Secure Software Implementation for CSSLP®
Offered By: Pluralsight
Course Description
Overview
Many application vulnerabilities are the result of coding errors. This course will teach you how to identify and prevent common security vulnerabilities needed for the Certified Secure Software Lifecycle Professional examination.
The mistakes that lead to software vulnerabilities are often well-known and documented, however many application developers continue to write insecure code. In this course, Secure Software Implementation for CSSLP®, you’ll learn to identify common software threats and vulnerabilities and avoid common software mistakes. First, you’ll explore secure coding practices. Next, you’ll discover the use of software security controls. Finally, you’ll learn how to analyze software for vulnerabilities. When you’re finished with this course, you’ll have the skills and knowledge of secure software implementation needed for the Certified Secure Software Lifecycle Professional examination.
The mistakes that lead to software vulnerabilities are often well-known and documented, however many application developers continue to write insecure code. In this course, Secure Software Implementation for CSSLP®, you’ll learn to identify common software threats and vulnerabilities and avoid common software mistakes. First, you’ll explore secure coding practices. Next, you’ll discover the use of software security controls. Finally, you’ll learn how to analyze software for vulnerabilities. When you’re finished with this course, you’ll have the skills and knowledge of secure software implementation needed for the Certified Secure Software Lifecycle Professional examination.
Syllabus
- Course Overview 2mins
- Secure Coding Practices 57mins
- Software Code Risks 16mins
- Secure Code Analysis 19mins
- Domain Summary 3mins
Taught by
Kevin Henry
Related Courses
Unlocking Information Security II: An Internet PerspectiveTel Aviv University via edX Cybersecurity Capstone: Breach Response Case Studies
IBM via Coursera Complete Ethical Hacking Bootcamp
Udemy Cyber Security Advanced Persistent Threat Defender Preview
Udemy Performing Threat Modeling with the PASTA Methodology
Pluralsight