Secure Software Development: Verification and More Specialized Topics
About this Course
Modern software is under constant attack, but many software developers have never been told how to effectively counter those attacks. This course works to solve that problem, by explaining the fundamentals of developing secure software. Geared towards software developers, DevOps professionals, software engineers, web application developers, and others interested in learning how to develop secure software, this course focuses on practical steps that can be taken, even with limited resources to improve information security. This course will enable software developers to create and maintain systems that are much harder to successfully attack, reduce the damage when attacks are successful, and speed the response so that any latent vulnerabilities can be rapidly repaired. This course discusses how to verify software for security. In particular, it discusses the various static and dynamic analyses approaches, as well as how to apply them (e.g., in a continuous integration pipeline). It also discusses more specialized topics, such as the basics of how to develop a threat model and how to apply various cryptographic capabilities. This is the third of the three courses in the Secure Software Development Fundamentals Professional Certificate program, and was developed by the Open Source Security Foundation (OpenSSF), a project of the Linux Foundation focused on securing the open source ecosystem. The training courses included in this program focus on practical steps that you (as a developer) can take to counter most common kinds of attacks.Created by: The Linux Foundation
Level: Introductory

Related Online Courses
Die digitale Welt mit dem Thymio Roboter entdecken In diesem Kurs entwickeln Sie das Verständnis der grundlegenden Mechanismen eines Roboters wie Thymio, seiner Programmierung mit verschiedenen ... more
In this course you will learn the tools, techniques and concepts needed to build a basic iOS app, from scratch. You will be introduced to the Swift programming language and learn how to utilise the... more
Real time operating systems (RTOS) play an important role in any embedded system, enabling users to control the time critical functions required to be handled within specific timeframes for the... more
In this course, we build upon the knowledge we built up on cache side-channel attacks and transient-execution attacks, as well as the side-channel and security mindset. We again go beyond... more
With today's increasing challenges of dealing with more aggressive and persistent threat actors, while also being inundated with information that is full of misinformation and false flags across... more