Module 01 – SECURITY IN SOFTWARE
- Workbook (Pdf)
- Overview
- Prior Knowledge And Expectations
- Gather Software Requirements
- Assignment: Identity Requirments
- Activity: Identify Requirements
- Factors That Undermine Software Security
- Software Vulnerabilities And Attack Phases
- Attack Patterns
- Assignment: Find Vulnerabilities
- Activity: Find Vulnerabilities
- Assignment: New Password Requirements
- Activity: New Password Requirements
- Assignment: Hashing Passwords
- Activity: Hashing Passwords
- Vulnerability Intelligence
- Assignment: Vulnerability Search
- Activity: Vulnerability Search
- Review Quiz (Number of attempts allowed: Unlimited)
Module 03 – DESIGNING FOR SECURITY
- Workbook (Pdf)
- Principles Of Secure Design
- Avoid Common Mistakes
- Assignment: Common Security Design Flaws
- Activity: Common Security Design Flaws
- Understand Risk And Threats
- Risk Response Strategies
- Exploit Countermeasures
- Review Quiz (Number of attempts allowed: Unlimited)
Module 05 – IMPLEMENTING COMMON PROTECTIONS
- Workbook (Pdf)
- Secure Session Management
- Users, Protections And Passwords
- Encryption And Data Protections
- Error Handling And Protections
- Review Quiz (Number of attempts allowed: Unlimited)
Module 02 – HANDLING VULNERABILITIES
- Workbook (Pdf)
- Bugs In Software
- External Libraries And Services
- Handling Errors Securely
- Human-Related Security
- Security Requirements And Design
- Security Through The Software Lifecycle
- Assignment: Exploring Leftover Artifacts
- Activity: Exploring Leftover Artifacts
- Review Quiz (Number of attempts allowed: Unlimited)
Module 04 – DEVELOPING SECURE CODE
- Workbook (Pdf)
- Guidelines For Secure Coding
- Buffer Overflows And Prevention
- Race Conditions
- Assignment Using Locks Remediate Race Condition
- Activity Using Locks To Remediate Race Condition
- OWASP Top Ten Platform Vulnerabilities
- Web Application Vulnerabilities Deep Dive
- Mobile Application Vulnerabilities Deep Dive
- IoT Vulnerabilities Deep Dive
- Desktop Vulnerabilities Deep Dive
- Privacy Vulnerability Defects
- Review Quiz (Number of attempts allowed: Unlimited)
Module 06 – TESTING AND MAINTAINING SOFTWARE SECURITY
- Workbook (Pdf)
- Testing Software For Security
- Monitoring And Logging Of Production Applications
- Review Quiz (Number of attempts allowed: Unlimited)