Programming Foundations: Secure Coding

Go to class
Write Review

Free Online Course: Programming Foundations: Secure Coding provided by LinkedIn Learning is a comprehensive online course, which lasts for 1-2 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Programming Foundations: Secure Coding is taught by Frank P Moley III.

Overview
  • Learn how to incorporate security into the software development life cycle. Add secure coding practices to agile processes to protect data and prevent recurring flaws.

    Learn how to incorporate security into the software development life cycle. Move security into your design and build phases by identifying common insecure code issues and embracing the mindset of a security professional. In this course, security architect Frank Moley provides a basic understanding of secure coding practices. Learn how to understand your attackers and risks and mitigate issues at critical junctures in your code, including thick app, client, and server interactions. Plus, explore how to prevent unauthorized access and data leaks with authentication and cryptography. Frank closes with an overview of security in each phase of the software development life cycle, and next steps for strengthening the security posture of your applications.

Syllabus
  • Introduction

    • Implement secure code with your team
    • What you need to know
    1. Security and Risk Overview
    • The goal of secure coding
    • Understand an attacker
    • Break what you build
    • Understand your risks
    • Document what you understand
    2. Web Client Server Interaction Code Issues
    • Input validation issues
    • Communication channel issues
    • Session management issues
    3. Thick App and Client-Server Interaction Issues
    • Error handling issues
    • Logging and output issues
    • Internal data management issues
    • Configuration issues
    • Database issues
    • File and I/O issues
    • Memory management issues
    • Dependency issues
    4. Crypto and Security Misuse Issues
    • Authentication and password issues
    • Authorization and access control issues
    • Cryptography issues
    5. Security in the SDLC
    • Embrace security in design
    • Embrace security in development
    • Embrace security in testing
    • Embrace security in deployment
    • Implement best practices
    Conclusion
    • Next steps