Secure Coding Fundamentals
Rated 3.5/5 based on 11 customer reviews

Secure Coding Fundamentals

Available: Out of Stock
$0.00

Request Info
This path helps you understand software vulnerabilities and how to recognize them in code, demonstrates how they are exploited by attackers (including real-world case studies of vulnerable applications in production), and describes ways by which the vulnerabilities can be mitigated.



Skill Assessment

Skill assessment | 20 questions

See how your secure coding skills stack up against other professionals in your field.

Python Code Security Cyber Range

Cyber range | 10 labs

Gain practical experience and develop your secure Python coding skills through 10 hands-on labs in the Python Code Security Cyber Range.

Secure Coding Fundamentals Project

Project | 2 hours 8 minutes

Practice your secure coding skills by solving challenges

Introduction to Secure Coding Fundamentals

Course | 6 minutes

This course introduces the need for secure coding and the tools used in this learning path.

Buffer Overflows

Course | 50 minutes

This course introduces the buffer overflow vulnerability, its exploitation and possible mitigations.

Integer Overflows and Underflows

Course | 53 minutes

This course introduces integer overflow and underflow vulnerabilities, their exploitation and possible mitigations.

Race Conditions

Course | 48 minutes

This course introduces race conditions, their exploitation and possible mitigations

Format String Vulnerabilities

Course | 32 minutes

This course introduces format string vulnerabilities, their exploitation and possible mitigations.

Command Injection

Course | 39 minutes

This course introduces command injection vulnerabilities, their exploitation and possible mitigations.

Least Privilege

Course | 33 minutes

This course introduces the principle of least privilege and its importance in secure coding.

Credential Management

Course | 1 hour

This course describes how poor credential management can make an application vulnerable to attack, how it can be exploited and how to manage credentials properly.

Cryptography

Course | 40 minutes

This course discusses how the poor use of cryptography can leave an application vulnerable to attack and how it can be exploited, as well as potential mitigations.

SQL Injection

Course | 43 minutes

This course introduces SQL injection vulnerabilities, their exploitation and possible mitigations.

Cross-Site Scripting

Course | 31 minutes

This course introduces cross-site scripting vulnerabilities, their exploitation and possible mitigations.

Cross-Site Request Forgery

Course | 23 minutes

This course introduces cross-site request forgery vulnerabilities, their exploitation and possible mitigations.

Poor HTTP Usage

Course | 43 minutes

This course describes how poor use of HTTP and HTML can be exploited, as well as possible mitigations.

Error Handling

Course | 27 minutes

This course describes how poor error handling can be exploited and possible mitigations for this problem.

This path helps you understand software vulnerabilities and how to recognize them in code, demonstrates how they are exploited by attackers (including real-world case studies of vulnerable applications in production), and describes ways by which the vulnerabilities can be mitigated.



Skill Assessment

Skill assessment | 20 questions

See how your secure coding skills stack up against other professionals in your field.

Python Code Security Cyber Range

Cyber range | 10 labs

Gain practical experience and develop your secure Python coding skills through 10 hands-on labs in the Python Code Security Cyber Range.

Secure Coding Fundamentals Project

Project | 2 hours 8 minutes

Practice your secure coding skills by solving challenges

Introduction to Secure Coding Fundamentals

Course | 6 minutes

This course introduces the need for secure coding and the tools used in this learning path.

Buffer Overflows

Course | 50 minutes

This course introduces the buffer overflow vulnerability, its exploitation and possible mitigations.

Integer Overflows and Underflows

Course | 53 minutes

This course introduces integer overflow and underflow vulnerabilities, their exploitation and possible mitigations.

Race Conditions

Course | 48 minutes

This course introduces race conditions, their exploitation and possible mitigations

Format String Vulnerabilities

Course | 32 minutes

This course introduces format string vulnerabilities, their exploitation and possible mitigations.

Command Injection

Course | 39 minutes

This course introduces command injection vulnerabilities, their exploitation and possible mitigations.

Least Privilege

Course | 33 minutes

This course introduces the principle of least privilege and its importance in secure coding.

Credential Management

Course | 1 hour

This course describes how poor credential management can make an application vulnerable to attack, how it can be exploited and how to manage credentials properly.

Cryptography

Course | 40 minutes

This course discusses how the poor use of cryptography can leave an application vulnerable to attack and how it can be exploited, as well as potential mitigations.

SQL Injection

Course | 43 minutes

This course introduces SQL injection vulnerabilities, their exploitation and possible mitigations.

Cross-Site Scripting

Course | 31 minutes

This course introduces cross-site scripting vulnerabilities, their exploitation and possible mitigations.

Cross-Site Request Forgery

Course | 23 minutes

This course introduces cross-site request forgery vulnerabilities, their exploitation and possible mitigations.

Poor HTTP Usage

Course | 43 minutes

This course describes how poor use of HTTP and HTML can be exploited, as well as possible mitigations.

Error Handling

Course | 27 minutes

This course describes how poor error handling can be exploited and possible mitigations for this problem.