Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
CSSLP 2019
| Intermediate
- 19 videos | 1h 11m 40s
- Includes Assessment
- Earns a Badge
In this 19-video course, learners will explore the intricate world of secure coding practices. Topics covered in detail include declarative versus imperative (programmatic) security-whether the security is part of the application or part of the container. Next, survey defensive coding practices and control such as secure configuration, error handling, and session management. Learners will also explore cryptography, input and output sanitization, error handling, input validation, logging and auditing, and session and exception management. You will learn important information about safe application programming interfaces (APIs), including those that offer different types of functionality, such as Microsoft's Crypto API and Python's pycrypto, which both provide cryptographic functions; popular social media platforms provide their own APIs that programmers can tap into while incorporating aspects of those services. Learn more about useful concepts such as concurrency, type safety, memory management, configuration parameter management, tokenizing, and sandboxing. The course may be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize characteristics of declarative securityRecognize characteristics of programmatic securityRecognize how to use defensive coding practice to address concurrency issues leading to race conditionRecognize examples of using configuration as a defensive coding practiceRecognize cryptography elements such as storage, agility, encryption, and algorithm selectionRecognize examples of using input and output sanitization as a defensive coding practiceRecognize examples of using error handling as a defensive coding practiceRecognize examples of using input validation as a defensive coding practiceRecognize examples of using logging and auditing as a defensive coding practice
-
Recognize examples of using session management as a defensive coding practiceRecognize examples of using exception management as a defensive coding practiceDistinguish between safe and unsafe api coding practicesDistinguish between static and dynamic type safety enforcementRecognize characteristics of memory management as a defensive coding practiceRecognize characteristics of configuration parameter management as a defensive coding practiceRecognize examples of tokenizing as a defensive coding practiceRecognize characteristics of sandboxing as a defensive coding practiceSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 43s
-
3m 22sUpon completion of this video, you will be able to recognize characteristics of declarative security. FREE ACCESS
-
3m 18sUpon completion of this video, you will be able to recognize characteristics of programmatic security. FREE ACCESS
-
3m 9sAfter completing this video, you will be able to recognize how to use defensive coding practices to address concurrency issues leading to race conditions. FREE ACCESS
-
4m 37sUpon completion of this video, you will be able to recognize examples of using configuration as a defensive coding practice. FREE ACCESS
-
5m 8sAfter completing this video, you will be able to recognize cryptography elements such as storage, agility, encryption, and algorithm selection. FREE ACCESS
-
4m 16sAfter completing this video, you will be able to recognize examples of using input and output sanitization as a defensive coding practice. FREE ACCESS
-
5m 1sAfter completing this video, you will be able to recognize examples of using error handling as a defensive coding practice. FREE ACCESS
-
5m 52sUpon completion of this video, you will be able to recognize examples of input validation as a defensive coding practice. FREE ACCESS
-
5m 43sUpon completion of this video, you will be able to recognize examples of using logging and auditing as defensive coding practices. FREE ACCESS
-
4m 2sUpon completion of this video, you will be able to recognize examples of using session management as a defensive coding practice. FREE ACCESS
-
5m 7sAfter completing this video, you will be able to recognize examples of using exception management as a defensive coding practice. FREE ACCESS
-
3m 33sIn this video, you will learn how to distinguish between safe and unsafe API coding practices. FREE ACCESS
-
2m 1sFind out how to distinguish between static and dynamic type safety enforcement. FREE ACCESS
-
4m 37sUpon completion of this video, you will be able to recognize characteristics of memory management as a defensive coding practice. FREE ACCESS
-
4m 34sAfter completing this video, you will be able to recognize characteristics of configuration parameter management as a defensive coding practice. FREE ACCESS
-
2m 16sAfter completing this video, you will be able to recognize examples of tokenizing as a defensive coding practice. FREE ACCESS
-
2mAfter completing this video, you will be able to recognize characteristics of sandboxing as a defensive coding practice. FREE ACCESS
-
1m 19s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.