Defensive Programmer: Defensive Concepts

  • 9 Videos | 46m 59s
  • Includes Assessment
  • Earns a Badge
Likes 12 Likes 12
Explore key defensive programming concepts including the Cert Top 10 practices for secure coding, along with other topics covered in this 9-video course. To begin, take a look at the general defense coding concepts, the basic concepts and principles that permeate defensive programming. The next two-part tutorial concerns CERT top 10 secure coding practices: Part A on the first five CERT top 10 secure coding practices—validate input, Heed compiler warnings, Architect and design for security, keep it simple, and the default deny. Part B covers the last five CERT top 10 secure coding practices—adhere to the principles of least privilege, sanitize data sent to other systems, practice defense in depth, use effective quality assurance techniques, and adopt a secure coding standard. This leads learners into learning how to apply defensive coding; using Open Source Security Testing Methodology Manual concepts for secure testing, and applying the Flaw Hypothesis Method. The final tutorial in this course looks at the role of Six Sigma in producing better quality, secure programming.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    identify general defensive concepts
    describe the first five CERT Top 10 secure coding practices - Validate input, Heed compiler warnings, Architect and design for security, Keep it simple, and the Default deny
    describe the last five CERT Top 10 secure coding practices - Adhere to the principle of least privilege, Sanitize data sent to other systems, Practice defense in depth, Use effective quality assurance techniques, and Adopt a secure coding standard
    apply defensive coding
  • use Open Source Security Testing Methodology Manual concepts
    apply the Flaw Hypothesis Method
    describe the role of Six Sigma in producing better quality, secure programming
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    2m 6s
    UP NEXT
  • Playable
    2. 
    General Defensive Coding Concepts
    8m 16s
  • Locked
    3. 
    CERT Top 10 Secure Coding Practices - Part A
    6m 3s
  • Locked
    4. 
    CERT Top 10 Secure Coding Practice - Part B
    5m 6s
  • Locked
    5. 
    Defensive Coding
    3m 50s
  • Locked
    6. 
    Open Source Security Testing Methodology Manual
    4m 34s
  • Locked
    7. 
    Flaw Hypothesis Method
    5m 48s
  • Locked
    8. 
    Six Sigma
    4m 35s
  • Locked
    9. 
    Course Summary
    3m 11s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 4 Likes 4  
Likes 23 Likes 23  
Likes 17 Likes 17  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 29 Likes 29  
Likes 151 Likes 151