SecOps Engineer: Secure Coding
IT Security
| Intermediate
- 13 videos | 51m 10s
- Includes Assessment
- Earns a Badge
This 13-video course explores software protection by applying secure development and coding practices. Learners will examine secure coding key concepts, including early and frequent testing, and how to validate to ensure it is the proper kind of data, and the proper size, type, and format. First, the course demonstrates how to set up a simple filtering statement to improve software security. You will learn how to constrain user input, by implementing a drop-down box or radio buttons. You will also learn the top 10 rules established by CERT (Computer Emergency Response Team) for secure programming, and how to operationalize secure software deployments, as well as continuous secure delivery to quickly update changes and upgrades. Learners will explore verification, and secure validation software metrics to measure and improve software. You will learn to use C# code, evaluate both secure and unsecure parts, for the web and Windows code, and learn to secure code with Python. Finally, you will learn to secure code with Java.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe secure coding conceptsApply filtering and data validationDescribe the importance of and how to apply practices from the cert top 10 list including validating input, paying attention to compiler warnings, secure design, coding for simplicity, and the principle of default denyDescribe the importance of and how to apply practices from the cert top 10 list including the principle of least privileges, sanitizing data, defense in depth, implementing quality assurance, and adhering to standardsDeploy software in a safe and secure mannerApply delivery in a secure manner on an ongoing or continuous basis
-
Implement security verification and validation in software projectsDescribe and utilize metrics appropriate for software securityRecognize and analyze c# examples of secure codeRecognize and analyze python examples of secure codeRecognize and analyze java examples of secure codeSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 20s
-
4m 58sAfter completing this video, you will be able to describe secure coding concepts. FREE ACCESS
-
4m 17sIn this video, you will learn how to apply filtering and data validation. FREE ACCESS
-
2m 45sUpon completion of this video, you will be able to describe the importance of and how to apply practices from the CERT Top 10 list including validating input, paying attention to compiler warnings, secure design, coding for simplicity, and the principle of default deny. FREE ACCESS
-
4m 28sUpon completion of this video, you will be able to describe the importance of and how to apply practices from the CERT Top 10 list including the principle of least privileges, sanitizing data, defense in depth, implementing quality assurance, and adhering to standards. FREE ACCESS
-
3m 54sDuring this video, you will learn how to deploy software safely and securely. FREE ACCESS
-
6m 19sLearn how to apply delivery in a secure manner on an ongoing or continuous basis. FREE ACCESS
-
3m 20sIn this video, you will learn how to implement security verification and validation in software projects. FREE ACCESS
-
5m 17sUpon completion of this video, you will be able to describe and use metrics appropriate for software security. FREE ACCESS
-
4m 52sAfter completing this video, you will be able to recognize and analyze examples of secure code in C#. FREE ACCESS
-
4m 48sUpon completion of this video, you will be able to recognize and analyze examples of secure code in Python. FREE ACCESS
-
3m 58sAfter completing this video, you will be able to recognize and analyze examples of secure code in Java. FREE ACCESS
-
54s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.