YoVDO

Develop Securely

Offered By: Salesforce via Trailhead

Tags

Software Development Courses Cybersecurity Courses Injection Attacks Courses Threat Modeling Courses OWASP Top 10 Courses

Course Description

Overview

Learn about cybersecurity pillars, web vulnerabilities, threat modeling, the secure development lifecycle, and more.
  • Learn about cybersecurity pillars and web application security.
  • Build security into the development lifecycle.
  • Learn about security threats and how to prevent them.
  • Learn about privileged user access and responsibilities.

Syllabus

  • Security Principles
    • Implement Security Fundamentals
    • Learn the OWASP Top 10
    • Prevent Cross-Site Scripting and Injection Attacks
    • Prevent Extensible Markup Language External Entity attacks
    • Secure Your Organization’s Internal Resources
  • Secure Development Lifecycle
    • Use a Secure Development Lifecycle
    • Start With a Security Assessment
    • Practice Security by Design
    • Test and Verify Securely
    • Maintain Security Post Release
  • Threat Modeling Fundamentals
    • Learn Threat Modeling Fundamentals
    • Create a Threat Model
    • Spot the Threats
    • Mitigate the Threats
  • Privileged User Responsibilities
    • Manage Privileged Users
    • Prevent Privileged Access Vulnerabilities

Tags

Related Courses

Fundamentos del Internet de las cosas (IoT): Seguridad I
Galileo University via edX
Mobile Payment Security
New York University (NYU) via edX
Information Security - Introduction to Information Security
New York University (NYU) via edX
Penetration Testing - Discovering Vulnerabilities
New York University (NYU) via edX
Planning a Security Incident Response
Microsoft via edX