Defensive Programmer: Defensive Concepts

Beginner
  • 9 videos | 43m 29s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 391 users Rating 4.3 of 391 users (391)
Explore key defensive programming concepts including the Cert Top 10 practices for secure coding, along with other topics covered in this 9-video course. To begin, take a look at the general defense coding concepts, the basic concepts and principles that permeate defensive programming. The next two-part tutorial concerns CERT top 10 secure coding practices: Part A on the first five CERT top 10 secure coding practices-validate input, Heed compiler warnings, Architect and design for security, keep it simple, and the default deny. Part B covers the last five CERT top 10 secure coding practices-adhere to the principles of least privilege, sanitize data sent to other systems, practice defense in depth, use effective quality assurance techniques, and adopt a secure coding standard. This leads learners into learning how to apply defensive coding; using Open Source Security Testing Methodology Manual concepts for secure testing, and applying the Flaw Hypothesis Method. The final tutorial in this course looks at the role of Six Sigma in producing better quality, secure programming.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify general defensive concepts
    Describe the first five cert top 10 secure coding practices - validate input, heed compiler warnings, architect and design for security, keep it simple, and the default deny
    Describe the last five cert top 10 secure coding practices - adhere to the principle of least privilege, sanitize data sent to other systems, practice defense in depth, use effective quality assurance techniques, and adopt a secure coding standard
    Apply defensive coding
  • Use open source security testing methodology manual concepts
    Apply the flaw hypothesis method
    Describe the role of six sigma in producing better quality, secure programming
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 6s
  • 8m 16s
    In this video, learn how to identify general defensive concepts. FREE ACCESS
  • Locked
    3.  CERT Top 10 Secure Coding Practices - Part A
    6m 3s
    Upon completion of this video, you will be able to describe the first five CERT Top 10 secure coding practices: Validate input, Heed compiler warnings, Architect and design for security, Keep it simple, and the Default deny. FREE ACCESS
  • Locked
    4.  CERT Top 10 Secure Coding Practice - Part B
    5m 6s
    After completing this video, you will be able to describe the last five CERT Top 10 secure coding practices: Adhering to the principle of least privilege, Sanitizing data sent to other systems, Practicing defense in depth, Using effective quality assurance techniques, and Adopting a secure coding standard. FREE ACCESS
  • Locked
    5.  Defensive Coding
    3m 50s
    In this video, you will learn how to apply defensive coding. FREE ACCESS
  • Locked
    6.  Open Source Security Testing Methodology Manual
    4m 34s
    In this video, you will learn how to use the concepts from the Open Source Security Testing Methodology Manual. FREE ACCESS
  • Locked
    7.  Flaw Hypothesis Method
    5m 48s
    In this video, learn how to apply the Flaw Hypothesis Method. FREE ACCESS
  • Locked
    8.  Six Sigma
    4m 35s
    Upon completion of this video, you will be able to describe the role of Six Sigma in improving quality and security in programming. FREE ACCESS
  • Locked
    9.  Course Summary
    3m 11s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 138 users Rating 4.4 of 138 users (138)
Rating 4.5 of 125 users Rating 4.5 of 125 users (125)
Rating 4.2 of 4227 users Rating 4.2 of 4227 users (4227)