Secure Software Development: Implementation
About this Course
Modern software is under constant attack, but many software developers have never been told how to effectively counter those attacks. This course works to solve that problem, by explaining the fundamentals of developing secure software. Geared towards software developers, DevOps professionals, software engineers, web application developers, and others interested in learning how to develop secure software, this course focuses on practical steps that can be taken, even with limited resources to improve information security. This course will enable software developers to create and maintain systems that are much harder to successfully attack, reduce the damage when attacks are successful, and speed the response so that any latent vulnerabilities can be rapidly repaired. This course focuses on key implementation issues: input validation (such as why allowlists should be used and not denylists), processing data securely, calling out to other programs, sending output, and error handling. It focuses on practical steps that you (as a developer) can take to counter the most common kinds of attacks. This is the second of the three courses in the Secure Software Development Fundamentals Professional Certificate program, and was developed by the Open Source Security Foundation (OpenSSF), a project of the Linux Foundation focused on securing the open source ecosystem.Created by: The Linux Foundation
Level: Introductory

Related Online Courses
Electronic products bring countless benefits to society, but their production and waste treatment also lead to numerous negative environmental and economic impacts. Since E-waste is the world’s f... more
Deep learning es un área de reciente creación con una enorme popularidad. Deep learning busca el aprendizaje a partir de grandes volúmenes de datos y con ayuda de redes neuronales de gran ta... more
Consolidar tus estrategias con enfoque social tiene gran valor: por un lado, estás mejorando la calidad de vida en un territorio, y por otro, estás influyendo positivamente para que otras p... more
As Cloud Computing shapes businesses of all sizes, it is vital to understand the technologies behind cloud infrastructure, both public and private. This course, part of the Cloud Computing... more
As RISC-V has made it easier to bring up processor chipsets, the need for compiler engineers in the RISC-V ecosystem has increased. There is an implicit need for toolchain experts who can help... more