Software Engineering, Security and Vulnerabilities
Cybersecurity
| Beginner
- 15 videos | 57m 29s
- Includes Assessment
- Earns a Badge
The principles of software engineering include designing, developing, implementing, and maintaining a software solution. One crucial aspect of software security is to determine if software is safe to release to an organization or public. In this course, you'll explore the Software Development Life Cycle (SDLC) and learn about maturity levels used to define agility and effectiveness of a development solution. Discover how security guidelines can help improve the quality and security of a software development, and explore the importance of staying current with the types and trends of software threats and exploits. Continue to learn about software vulnerabilities while exploring common attacks including buffer overflows, database injection, cross-site scripting, and directory traversal attacks. Lastly, explore how misconfiguration of servers increases the likelihood of attacks, and discover how permissions are used to secure directories used by applications. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDiscuss the principles of software engineering including design, development, implementation, and maintenanceDescribe how to determine if software is safeProvide an overview of the software development life cycle (sdlc)Define maturity levels to define agility and effectiveness of a development solutionRecognize how security guidelines can help improve the quality and security of a software developmentDiscuss the importance of staying current with the types and trends of software vulnerabilitiesProvide an overview of buffer overflow attacks
-
Describe how database injection attacks workDiscuss how cross-side scripting (xss) attacks can be used to poison a webserverProvide an overview of cross-site request forgery (xsrf) attacksRecognize how a directory traversal vulnerability allows an attacker to navigate outside the website directory on a web serverDiscuss how misconfigurations of servers increases the likelihood of attacksDescribe how permissions are used to secure directories used by applicationsProvide an overview of session hijacking attacks
IN THIS COURSE
-
54s
-
46s
-
2m 52s
-
3m 45s
-
3m 4s
-
4m 42s
-
2m 39s
-
5m 52s
-
4m 59s
-
4m 30s
-
4m 22s
-
4m 3s
-
1m 55s
-
3m 17s
-
9m 51s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.