What you'll learn:
- Understand the core concepts of security, including encoding, encryption, and serialization
- Recognize the importance of version control in maintaining secure software development and managing sensitive information
- Apply secure coding practices, such as mitigating reflection attacks, handling data types securely, and avoiding custom encryption implementations
- Effectively store and protect data using techniques such as hashing, salting, and transparent data encryption
- Identify and prevent common attacks as outlined in the OWASP Top Ten for 2021, including broken access control, cryptographic failures, and injection attacks
- Gain familiarity with security tools, such as OWASP ZAP, and the value of penetration testing for assessing application security
- Develop a comprehensive understanding of security logging, monitoring, and best practices for secure software design and data integrity
Principles of Secure Coding offers a comprehensive exploration of secure coding practices, emphasizing the importance of incorporating security throughout the entire development process. This course will equip you with the skills and mindset necessary to protect your applications against potential threats, setting you on the path towards developing robust and resilient software.
Dive into essential security concepts such as authentication, authorization, encryption, and encoding. Learn the importance of version control and best practices for maintaining sensitive information. Engage with real-life and fictional security horror stories, including an exclusive tale from YouTube sensation Tom Scott, to gain insight into the potential consequences of insecure coding.
Explore secure coding techniques using C# as our primary language while emphasizing broader applicability to other programming languages. Delve into methods for safeguarding data, preventing information leaks, and mitigating vulnerabilities. Develop an understanding of security testing and code review processes to ensure your applications remain secure and compliant.
Continuing the course, we'll investigate the OWASP Top Ten security risks for 2021, enabling you to recognize and address recurring security issues. By diving deep into these prevalent concerns, you'll gain invaluable insight into the mindset and thought processes that often lead to security problems.
New!A bonus module examining three new online authentication methods and how they work, as well as how they fit into the context of encryption and security. Have you ever wondered how Google or Microsoft Authenticator works?We will dig into what is happening under the covers.
Seize the opportunity to enhance your software development skills with this course. Enroll today and propel your skills to new heights!