Secure Programmer: Security Concepts

Intermediate
  • 6 videos | 24m 45s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 332 users Rating 4.4 of 332 users (332)
This 6-video course guides learners to discover the basics of secure programming, including common security concepts, authentication and authorization, and shows how to avoid common programming errors that can undermine security, as well as how to incorporate validation and verification into programming. These are the core security concepts that you need to master to ensure that your programs are produced in a secure fashion. To begin, you will examine secure programmer security concepts, including confidentiality, integrity, and availability, known as the CIA triangle, least privileges, and separation of duties. The next tutorial covers secure programmer authentication and authorization, looking at general authentication models such as discretionary access controls (DACs), mandatory access control (MAC), rule-based access control (RBAC), and attribute-based access control (ABAC). Next, you will explore and learn how to avoid common programming errors that can undermine security. The final tutorial in this course looks at the process and techniques of secure programming verification and validation.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe security concepts, including the cia triangle, least privileges, and separation of duties
    Describe authentication and authorization, including models such as dac, mac, rbac, and abac
  • Describe and be able to avoid common programming errors that can undermine security
    Describe secure programming verification and validation process and techniques
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 39s
  • 5m 43s
    Upon completion of this video, you will be able to describe security concepts, including the CIA triangle, least privileges, and separation of duties. FREE ACCESS
  • Locked
    3.  Authentication and Authorization
    7m 19s
    Upon completion of this video, you will be able to describe authentication and authorization, including models such as DAC, MAC, RBAC, and ABAC. FREE ACCESS
  • Locked
    4.  Common Programming Errors
    3m 58s
    Upon completion of this video, you will be able to describe and avoid common programming errors that can undermine security. FREE ACCESS
  • Locked
    5.  Secure Programming Verification and Validation
    4m 41s
    After completing this video, you will be able to describe the secure programming verification and validation process and techniques. FREE ACCESS
  • Locked
    6.  Course Summary
    1m 26s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.4 of 94 users Rating 4.4 of 94 users (94)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 9576 users Rating 4.3 of 9576 users (9576)
Rating 4.3 of 391 users Rating 4.3 of 391 users (391)
Rating 4.5 of 186 users Rating 4.5 of 186 users (186)