Final Exam: Secure Programmer
Intermediate
- 1 video | 32s
- Includes Assessment
- Earns a Badge
Final Exam: Secure Programmer will test your knowledge and application of the topics presented throughout the Secure Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer Journey.
WHAT YOU WILL LEARN
-
Code against format string attacks in c#write resilient java code - part 2code against buffer overflow attacks in c#code against sql injection attacks in javaimplement c# secure coding to combat common code vulnerabilitiesidentify security concepts, including the cia triangle, least privileges, and separation of dutiesrecognize specific security vulnerabilities and recognize how to program counter techniquescode against sql injection attacks in javascriptdescribe symmetric algorithms including aes, blowfish, and serpentcode against sql injection attacks in c# - part 2code against cross-site scripting attacks in javascriptimplement javascript secure coding to combat cross-site scripting attacksrecognize owasp top 10 vulnerabilities including broken access control, security misconfiguration, sensitive data exposure, and insufficient attack protectiondescribe secure programming verification and validation process and techniquesdescribe owasp top 10 vulnerabilities including cross-site request forgery, using components with known vulnerabilities, and underprotected apiscode against cross-site scripting attacks in javadescribe hashing algorithms such as md5 and sha as well as mac and hmacdescribe owasp top 10 vulnerabilities including broken access control, security misconfiguration, sensitive data exposure, and insufficient attack protectioncode against cross-site scripting attacks in pythonidentify symmetric algorithms including aes, blowfish, and serpentcode against buffer overflow attacks in javacode against format string attacks in javadescribe specific security vulnerabilities and recognize how to program counter techniquescode against cross-site scripting attacks in c#code against password cracking attacks in javascriptdescribe and use threat models including stride, pasta, dread, and squarecode against buffer overflow attacks in java - part 3code against cross-site scripting attacks in javascript - part 2identify owasp top 10 vulnerabilities including broken access control, security misconfiguration, sensitive data exposure, and insufficient attack protectionidentify the resiliency concepts such as stability, recovery, and defensive coding
-
describe owasp top 10 vulnerabilities including sql injection, broken authentication, and cross-site scriptinguse owasp zap vulnerability scanner to test web sites for common vulnerabilitiesdescribe and use cve vulnerability scoringcode against buffer overflow attacks in javascriptcode against buffer overflow attacks in java - part 2identify owasp top 10 vulnerabilities including cross-site request forgery, using components with known vulnerabilities, and underprotected apiscode against sql injection attacks in java - part 2describe owasp top 10 vulnerabilitieswrite resilient python codecode against buffer overflow attacks in pythoncode against sql injection attacks in pythoncode against sql injection attacks in python - part 2describe and be able to avoid common programming errors that can undermine the securitydescribe authentication and authorization, including models such as dac, mac, rbac, and abacwrite resilient c# codeapply c# secure coding to combat common code vulnerabilitiesuse vega vulnerability scanner to test web sites for common vulnerabilitiesapply javascript secure coding to combat sql injection vulnerabilitydescribe asymmetric algorithms including rsa, ecc, and diffie-helmancode against password cracking attacks in javascript - part 2write resilient java codecode against format string attacks in pythondescribe security concepts, including the cia triangle, least privileges, and separation of dutiesdescribe the resiliency concepts such as stability, recovery, and defensive codinguse cvss scoring for vulnerabilitiesimplement javascript secure coding to combat sql injection vulnerabilitycode against sql injection attacks in c#implement python secure coding to combat a variety of security vulnerabilitieswrite resilient javascript codeimplement java secure coding to combat sql injection vulnerability
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.