Developing Secure Software
Offered By: LinkedIn Learning
Course Description
Overview
Explore the frameworks, tools, and patterns that you need to build secure software.
Syllabus
Introduction
- Building security into software development
- What You Should Know
- What is software security?
- Significance of software security
- Software security vocabulary
- Software security risk management
- Software Security Resources
- Threats to software security
- Hardware level threats
- Code level threats
- Detailed design level threats
- Architectural level threats
- Requirements level threats
- Threat modeling and tools
- Introduction to secure design
- Security tactics
- Security patterns
- Security vulnerabilities
- Architectural analysis for security
- Software security anti-patterns
- Case Study: Setting the Stage
- Case Study: Tactic-Oriented Architectural Analysis
- Case Study: Pattern-Oriented Architectural Analysis
- Case Study: Vulnerability-Oriented Architectural Analysis
- Introduction to secure coding
- Buffer overflow attacks
- Buffer overflow countermeasures
- Broken authentication and session management
- Broken authentication and session management countermeasures
- Insecure direct object references
- Insecure direct object references countermeasures
- Sensitive information exposure
- Sensitive information exposure countermeasures
- Other secure coding leading practices
- Testing for security
- Static analysis
- Static analysis tools
- Dynamic analysis
- Dynamic analysis tools
- Penetration testing
- Penetration testing tools
- Vulnerability management
- Vulnerabilty management tools
- DevOps and Software Security
- Cloud Security
- Developer-Friendly Software Security
- IoT and Software Security
- Rules and regulations
- Software security certifications
- Next Steps for developing secure software
Taught by
Jungwoo Ryoo
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent