Module 01 – SECURITY IN SOFTWARE

  1. Workbook (Pdf)
  2. Overview
  3. Prior Knowledge And Expectations
  4. Gather Software Requirements
  5. Assignment: Identity Requirments
  6. Activity: Identify Requirements
  7. Factors That Undermine Software Security
  8. Software Vulnerabilities And Attack Phases
  9. Attack Patterns
  10. Assignment: Find Vulnerabilities
  11. Activity: Find Vulnerabilities
  12. Assignment: New Password Requirements
  13. Activity: New Password Requirements
  14. Assignment: Hashing Passwords
  15. Activity: Hashing Passwords
  16. Vulnerability Intelligence
  17. Assignment: Vulnerability Search
  18. Activity: Vulnerability Search
  19. Review Quiz (Number of attempts allowed: Unlimited)

Module 03 – DESIGNING FOR SECURITY

  1. Workbook (Pdf)
  2. Principles Of Secure Design
  3. Avoid Common Mistakes
  4. Assignment: Common Security Design Flaws
  5. Activity: Common Security Design Flaws
  6. Understand Risk And Threats
  7. Risk Response Strategies
  8. Exploit Countermeasures
  9. Review Quiz (Number of attempts allowed: Unlimited)

Module 05 – IMPLEMENTING COMMON PROTECTIONS

  1. Workbook (Pdf)
  2. Secure Session Management
  3. Users, Protections And Passwords
  4. Encryption And Data Protections
  5. Error Handling And Protections
  6. Review Quiz (Number of attempts allowed: Unlimited)

Module 02 – HANDLING VULNERABILITIES

  1. Workbook (Pdf)
  2. Bugs In Software
  3. External Libraries And Services
  4. Handling Errors Securely
  5. Human-Related Security
  6. Security Requirements And Design
  7. Security Through The Software Lifecycle
  8. Assignment: Exploring Leftover Artifacts
  9. Activity: Exploring Leftover Artifacts
  10. Review Quiz (Number of attempts allowed: Unlimited)

Module 04 – DEVELOPING SECURE CODE

  1. Workbook (Pdf)
  2. Guidelines For Secure Coding
  3. Buffer Overflows And Prevention
  4. Race Conditions
  5. Assignment Using Locks Remediate Race Condition
  6. Activity Using Locks To Remediate Race Condition
  7. OWASP Top Ten Platform Vulnerabilities
  8. Web Application Vulnerabilities Deep Dive
  9. Mobile Application Vulnerabilities Deep Dive
  10. IoT Vulnerabilities Deep Dive
  11. Desktop Vulnerabilities Deep Dive
  12. Privacy Vulnerability Defects
  13. Review Quiz (Number of attempts allowed: Unlimited)

Module 06 – TESTING AND MAINTAINING SOFTWARE SECURITY

  1. Workbook (Pdf)
  2. Testing Software For Security
  3. Monitoring And Logging Of Production Applications
  4. Review Quiz (Number of attempts allowed: Unlimited)