Security Architect: Secure Coding Concepts

Intermediate
  • 14 videos | 56m 58s
  • Includes Assessment
  • Earns a Badge
Rating 4.2 of 144 users Rating 4.2 of 144 users (144)
Explore secure coding from the standpoint of a security architect, including best practices for both security design and architecture implementation, and the level of influence needed by a security architect to influence secure coding practices, in this 14-video course. Key concepts covered in this course include principles that define a security architecture; examining the issues and steps involved in security design; and learning the process and potential security flaws in security architecture implementation. Next, you will learn about considerations for deploying and operating an application in secure environments; learn methods and tools that can be used to help secure software through automation and testing; and learn approaches to assessing the risk of an application. Continue by examining the lifecycle of vulnerabilities in software; common coding pitfalls that lead to security vulnerabilities; and industry standards and the application domains they apply to. Finally, you will learn security concerns when adopting new technologies, coding languages, and platforms; learn secure coding architecture when deploying cloud applications; and learn practical approaches to secure coding practices.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the principles that define a security architecture
    Describe the issues and steps involved in security design
    Describe the process and potential security flaws in security architecture implementation
    Describe considerations for deploying and operating an application in secure environments
    Describe methods and tools that can be used to help secure software through automation and testing
    Describe approaches to assessing the risk of an application
  • Describe the life cycle of vulnerabilities in software
    Describe common coding pitfalls that lead to security vulnerabilities
    Describe industry standards and the application domains they apply to
    Describe security concerns when adopting new technologies, coding languages, and platforms
    Describe secure coding architecture when deploying cloud applications
    Describe practical approaches to secure coding practices
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 24s
  • 5m 55s
    Upon completion of this video, you will be able to describe the principles that define a security architecture. FREE ACCESS
  • Locked
    3.  Security Design
    4m 54s
    After completing this video, you will be able to describe the issues and steps involved in security design. FREE ACCESS
  • Locked
    4.  Security Architecture Implementation
    4m 48s
    After completing this video, you will be able to describe the process and potential security flaws in security architecture implementation. FREE ACCESS
  • Locked
    5.  Operational Security
    5m 17s
    After completing this video, you will be able to describe considerations for deploying and operating an application in secure environments. FREE ACCESS
  • Locked
    6.  Automation and Testing
    4m 53s
    Upon completion of this video, you will be able to describe methods and tools that can be used to help secure software through automation and testing. FREE ACCESS
  • Locked
    7.  Risk Assessment
    5m
    After completing this video, you will be able to describe approaches to assessing the risk of an application. FREE ACCESS
  • Locked
    8.  Finding Vulnerabilities
    4m 4s
    After completing this video, you will be able to describe the life cycle of software vulnerabilities. FREE ACCESS
  • Locked
    9.  Common Coding Pitfalls
    4m 10s
    Upon completion of this video, you will be able to describe common coding pitfalls that lead to security vulnerabilities. FREE ACCESS
  • Locked
    10.  Security Standards
    3m 50s
    Upon completion of this video, you will be able to describe industry standards and the application domains to which they apply. FREE ACCESS
  • Locked
    11.  Adapting to New Technology
    3m 24s
    Upon completion of this video, you will be able to describe security concerns when adopting new technologies, coding languages, and platforms. FREE ACCESS
  • Locked
    12.  Cloud Application Security
    4m 3s
    Upon completion of this video, you will be able to describe secure coding architecture for deploying cloud applications. FREE ACCESS
  • Locked
    13.  Secure Coding Practices
    3m 59s
    After completing this video, you will be able to describe practical approaches to secure coding practices. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 17s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 6 users Rating 4.8 of 6 users (6)
Rating 4.5 of 128 users Rating 4.5 of 128 users (128)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 125 users Rating 4.6 of 125 users (125)
Rating 4.5 of 186 users Rating 4.5 of 186 users (186)
Rating 4.3 of 39 users Rating 4.3 of 39 users (39)