SecOps Engineer: Secure Coding

IT Security    |    Intermediate
  • 13 videos | 51m 10s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 131 users Rating 4.4 of 131 users (131)
This 13-video course explores software protection by applying secure development and coding practices. Learners will examine secure coding key concepts, including early and frequent testing, and how to validate to ensure it is the proper kind of data, and the proper size, type, and format. First, the course demonstrates how to set up a simple filtering statement to improve software security. You will learn how to constrain user input, by implementing a drop-down box or radio buttons. You will also learn the top 10 rules established by CERT (Computer Emergency Response Team) for secure programming, and how to operationalize secure software deployments, as well as continuous secure delivery to quickly update changes and upgrades. Learners will explore verification, and secure validation software metrics to measure and improve software. You will learn to use C# code, evaluate both secure and unsecure parts, for the web and Windows code, and learn to secure code with Python. Finally, you will learn to secure code with Java.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe secure coding concepts
    Apply filtering and data validation
    Describe the importance of and how to apply practices from the cert top 10 list including validating input, paying attention to compiler warnings, secure design, coding for simplicity, and the principle of default deny
    Describe the importance of and how to apply practices from the cert top 10 list including the principle of least privileges, sanitizing data, defense in depth, implementing quality assurance, and adhering to standards
    Deploy software in a safe and secure manner
    Apply delivery in a secure manner on an ongoing or continuous basis
  • Implement security verification and validation in software projects
    Describe and utilize metrics appropriate for software security
    Recognize and analyze c# examples of secure code
    Recognize and analyze python examples of secure code
    Recognize and analyze java examples of secure code
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 20s
  • 4m 58s
    After completing this video, you will be able to describe secure coding concepts. FREE ACCESS
  • Locked
    3.  Filtering and Validation
    4m 17s
    In this video, you will learn how to apply filtering and data validation. FREE ACCESS
  • Locked
    4.  CERT Top 10 Secure Coding Practices - Part 1
    2m 45s
    Upon completion of this video, you will be able to describe the importance of and how to apply practices from the CERT Top 10 list including validating input, paying attention to compiler warnings, secure design, coding for simplicity, and the principle of default deny. FREE ACCESS
  • Locked
    5.  CERT Top 10 Secure Coding Practices - Part 2
    4m 28s
    Upon completion of this video, you will be able to describe the importance of and how to apply practices from the CERT Top 10 list including the principle of least privileges, sanitizing data, defense in depth, implementing quality assurance, and adhering to standards. FREE ACCESS
  • Locked
    6.  Operationalizing Secure Software Deployments
    3m 54s
    During this video, you will learn how to deploy software safely and securely. FREE ACCESS
  • Locked
    7.  Securing Continuous Delivery
    6m 19s
    Learn how to apply delivery in a secure manner on an ongoing or continuous basis. FREE ACCESS
  • Locked
    8.  Secure Verification and Validation
    3m 20s
    In this video, you will learn how to implement security verification and validation in software projects. FREE ACCESS
  • Locked
    9.  Secure Software Metrics
    5m 17s
    Upon completion of this video, you will be able to describe and use metrics appropriate for software security. FREE ACCESS
  • Locked
    10.  Secure Coding with C#
    4m 52s
    After completing this video, you will be able to recognize and analyze examples of secure code in C#. FREE ACCESS
  • Locked
    11.  Secure Coding with Python
    4m 48s
    Upon completion of this video, you will be able to recognize and analyze examples of secure code in Python. FREE ACCESS
  • Locked
    12.  Secure Coding with Java
    3m 58s
    After completing this video, you will be able to recognize and analyze examples of secure code in Java. FREE ACCESS
  • Locked
    13.  Course Summary
    54s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 21 users Rating 4.5 of 21 users (21)
Rating 4.5 of 139 users Rating 4.5 of 139 users (139)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 1482 users Rating 4.4 of 1482 users (1482)
Rating 4.6 of 175 users Rating 4.6 of 175 users (175)
Rating 4.4 of 27 users Rating 4.4 of 27 users (27)