Pipeline/0402.Embed SAST into the CICD Pipeline.mp436.93MB
04.Security Verification in the Pipeline/0403.What Is Dynamic Application Security Testing.mp420.06MB
04.Security Verification in the Pipeline/0404.Embed DAST Into the Pipeline.mp461.15MB
04.Security Verification in the Pipeline/0405.Runtime Application Self-Protection (RASP) versus Interactive Application Security Testing (IAST).mp422.06MB
04.Security Verification in the Pipeline/0406.Software Composition Analysis.mp413.56MB
05.Deploy Secure Software/0501.Infrastructure as Code.mp448.15MB
05.Deploy Secure Software/0502.Key Management and Identity Management.mp426.08MB
05.Deploy Secure Software/0503.Chaos Monkey and Fuzz Testing.mp425.08MB
06.Security in System Monitoring/0601.Security Monitoring.mp449.1MB
06.Security in System Monitoring/0602.Governance, Risk, Compliance and Audit.mp439.97MB
06.Security in System Monitoring/0603.Incident Response and Forensics.mp470.7MB