Security Programming: Code Identification

Secure Programming    |    Beginner
  • 14 videos | 1h 8m 28s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 412 users Rating 4.5 of 412 users (412)
Learners can explore code recognition of various programming languages used in security applications, and security exploits, including Python, C, C++, and SQL, in this 14-video course. You will examine common programming paradigms, and learn how to classify them based on their features. Then you will learn how to identify Bash and Python scripts. Next, learners will examine the similarities and differences of C# compared to the C and C++ languages, and regular expressions in typical regex engines. You will learn how to identify PowerShell scripts based on their features, and how to identify the elements of a SQL statement, and how to use SQLite, a tool to manage local databases in file form without servers. This course continues by examining common security vulnerabilities in code that can lead to exploits. You will learn how to identify the structure of common executable formats based on their binary signatures. Finally, this course demonstrates how to verify the integrity of a downloaded file based on its hash value.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe common programming paradigms and classify them based on their features
    Identify bash scripts based on their features
    Identify python scripts based on their features
    Identify the elements that make up a common c program
    Identify the elements of a typical c++ program
    Describe the similarities and differences of c# when compared to c and c++
  • Identify regular expressions found in typical regex engines
    Identify powershell scripts based on their features
    Identify the elements of a sql statement
    Describe common security vulnerabilities in code that can lead to exploits
    Identify the structure of common executable formats based on their binary signatures
    Verify the integrity of a downloaded files based on its hash value
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 30s
  • 7m 37s
    After completing this video, you will be able to describe common programming paradigms and classify them based on their features. FREE ACCESS
  • Locked
    3.  Identifying Bash Scripts
    4m 54s
    In this video, you will learn how to identify bash scripts based on their features. FREE ACCESS
  • Locked
    4.  Identifying Python Scripts
    6m 38s
    In this video, you will learn how to identify Python scripts based on their features. FREE ACCESS
  • Locked
    5.  Identifying C programs
    6m 27s
    In this video, you will learn how to identify the elements that make up a common C programming language. FREE ACCESS
  • Locked
    6.  Identifying C++ programs
    4m 9s
    Learn how to identify the elements of a typical C++ program. FREE ACCESS
  • Locked
    7.  Identifying C# programs
    4m 22s
    Upon completion of this video, you will be able to describe the similarities and differences of C# when compared to C and C++. FREE ACCESS
  • Locked
    8.  Identifying Regular Expressions
    4m 51s
    Learn how to identify regular expressions found in most regex engines. FREE ACCESS
  • Locked
    9.  Identifying PowerShell Scripts
    3m 26s
    During this video, you will learn how to identify PowerShell scripts based on their features. FREE ACCESS
  • Locked
    10.  Identifying SQL Code
    5m 59s
    Learn how to identify the elements of a SQL statement. FREE ACCESS
  • Locked
    11.  Common Code Vulnerabilities
    7m 1s
    After completing this video, you will be able to describe common security vulnerabilities in code that can lead to exploits. FREE ACCESS
  • Locked
    12.  Identifying Binary Files
    4m 52s
    In this video, you will learn how to identify the structure of common executable formats based on their binary signatures. FREE ACCESS
  • Locked
    13.  Verifying Downloaded Files
    5m 32s
    Learn how to verify the integrity of a downloaded file based on its hash value. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 9s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.1 of 49 users Rating 4.1 of 49 users (49)
Rating 4.5 of 229 users Rating 4.5 of 229 users (229)
Rating 4.3 of 149 users Rating 4.3 of 149 users (149)