Ultimate Application Security
Building security into your applications
Cyber Security,IT & Software,Network Security
Lectures -66
Duration -8.5 hours
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
This course will familiarize you with the common vulnerabilities that plague developed code as outlined in publications like the OWASP Top 10 and SANS Top 25. You will understand what type of development behaviors lead to vulnerabilities and how to avoid those behaviors when creating secure code. You will learn how to perform a threat model on development features to understand what threats could impact your code, where they come from and how to mitigate them. You will also review and operate analysis tools that are available to developers in order to analyze their code and discover vulnerabilities, allowing you to correct them early in the development life cycle. Finally you will understand how application security fits in an overall cyber security program.
Goals
What will you learn in this course:
- Learn to become a software security guru
- Understand the OWASP Top 10 and other support from industry
- Develop a threat model and understand the risks to an architecture
- Understand the role of security scanning tools in an SLDC
- Rate security vulnerabilities using standard processes
- Apply your knowledge to correct common security vulnerabilities
- Learn how software security fits in the overall organizationÂ
Prerequisites
What are the prerequisites for this course?
- Basic software development knowledge
- Understanding of IT systems and how software is developed, deployed, and managed in an environment
- Basic understanding of development pipelines and the software development lifecycle
Curriculum
Check out the detailed breakdown of what’s inside the course
Introduction
4 Lectures
- Introduction 08:52 08:52
- SSDLC Terms 08:08 08:08
- Goals 18:31 18:31
- WebGoat 10:29 10:29
Introduction to OWASP Top 10 and more terms
6 Lectures
Deep dive in to the OWASP Top 10
10 Lectures
Defensive Tools
11 Lectures
Session Management
7 Lectures
Risk Rating and Threat Modeling
8 Lectures
Encryption and Hashing
7 Lectures
Frameworks and Processes
5 Lectures
Security scanning and testing
7 Lectures
Conclusion
1 Lectures
Instructor Details
Derek Fisher
Throughout my professional career, I have established a reputation as a transformational product security head who is capable of developing and implementing an information security program, which includes procedures and policies designed to protect enterprise communications, systems and assets from both internal and external threats. My expertise encompasses all aspects of information security management, product security management, vulnerability management, risk assessment & mitigation, infrastructure & cloud security, cyber security assessment, and training & development. Further, my ability to build consensus among executive teams and stakeholders to promote transparency and influence positive change has been repeatedly proven.
Course Certificate
Use your certificate to make a career change or to advance in your current career.
Our students work
with the Best
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe nowOnline Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now