Über diesen Kurs

34,235 kürzliche Aufrufe
Zertifikat zur Vorlage
Erhalten Sie nach Abschluss ein Zertifikat
100 % online
Beginnen Sie sofort und lernen Sie in Ihrem eigenen Tempo.
Flexible Fristen
Setzen Sie Fristen gemäß Ihrem Zeitplan zurück.
Stufe „Mittel“

1-2 years of experience with some form of computer programming language like C/C++ or Java.

Ca. 15 Stunden zum Abschließen
Englisch
Untertitel: Englisch

Kompetenzen, die Sie erwerben

CryptographyAuthentication Methodssecure programming
Zertifikat zur Vorlage
Erhalten Sie nach Abschluss ein Zertifikat
100 % online
Beginnen Sie sofort und lernen Sie in Ihrem eigenen Tempo.
Flexible Fristen
Setzen Sie Fristen gemäß Ihrem Zeitplan zurück.
Stufe „Mittel“

1-2 years of experience with some form of computer programming language like C/C++ or Java.

Ca. 15 Stunden zum Abschließen
Englisch
Untertitel: Englisch

von

University of California, Davis-Logo

University of California, Davis

Lehrplan - Was Sie in diesem Kurs lernen werden

Woche
1

Woche 1

5 Stunden zum Abschließen

Foundational Topics in Secure Programming

5 Stunden zum Abschließen
14 Videos (Gesamt 83 min), 3 Lektüren, 2 Quiz
14 Videos
Module 1 Introduction1m
Fundamental Concepts in Security8m
The STRIDE Method Via Example9m
STRIDE Threats In More Detail Via Example4m
Trust Boundaries2m
Cryptography Basics Introduction3m
Cryptography Basics: Block Ciphers9m
Cryptography Basics: Symmetric and Asymmetric Cryptography5m
Cryptography Basics: Hash Functions9m
Cryptography Basics: Application to Threat Models4m
Lab: Threat Model Activity3m
OWASP Top 10 Proactive Controls and Exploits - Part 16m
OWASP Top 10 Proactive Controls and Exploits - Part 29m
3 Lektüren
A Note From UC Davis10m
Welcome to Peer Review Assignments!10m
Reading and Resource20m
1 praktische Übung
Module 1 Quiz30m
Woche
2

Woche 2

3 Stunden zum Abschließen

Injection Problems

3 Stunden zum Abschließen
17 Videos (Gesamt 87 min), 1 Lektüre, 1 Quiz
17 Videos
General Concepts: Injection Problems4m
SQL Injection Problems8m
Mitigating SQL Injection Using Prepared Statements3m
Mitigating SQL Injection Using Stored Procedures3m
Mitigating SQL Injection Using Whitelisting2m
Injection Problems in Real Life5m
Solution Screencast for Lab: Exploit Using WebGoat's SQLi Example7m
Cross-Site Scripting Introduction3m
HTTP and Document Isolation8m
DOM, Dynamically Generating Pages, and Cross-Site Scripting7m
The 3-Kinds of Cross-Site Scripting Vulnerabilities6m
Comparing and Contrasting Cross-Site Scripting Vulnerabilities3m
OWASP Prescribed Cross-site Scripting Prevention Rules - Part 16m
OWASP Prescribed Cross-site Scripting Prevention Rules - Part 26m
Command Injection Problems3m
OWASP Proactive Controls Related to Injections4m
1 Lektüre
Resources20m
1 praktische Übung
Module 2 Quiz30m
Woche
3

Woche 3

4 Stunden zum Abschließen

Problems Arising From Broken Authentication

4 Stunden zum Abschließen
11 Videos (Gesamt 71 min), 1 Lektüre, 1 Quiz
11 Videos
Overview of HTTP Protocol7m
Introduction to Authentication10m
Handling Error Messages During Authentication4m
Introduction to Session Management7m
Enforcing Access Control with Session Management7m
Session Management Threat: Bruteforce Session IDs10m
Session Management Theat: Session Fixation Vulnerabilities3m
Logging and Monitoring3m
Solution for Lab #3: WebGoat’s Session Management Vulnerability9m
OWASP Proactive Controls Related to Session Management and Authentication6m
1 Lektüre
Resources20m
1 praktische Übung
Module 3 Quiz30m
Woche
4

Woche 4

4 Stunden zum Abschließen

Sensitive Data Exposure Problems

4 Stunden zum Abschließen
9 Videos (Gesamt 36 min), 1 Lektüre, 2 Quiz
9 Videos
Introduction to Sensitive Data Exposure Problems5m
Issue 1: Using PII to Compose Session IDs3m
Issue 2: Not Encrypting Sensitive Information2m
Issue 3: Improperly Storing Passwords5m
Slowing Down Password Bruteforce Attacks7m
Issue 4: Using HTTP for Sensitive Client-server4m
OWASP Proactive Controls Related to Sensitive Data Exposure3m
Course Summary1m
1 Lektüre
Resources20m
1 praktische Übung
Module 4 Quiz30m

Bewertungen

Top-Bewertungen von IDENTIFYING SECURITY VULNERABILITIES

Alle Bewertungen anzeigen

Über den Spezialisierung Secure Coding Practices

This Specialization is intended for software developers of any level who are not yet fluent with secure coding and programming techniques.Through four courses, you will cover the principles of secure coding, concepts of threat modeling and cryptography and exploit vulnerabilities in both C/C++ and Java languages, which will prepare you to think like a hacker and protect your organizations information. The courses provide ample practice activities including exploiting WebGoat, an OWASP project designed to teach penetration testing....
Secure Coding Practices

Häufig gestellte Fragen

  • Access to lectures and assignments depends on your type of enrollment. If you take a course in audit mode, you will be able to see most course materials for free. To access graded assignments and to earn a Certificate, you will need to purchase the Certificate experience, during or after your audit. If you don't see the audit option:

    • The course may not offer an audit option. You can try a Free Trial instead, or apply for Financial Aid.

    • The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

  • If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.

  • Yes, Coursera provides financial aid to learners who cannot afford the fee. Apply for it by clicking on the Financial Aid link beneath the "Enroll" button on the left. You'll be prompted to complete an application and will be notified if you are approved. You'll need to complete this step for each course in the Specialization, including the Capstone Project. Learn more.

Haben Sie weitere Fragen? Besuchen Sie das Hilfe-Center für Teiln..