Secure Software Development: Requirements, Design, and Reuse

About this Course

Modern software is under constant attack, but many software developers have never been told how to effectively counter those attacks. This course works to solve that problem, by explaining the fundamentals of developing secure software. Geared towards software developers, DevOps professionals, software engineers, web application developers, and others interested in learning how to develop secure software, this course focuses on practical steps that can be taken, even with limited resources, to improve information security. This course will enable software developers to create and maintain systems that are much harder to successfully attack, reduce the damage when attacks are successful, and speed the response so that any latent vulnerabilities can be rapidly repaired. This course discusses the basics of security, such as what risk management really means. It discusses how to consider security as part of the requirements of a system, and what potential security requirements you might consider. This part then discusses how to design software to be secure, including various secure design principles that will help you avoid bad designs and embrace good ones. It also discusses how to secure your software supply chain, that is, how to more securely select and acquire reused software (including open source software) to enhance security. This is the first of the three courses in the Secure Software Development Fundamentals Professional Certificate program, and was developed by the Open Source Security Foundation (OpenSSF), a project of the Linux Foundation focused on securing the open source ecosystem. The training courses included in this program focus on practical steps that you (as a developer) can take to counter most common kinds of attacks.

Created by: The Linux Foundation

Level: Introductory


Related Online Courses

We begin with a study of finite automata and the languages they can define (the so-called "regular languages." Topics include deterministic and nondeterministic automata, regular expressions, and... more
Even in the well-accepted indoor temperature range of 20-24°C (68-75°F), people can experience thermal discomfort. Complaints about the indoor thermal environment are one of the major complaints b... more
This course introduces you to NoSQL databases and the challenges they solve. Expert instructors will dive deep into Amazon DynamoDB topics such as recovery, SDKs, partition keys, security and... more
In this course you will learn about the different experiences patients go through in a medical context. The patient journey explores the interaction between the patient and the healthcare providers... more
Water has served and sustained societies throughout history. Understanding the complex and diverse water systems of the past is key to devising sustainable development for the future with regard to... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL