Overview
This Specialization is intended for software developers of any level who are not yet fluent with secure coding and programming techniques.Through four courses, you will cover the principles of secure coding, concepts of threat modeling and cryptography and exploit vulnerabilities in both C/C++ and Java languages, which will prepare you to think like a hacker and protect your organizations information. The courses provide ample practice activities including exploiting WebGoat, an OWASP project designed to teach penetration testing.
Syllabus
Course 1: Principles of Secure Coding
- Offered by University of California, Davis. This course introduces you to the principles of secure programming. It begins by discussing the ... Enroll for free.
Course 2: Identifying Security Vulnerabilities
- Offered by University of California, Davis. This course will help you build a foundation of some of the fundamental concepts in secure ... Enroll for free.
Course 3: Identifying Security Vulnerabilities in C/C++Programming
- Offered by University of California, Davis. This course builds upon the skills and coding practices learned in both Principles of Secure ... Enroll for free.
Course 4: Exploiting and Securing Vulnerabilities in Java Applications
- Offered by University of California, Davis. In this course, we will wear many hats. With our Attacker Hats on, we will exploit Injection ... Enroll for free.
- Offered by University of California, Davis. This course introduces you to the principles of secure programming. It begins by discussing the ... Enroll for free.
Course 2: Identifying Security Vulnerabilities
- Offered by University of California, Davis. This course will help you build a foundation of some of the fundamental concepts in secure ... Enroll for free.
Course 3: Identifying Security Vulnerabilities in C/C++Programming
- Offered by University of California, Davis. This course builds upon the skills and coding practices learned in both Principles of Secure ... Enroll for free.
Course 4: Exploiting and Securing Vulnerabilities in Java Applications
- Offered by University of California, Davis. In this course, we will wear many hats. With our Attacker Hats on, we will exploit Injection ... Enroll for free.
Courses
-
This course will help you build a foundation of some of the fundamental concepts in secure programming. We will learn about the concepts of threat modeling and cryptography and you'll be able to start to create threat models, and think critically about the threat models created by other people. We'll learn the basics of applying cryptography, such as encryption and secure hashing. We'll learn how attackers can exploit application vulnerabilities through the improper handling user-controlled data. We'll gain a fundamental understanding of injection problems in web applications, including the three most common types of injection problems: SQL injection, cross-site scripting, and command injection. We'll also cover application authentication and session management where authentication is a major component of a secure web application and session management is the other side of the same coin, since the authenticated state of user requests need to be properly handled and run as one session. We'll learn about sensitive data exposure issues and how you can help protect your customer's data. We'll cover how to effectively store password-related information, and not to store the actual plaintext passwords. We'll participate in coding assignment that will help you to better understand the mechanisms for effectively storing password-related information. Along the way, we’ll discuss ways of watching out for and mitigating these issues and be able have some fun and exploit two different vulnerabilities in a web application that was designed to be vulnerable, called WebGoat.
-
This course introduces you to the principles of secure programming. It begins by discussing the philosophy and principles of secure programming, and then presenting robust programming and the relationship between it and secure programming. We'll go through a detailed example of writing robust code and we'll see many common programming problems and show their connection to writing robust, secure programs in general. We’ll examine eight design principles that govern secure coding and how to apply them to your own work. We’ll discuss how poor design choices drive implementation in coding. We’ll differentiate between informal, formal, and ad hoc coding methods. Throughout, methods for improving the security and robustness of your programs will be emphasized and you will have an opportunity to practice these concepts through various lab activities. A knowledge of the C programming language is helpful, but not required to participate in the lab exercises.
-
This course builds upon the skills and coding practices learned in both Principles of Secure Coding and Identifying Security Vulnerabilities, courses one and two, in this specialization. This course uses the focusing technique that asks you to think about: “what to watch out for” and “where to look” to evaluate and ultimately remediate fragile C++ library code. The techniques you’ll be examining will make your programs perform accurately and be resistant to attempts to perform inaccurately. This is really what the term secure programming means. You will be shown common errors that people make, and then learn how to program more robustly. You will apply tips and best practices to help you improve your programming style and help you to avoid common problems like buffer overflows, which may or may not cause security problems.
-
In this course, we will wear many hats. With our Attacker Hats on, we will exploit Injection issues that allow us to steal data, exploit Cross Site Scripting issues to compromise a users browser, break authentication to gain access to data and functionality reserved for the ‘Admins’, and even exploit vulnerable components to run our code on a remote server and access some secrets. We will also wear Defender Hats. We will dive deep in the code to fix the root cause of these issues and discuss various mitigation strategies. We do this by exploiting WebGoat, an OWASP project designed to teach penetration testing. WebGoat is a deliberately vulnerable application with many flaws and we take aim at fixing some of these issues. Finally we fix these issues in WebGoat and build our patched binaries. Together we will discuss online resources to help us along and find meaningful ways to give back to the larger Application Security community.
Taught by
Joubin Jabbari, Matthew Bishop, PhD and Sandra Escandor-O'Keefe