Defensive Programmer: Defensive Concepts
Beginner
- 9 videos | 43m 29s
- Includes Assessment
- Earns a Badge
Explore key defensive programming concepts including the Cert Top 10 practices for secure coding, along with other topics covered in this 9-video course. To begin, take a look at the general defense coding concepts, the basic concepts and principles that permeate defensive programming. The next two-part tutorial concerns CERT top 10 secure coding practices: Part A on the first five CERT top 10 secure coding practices-validate input, Heed compiler warnings, Architect and design for security, keep it simple, and the default deny. Part B covers the last five CERT top 10 secure coding practices-adhere to the principles of least privilege, sanitize data sent to other systems, practice defense in depth, use effective quality assurance techniques, and adopt a secure coding standard. This leads learners into learning how to apply defensive coding; using Open Source Security Testing Methodology Manual concepts for secure testing, and applying the Flaw Hypothesis Method. The final tutorial in this course looks at the role of Six Sigma in producing better quality, secure programming.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify general defensive conceptsDescribe the first five cert top 10 secure coding practices - validate input, heed compiler warnings, architect and design for security, keep it simple, and the default denyDescribe the last five cert top 10 secure coding practices - adhere to the principle of least privilege, sanitize data sent to other systems, practice defense in depth, use effective quality assurance techniques, and adopt a secure coding standardApply defensive coding
-
Use open source security testing methodology manual conceptsApply the flaw hypothesis methodDescribe the role of six sigma in producing better quality, secure programmingSummarize the key concepts covered in this course
IN THIS COURSE
-
2m 6s
-
8m 16sIn this video, learn how to identify general defensive concepts. FREE ACCESS
-
6m 3sUpon completion of this video, you will be able to describe the first five CERT Top 10 secure coding practices: Validate input, Heed compiler warnings, Architect and design for security, Keep it simple, and the Default deny. FREE ACCESS
-
5m 6sAfter completing this video, you will be able to describe the last five CERT Top 10 secure coding practices: Adhering to the principle of least privilege, Sanitizing data sent to other systems, Practicing defense in depth, Using effective quality assurance techniques, and Adopting a secure coding standard. FREE ACCESS
-
3m 50sIn this video, you will learn how to apply defensive coding. FREE ACCESS
-
4m 34sIn this video, you will learn how to use the concepts from the Open Source Security Testing Methodology Manual. FREE ACCESS
-
5m 48sIn this video, learn how to apply the Flaw Hypothesis Method. FREE ACCESS
-
4m 35sUpon completion of this video, you will be able to describe the role of Six Sigma in improving quality and security in programming. FREE ACCESS
-
3m 11s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.