Home| All soft| Last soft| Your Orders| Customers opinion| Helpdesk| Cart

Program Search:


Shopping Cart:




*Note: Minimum order price: €20
We Recommend:

Lynda.com Techniques for Developing Secure Software €10 buy download

2015
Lynda
Jungwoo Ryoo
1:01
English

Software developers are constantly told to use secure coding practices. Luckily, with today's tools, secure code doesn't take a lot of time or effort. There are security frameworks (authentication, authorization, etc.) developers can use as their own. There are also static and dynamic code analysis tools to test code. Plus, with security patterns that can be implemented at the design level—before coding ever begins—you can make sure you're not reinventing the wheel.
Jungwoo Ryoo is a faculty member teaching cybersecurity and information technology at Penn State. In this course, he'll introduce secure software development tools and frameworks and teach secure coding practices such as input validation, separation of concerns, and single access point. He'll also show how to recognize different kinds of security threats and fortify your code. Plus, he'll help you put a system in place to test your software for any overlooked vulnerabilities.

Introduction
Welcome
1. Understanding Software Security
What is software security?
Significance of software security
Software security vocabulary
Software security risk management
Software security resources
2. Software Security Threats
Hardware-level threats
Code-level threats
Detailed design-level threats
Architectural-level threats
Requirements-level threats
Threat modeling and tools
3. Secure Software Design
Introduction to secure design
Security tactics
Security patterns
Security vulnerabilities
Architectural analysis for security
Case study: Setting the Stage
Case study: Tactic-Oriented Architectural Analysis
Case study: Pattern-Oriented Architectural Analysis
Case study: Vulnerability-Oriented Architectural Analysis
Software security anti-patterns
4. Secure Coding
Introduction to secure coding
Buffer overflow attacks
Buffer overflow countermeasures
Broken authentication and session management
Broken authentication and session management countermeasures
Insecure direct object references
Insecure direct object references countermeasures
Sensitive information exposure
Sensitive data exposure countermeasures
Other secure coding best practices
5. Testing for Security
Testing for security
Static analysis
Exploring tools for static analysis
Dynamic analysis
Exploring tools for dynamic analysis
Penetration testing
Exploring tools for penetration testing
Vulnerability management
Exploring tools for vulnerabilty management
Conclusion
Next steps



Download File Size:161.3 MB


Lynda.com Techniques for Developing Secure Software
€10
Customers who bought this program also bought:

Home| All Programs| Today added Progs| Your Orders| Helpdesk| Shopping cart      





9327 Fantasy & Sci-Fi eBooks Collection 9327 PDF Books eBook €60


Cambridge University History Collection PDF eBooks €100

                   





Intuit QuickBooks Enterprise Solutions 2021 €40


Mindjet MindManager 2022 €22


Chief Architect Premier X13 €50






DxO PhotoLab 5 ELITE €25


SketchUp Pro 2022 €30


Corel Painter 2023 €40