Secure Software Design

(OAKCC-SSD.AG1)
Lessons
Lab
TestPrep
311 Reviews
Get A Free Trial

Skills You’ll Get

1

Introduction

  • The World Turned Upside Down
  • The Lingo
  • The Usual Suspects
  • The Many Hats of Hackers
  • The Tools of the Trade
  • Fighting Fire
  • Changing the Design
  • Red vs. Blue
  • The Shape of Things
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
2

Current and Emerging Threats

  • The Human Factor
  • The Network
  • The Operating System Environment
  • Data Management
  • Data-Centric Threats
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
3

The Network Environment

  • Introducing Eve
  • The Science of Secrecy
  • Eve Unleashed
  • Malicious Modifications and Insidious Insertions
  • Play It Again, Eve
  • Eve in the Middle
  • Making the Connection
  • Roll Up the Welcome Mat
  • The Why in What and How
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
4

The Operating System Environment

  • What Is Operating System Security?
  • Common Operating Systems
  • Operating System Threats
  • Operating System Defense Tactics
  • Auditing and Monitoring
  • Backup and Redundancy
  • Remote Access Security
  • Virtualization
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
5

The Database Environment

  • Database Fundamentals
  • Conceptual Design
  • The Logical Design
  • The Physical Design
  • The User Interface
  • Web Applications and the Internet
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
6

Programming Languages

  • Language Barriers
  • Buffer Bashing
  • Good Input
  • Good Output
  • Inherent Inheritance and Overdoing Overloads
  • The Threatdown
  • Deployment Issues
  • 13.7.1 Threat Risk Modeling [OWASP Web Resource]
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
7

Security Requirements Planning

  • 14.0a - SDLC Introduction
  • You, Me, and the SDLC
  • Establishing Stakeholders
  • Gathering Requirements
  • 14.3a - SDLC Requirements Analysis
  • 14.3b - SDLC Design
  • 14.3c - SDLC Construction - Implementation
  • Functional and Nonfunctional Security
  • 14.4a - SDLC Testing
  • 14.4b - SDLC Installation
  • 14.4c - SDLC Operation
  • Establishing Scope
  • 14.5a - SDLC Maintenance
  • 14.5b - SDLC Recap
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
8

Vulnerability Mapping

  • Use Case Construction and Extension
  • Managing Misuse
  • Off the Map
  • Sequence Diagrams and Class Analysis
  • Data Planning
  • Knowing Your Boundaries
  • Examining Communication, Activity, and State Diagrams
  • Vulnerability Mapping
  • Complete Business System Specifications
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
9

Development and Implementation

  • Architecture Decision
  • Software Sources
  • Watch Your Language
  • Class Security Analysis
  • Procedural Security
  • Modular Mayhem
  • The Life of Data
  • Attack Surface Reduction
  • Document, Document, Document
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
10

Application Review and Testing

  • Static Analysis
  • Dynamic Analysis
  • Casing the Joint
  • The Takedown
  • Never Stop at One
  • Hardening the System
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
11

Incorporating SSD with the SDLC

  • The Incident Response Plan
  • The Final Security Review
  • Into the Wild
  • Review and React
  • A Culture of Security
  • Integration Tools
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
12

Personnel Training

  • The Information Security Audience
  • An Organization’s Culture in the Web 2.0 Era
  • Information Assurance Curriculum Content
  • Security Training Delivery Methods
  • Implementing a Training Solution
  • Enforcing Computer Policy and Computer Crime Investigations
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
13

A Culture Of Security

  • Confidentiality, Integrity, and Availability
  • Driving the Development Process with Consistency
  • Secure Software Design—Legal Environment
  • Security Policy in the Organization
  • Enforcing Security Policy
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
14

Web Application Threats

  • The Client at Risk
  • The Biggest Threats to Web Applications
  • JavaScript and AJAX
  • Adobe Flash
  • ActiveX
  • Simplify, Restrict, and Scrub
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
15

Secure Data Management

  • Modern Threats to Database Security
  • Managing Roles and Access
  • Database Auditing
  • Database Backup and Recovery Strategy
  • Data in the Cloud Environment
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
16

Zero Day And Beyond

  • Prediction Through Penetration Testing
  • The Insider Threat and Beyond
  • Mitigation to Defend Against the Unknown
  • The Organization Incident Response
  • The Business Continuity Plan
  • Becoming and Staying Proactive
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
17

Practice Labs

1

The Network Environment

  • Identifying Vulnerabilities in an Application
  • Cracking a Password Hash
  • Fixing a Password Hash Vulnerability
2

The Database Environment

  • Protecting Database Access
3

Vulnerability Mapping

  • Identifying Vulnerabilities in a Software Project
  • Finding Common Web Vulnerabilities
4

Application Review and Testing

  • Examining the Project Files
  • Identifying Software Defects and Misconfiguration
  • Reviewing Error Handling
5

Personnel Training

  • Managing People Risks
6

A Culture Of Security

  • Designing for Security
7

Web Application Threats

  • Managing Software Development Process Risks
8

Secure Data Management

  • Protecting Data in Transit and at Rest
  • Protecting Sensitive Data and Functions
9

Practice Labs

  • Performing a Memory-Based Attack
  • Improving Error Handling
  • Performing Manual Inspection and Review
  • Performing Code Analysis
  • Using a Test Suite to Automate Unit Testing
  • Monitoring and Logging a Deployed Application
  • Handling Privacy Defects
  • Handling Authentication and Authorization Defects
  • Staging a Persisted XSS Attack on an Administrator Function

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Related Courses

All Courses
scroll to top