Final Exam: Secure Programmer

Intermediate
  • 1 video | 32s
  • Includes Assessment
  • Earns a Badge
Rating 3.0 of 26 users Rating 3.0 of 26 users (26)
Final Exam: Secure Programmer will test your knowledge and application of the topics presented throughout the Secure Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer Journey.

WHAT YOU WILL LEARN

  • Code against format string attacks in c#
    write resilient java code - part 2
    code against buffer overflow attacks in c#
    code against sql injection attacks in java
    implement c# secure coding to combat common code vulnerabilities
    identify security concepts, including the cia triangle, least privileges, and separation of duties
    recognize specific security vulnerabilities and recognize how to program counter techniques
    code against sql injection attacks in javascript
    describe symmetric algorithms including aes, blowfish, and serpent
    code against sql injection attacks in c# - part 2
    code against cross-site scripting attacks in javascript
    implement javascript secure coding to combat cross-site scripting attacks
    recognize owasp top 10 vulnerabilities including broken access control, security misconfiguration, sensitive data exposure, and insufficient attack protection
    describe secure programming verification and validation process and techniques
    describe owasp top 10 vulnerabilities including cross-site request forgery, using components with known vulnerabilities, and underprotected apis
    code against cross-site scripting attacks in java
    describe hashing algorithms such as md5 and sha as well as mac and hmac
    describe owasp top 10 vulnerabilities including broken access control, security misconfiguration, sensitive data exposure, and insufficient attack protection
    code against cross-site scripting attacks in python
    identify symmetric algorithms including aes, blowfish, and serpent
    code against buffer overflow attacks in java
    code against format string attacks in java
    describe specific security vulnerabilities and recognize how to program counter techniques
    code against cross-site scripting attacks in c#
    code against password cracking attacks in javascript
    describe and use threat models including stride, pasta, dread, and square
    code against buffer overflow attacks in java - part 3
    code against cross-site scripting attacks in javascript - part 2
    identify owasp top 10 vulnerabilities including broken access control, security misconfiguration, sensitive data exposure, and insufficient attack protection
    identify the resiliency concepts such as stability, recovery, and defensive coding
  • describe owasp top 10 vulnerabilities including sql injection, broken authentication, and cross-site scripting
    use owasp zap vulnerability scanner to test web sites for common vulnerabilities
    describe and use cve vulnerability scoring
    code against buffer overflow attacks in javascript
    code against buffer overflow attacks in java - part 2
    identify owasp top 10 vulnerabilities including cross-site request forgery, using components with known vulnerabilities, and underprotected apis
    code against sql injection attacks in java - part 2
    describe owasp top 10 vulnerabilities
    write resilient python code
    code against buffer overflow attacks in python
    code against sql injection attacks in python
    code against sql injection attacks in python - part 2
    describe and be able to avoid common programming errors that can undermine the security
    describe authentication and authorization, including models such as dac, mac, rbac, and abac
    write resilient c# code
    apply c# secure coding to combat common code vulnerabilities
    use vega vulnerability scanner to test web sites for common vulnerabilities
    apply javascript secure coding to combat sql injection vulnerability
    describe asymmetric algorithms including rsa, ecc, and diffie-helman
    code against password cracking attacks in javascript - part 2
    write resilient java code
    code against format string attacks in python
    describe security concepts, including the cia triangle, least privileges, and separation of duties
    describe the resiliency concepts such as stability, recovery, and defensive coding
    use cvss scoring for vulnerabilities
    implement javascript secure coding to combat sql injection vulnerability
    code against sql injection attacks in c#
    implement python secure coding to combat a variety of security vulnerabilities
    write resilient javascript code
    implement java secure coding to combat sql injection vulnerability

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 25 users Rating 4.5 of 25 users (25)
Rating 4.5 of 29 users Rating 4.5 of 29 users (29)
Rating 4.4 of 150 users Rating 4.4 of 150 users (150)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 48 users Rating 4.4 of 48 users (48)
Rating 2.8 of 4 users Rating 2.8 of 4 users (4)
Rating 4.4 of 77 users Rating 4.4 of 77 users (77)