Secure Coding Practices Specialization

Instructors: Joubin Jabbari +2 more

What you'll learn

  •   Practice improving the security and robustness of your programs.
  •   Create threat models and apply basic cryptography.
  •   Evaluate and remediate fragile C++ library code.
  •   Exploit common types of injection problems and fix the root causes.
  • Skills you'll gain

  •   Linux
  •   Debugging
  •   Data Security
  •   Threat Modeling
  •   C and C++
  •   Vulnerability Assessments
  •   Authorization (Computing)
  •   Authentications
  •   Java
  •   Programming Principles
  •   Open Web Application Security Project (OWASP)
  •   Encryption
  • Specialization - 4 course series

    This course introduces you to the principles of secure programming. It begins by discussing the philosophy and principles of secure programming, and then presenting robust programming and the relationship between it and secure programming. We'll go through a detailed example of writing robust code and we'll see many common programming problems and show their connection to writing robust, secure programs in general. We’ll examine eight design principles that govern secure coding and how to apply them to your own work. We’ll discuss how poor design choices drive implementation in coding. We’ll differentiate between informal, formal, and ad hoc coding methods. Throughout, methods for improving the security and robustness of your programs will be emphasized and you will have an opportunity to practice these concepts through various lab activities. A knowledge of the C programming language is helpful, but not required to participate in the lab exercises.

    We'll also cover application authentication and session management where authentication is a major component of a secure web application and session management is the other side of the same coin, since the authenticated state of user requests need to be properly handled and run as one session. We'll learn about sensitive data exposure issues and how you can help protect your customer's data. We'll cover how to effectively store password-related information, and not to store the actual plaintext passwords. We'll participate in coding assignment that will help you to better understand the mechanisms for effectively storing password-related information. Along the way, we’ll discuss ways of watching out for and mitigating these issues and be able have some fun and exploit two different vulnerabilities in a web application that was designed to be vulnerable, called WebGoat.

    Identifying Security Vulnerabilities

    Identifying Security Vulnerabilities in C/C++Programming

    Exploiting and Securing Vulnerabilities in Java Applications

    ©2025  ementorhub.com. All rights reserved