USC Classifieds>USC Online Courses>Secure Software Development: Implementation

Secure Software Development: Implementation

About this Course

Modern software is under constant attack, but many software developers have never been told how to effectively counter those attacks. This course works to solve that problem, by explaining the fundamentals of developing secure software. Geared towards software developers, DevOps professionals, software engineers, web application developers, and others interested in learning how to develop secure software, this course focuses on practical steps that can be taken, even with limited resources to improve information security. This course will enable software developers to create and maintain systems that are much harder to successfully attack, reduce the damage when attacks are successful, and speed the response so that any latent vulnerabilities can be rapidly repaired. This course focuses on key implementation issues: input validation (such as why allowlists should be used and not denylists), processing data securely, calling out to other programs, sending output, and error handling. It focuses on practical steps that you (as a developer) can take to counter the most common kinds of attacks. This is the second of the three courses in the Secure Software Development Fundamentals Professional Certificate program, and was developed by the Open Source Security Foundation (OpenSSF), a project of the Linux Foundation focused on securing the open source ecosystem.

Created by: The Linux Foundation

Level: Introductory


Related Online Courses

The course introduces the basic elements and trends for performing a through built environment assessment and develops the tools for urban sustainability policy impact analysis. During the first... more
This course introduces the concept of a designer working for themselves and creating their own design-driven brand. It requires learners to apply ideas to a real-life setting. By the end of this... more
In this course, you will discover the supply side of buildings’ energy chain. The first step is to consider how to convert natural resources into the energy needed by buildings: what are the o... more
The biggest asset of today's companies is their data, and data that is mostly stored in online relational databases. Virtually all relational database management systems in use today use SQL as a... more
Il corso intende fornire allo studente i basilari principi geometrici per la progettazione e la gestione del progetto di quelle scene teatrali, che fondano la propria espressività sugli effetti ... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL