Developing Secure Software
Overview
Build more secure software by leveraging architectural analysis for security, security frameworks, code analysis and risk analysis tools, and security patterns.
Software developers are constantly told to use secure coding practices. Luckily, with today's tools, secure code doesn't take a lot of time or effort. There are security frameworks (authentication, authorization, etc.) developers can use as their own. There are also static and dynamic code analysis tools to test code. Plus, with security patterns that can be implemented at the design level—before coding ever begins—you can make sure you're not reinventing the wheel.
Jungwoo Ryoo is a faculty member teaching cybersecurity and information technology at Penn State. In this course, he introduces secure software development tools and frameworks and teaches secure coding practices such as input validation, separation of concerns, and single access point. He also shows how to recognize different kinds of security threats and fortify your code. Plus, he helps you put a system in place to test your software for any overlooked vulnerabilities.
Software developers are constantly told to use secure coding practices. Luckily, with today's tools, secure code doesn't take a lot of time or effort. There are security frameworks (authentication, authorization, etc.) developers can use as their own. There are also static and dynamic code analysis tools to test code. Plus, with security patterns that can be implemented at the design level—before coding ever begins—you can make sure you're not reinventing the wheel.
Jungwoo Ryoo is a faculty member teaching cybersecurity and information technology at Penn State. In this course, he introduces secure software development tools and frameworks and teaches secure coding practices such as input validation, separation of concerns, and single access point. He also shows how to recognize different kinds of security threats and fortify your code. Plus, he helps you put a system in place to test your software for any overlooked vulnerabilities.
Syllabus
Introduction
- Building security into software development
- What you should know
- What is software security?
- Significance of software security
- Software security vocabulary
- Software security risk management
- Software security resources
- Threats to software security
- Hardware-level threats
- Code-level threats
- Detailed design-level threats
- Architectural-level threats
- Requirements-level threats
- Threat modeling and tools
- Introduction to secure design
- Security tactics
- Security patterns
- Security vulnerabilities
- Architectural analysis for security
- Case study: Setting the Stage
- Case study: Tactic-Oriented Architectural Analysis
- Case study: Pattern-Oriented Architectural Analysis
- Case study: Vulnerability-Oriented Architectural Analysis
- Software security anti-patterns
- Setting the stage
- Buffer overflow attacks
- Buffer overflow countermeasures
- Broken authentication and session management
- Broken authentication and session management countermeasures
- Insecure direct object references
- Insecure direct object references countermeasures
- Sensitive information exposure
- Sensitive data exposure countermeasures
- Other secure coding best practices
- Testing for security
- Static analysis
- Exploring tools for static analysis
- Dynamic analysis
- Dynamic analysis tools
- Penetration testing
- Penetration testing tools
- Vulnerability management
- Vulnerability management tools
- DevOps and software security
- Cloud security
- Developer-friendly software security
- IoT and software security
- Rules and regulations
- Software security certifications
- Next steps and additional resources
Taught by
Jungwoo Ryoo
Related Courses
-
CSSLP Cert Prep: 3 Secure Software Design
-
Software Security
University of Maryland, College Park
4.2 -
Secure Software Development Fundamentals
Linux Foundation
-
Software Design Threats and Mitigations
University of Colorado System
-
Hacking and Patching
University of Colorado System
-
Systems and Application Security
(ISC)²
4.0
Reviews
0.0 rating, based on 0 reviews