SecOps Engineer: Secure Coding
IT Security
| Intermediate
- 13 Videos | 51m 10s
- Includes Assessment
- Earns a Badge
This 13-video course explores software protection by applying secure development and coding practices. Learners will examine secure coding key concepts, including early and frequent testing, and how to validate to ensure it is the proper kind of data, and the proper size, type, and format. First, the course demonstrates how to set up a simple filtering statement to improve software security. You will learn how to constrain user input, by implementing a drop-down box or radio buttons. You will also learn the top 10 rules established by CERT (Computer Emergency Response Team) for secure programming, and how to operationalize secure software deployments, as well as continuous secure delivery to quickly update changes and upgrades. Learners will explore verification, and secure validation software metrics to measure and improve software. You will learn to use C# code, evaluate both secure and unsecure parts, for the web and Windows code, and learn to secure code with Python. Finally, you will learn to secure code with Java.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe secure coding conceptsapply filtering and data validationdescribe the importance of and how to apply practices from the CERT Top 10 list including validating input, paying attention to compiler warnings, secure design, coding for simplicity, and the principle of default denydescribe the importance of and how to apply practices from the CERT Top 10 list including the principle of least privileges, sanitizing data, defense in depth, implementing quality assurance, and adhering to standardsdeploy software in a safe and secure mannerapply delivery in a secure manner on an ongoing or continuous basis
-
implement security verification and validation in software projectsdescribe and utilize metrics appropriate for software securityrecognize and analyze C# examples of secure coderecognize and analyze Python examples of secure coderecognize and analyze Java examples of secure codesummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 20sUP NEXT
-
2.Secure Coding Key Concepts4m 58s
-
3.Filtering and Validation4m 17s
-
4.CERT Top 10 Secure Coding Practices - Part 12m 45s
-
5.CERT Top 10 Secure Coding Practices - Part 24m 28s
-
6.Operationalizing Secure Software Deployments3m 54s
-
7.Securing Continuous Delivery6m 19s
-
8.Secure Verification and Validation3m 20s
-
9.Secure Software Metrics5m 17s
-
10.Secure Coding with C#4m 52s
-
11.Secure Coding with Python4m 48s
-
12.Secure Coding with Java3m 58s
-
13.Course Summary54s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.