Software Engineering, Security and Vulnerabilities

Cybersecurity    |    Beginner
  • 15 videos | 57m 29s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 108 users Rating 4.4 of 108 users (108)
The principles of software engineering include designing, developing, implementing, and maintaining a software solution. One crucial aspect of software security is to determine if software is safe to release to an organization or public. In this course, you'll explore the Software Development Life Cycle (SDLC) and learn about maturity levels used to define agility and effectiveness of a development solution. Discover how security guidelines can help improve the quality and security of a software development, and explore the importance of staying current with the types and trends of software threats and exploits. Continue to learn about software vulnerabilities while exploring common attacks including buffer overflows, database injection, cross-site scripting, and directory traversal attacks. Lastly, explore how misconfiguration of servers increases the likelihood of attacks, and discover how permissions are used to secure directories used by applications. This course was originally created by Global Knowledge (GK).

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Discuss the principles of software engineering including design, development, implementation, and maintenance
    Describe how to determine if software is safe
    Provide an overview of the software development life cycle (sdlc)
    Define maturity levels to define agility and effectiveness of a development solution
    Recognize how security guidelines can help improve the quality and security of a software development
    Discuss the importance of staying current with the types and trends of software vulnerabilities
    Provide an overview of buffer overflow attacks
  • Describe how database injection attacks work
    Discuss how cross-side scripting (xss) attacks can be used to poison a webserver
    Provide an overview of cross-site request forgery (xsrf) attacks
    Recognize how a directory traversal vulnerability allows an attacker to navigate outside the website directory on a web server
    Discuss how misconfigurations of servers increases the likelihood of attacks
    Describe how permissions are used to secure directories used by applications
    Provide an overview of session hijacking attacks

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 27 users Rating 4.4 of 27 users (27)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.7 of 3 users Rating 4.7 of 3 users (3)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 90 users Rating 4.7 of 90 users (90)
Rating 4.5 of 37 users Rating 4.5 of 37 users (37)
Rating 4.6 of 4717 users Rating 4.6 of 4717 users (4717)