Learn the practical steps software developers can take, even if they have limited resources, to implement secure software.
Geared towards software developers, DevOps professionals, software engineers, web application developers, and others interested in learning how to develop secure software, this course focuses on practical steps that can be taken, even with limited resources, to improve information security.
This course will enable software developers to create and maintain systems that are much harder to successfully attack, reduce the damage when attacks are successful, and speed the response so that any latent vulnerabilities can be rapidly repaired.
What you’ll learn:
This course focuses on key implementation issues: input validation (such as why allowlists should be used and not denylists), processing data securely, calling out to other programs, sending output, and error handling. It focuses on practical steps that you (as a developer) can take to counter the most common kinds of attacks.
- Chapter 1. Input Validation
- Chapter 2. Processing Data Securely
- Chapter 3. Calling Other Programs
- Chapter 4. Sending Output
- Final Exam (Verified Track only)
Length: 7 weeks
Effort: 1-2 hours per week