Instructors
Software Development Security
Learning basics of Softwares.Morbi sem erat, molestie ornare nisl mollis, tempor sodales mauris. Cras hendrerit.
You are the target
Many organizations use custom-developed software to achieve their unique business objectives. These custom solutions can present great security vulnerabilities as a result of malicious and/or careless developers who create back doors, buffer overflow vulnerabilities, or other weaknesses that can leave a system open to exploitation by malicious individuals.
Why IT Systems
Organizations develop IT systems to meet important business objectives, such as:
- Improving competitiveness
- Increasing productivity and efficiency Accelerating growth
- Supporting innovation
- Reducing costs
This was according to IT research and advisory company Gartner in a survey of the priorities sought by more than 2,000 chief information officers. The surveyed CIOs see technology strategies as closely related to business strategies.
Who can take this course
- Successful learners in this course typically should have completed some basics of software design and development.
- Basic knowledge of Software development methodologies (not mandatory)
- Have some familiarity with programming, ideally in C/C++ and other “managed” program language (like MS environment or Java).
- Have prior exposure to algorithms.
- Students not familiar with these languages but with others can improve their skills through online web tutorials.
Course Curriculum
Introduction to System Development controls | |||
System Development Methodology Details | 00:05:00 | ||
TOP 10 OWASP Issues | |||
System Development Methodology Details | 00:05:00 | ||
Software Security Issues | |||
Other Software Security Issues | |||
Databases Security | |||
Storing data and information | |||
Secure coding guidelines | |||
Secure Coding Practices | |||
Software Security Assessment |
Course Reviews
No Reviews found for this course.