Secure Software Design

(OAKCC-SSD.AG1)
Lessons
Lab
TestPrep
311 Reviews
Get A Free Trial

Skills You’ll Get

1

Introduction

  • The World Turned Upside Down
  • The Lingo
  • The Usual Suspects
  • The Many Hats of Hackers
  • The Tools of the Trade
  • Fighting Fire
  • Changing the Design
  • Red vs. Blue
  • The Shape of Things
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
2

Current and Emerging Threats

  • The Human Factor
  • The Network
  • The Operating System Environment
  • Data Management
  • Data-Centric Threats
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
3

The Network Environment

  • Introducing Eve
  • The Science of Secrecy
  • Eve Unleashed
  • Malicious Modifications and Insidious Insertions
  • Play It Again, Eve
  • Eve in the Middle
  • Making the Connection
  • Roll Up the Welcome Mat
  • The Why in What and How
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
4

The Operating System Environment

  • What Is Operating System Security?
  • Common Operating Systems
  • Operating System Threats
  • Operating System Defense Tactics
  • Auditing and Monitoring
  • Backup and Redundancy
  • Remote Access Security
  • Virtualization
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
5

The Database Environment

  • Database Fundamentals
  • Conceptual Design
  • The Logical Design
  • The Physical Design
  • The User Interface
  • Web Applications and the Internet
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
6

Programming Languages

  • Language Barriers
  • Buffer Bashing
  • Good Input
  • Good Output
  • Inherent Inheritance and Overdoing Overloads
  • The Threatdown
  • Deployment Issues
  • 13.7.1 Threat Risk Modeling [OWASP Web Resource]
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
7

Security Requirements Planning

  • 14.0a - SDLC Introduction
  • You, Me, and the SDLC
  • Establishing Stakeholders
  • Gathering Requirements
  • 14.3a - SDLC Requirements Analysis
  • 14.3b - SDLC Design
  • 14.3c - SDLC Construction - Implementation
  • Functional and Nonfunctional Security
  • 14.4a - SDLC Testing
  • 14.4b - SDLC Installation
  • 14.4c - SDLC Operation
  • Establishing Scope
  • 14.5a - SDLC Maintenance
  • 14.5b - SDLC Recap
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
8

Vulnerability Mapping

  • Use Case Construction and Extension
  • Managing Misuse
  • Off the Map
  • Sequence Diagrams and Class Analysis
  • Data Planning
  • Knowing Your Boundaries
  • Examining Communication, Activity, and State Diagrams
  • Vulnerability Mapping
  • Complete Business System Specifications
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
9

Development and Implementation

  • Architecture Decision
  • Software Sources
  • Watch Your Language
  • Class Security Analysis
  • Procedural Security
  • Modular Mayhem
  • The Life of Data
  • Attack Surface Reduction
  • Document, Document, Document
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
10

Application Review and Testing

  • Static Analysis
  • Dynamic Analysis
  • Casing the Joint
  • The Takedown
  • Never Stop at One
  • Hardening the System
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
11

Incorporating SSD with the SDLC

  • The Incident Response Plan
  • The Final Security Review
  • Into the Wild
  • Review and React
  • A Culture of Security
  • Integration Tools
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
12

Personnel Training

  • The Information Security Audience
  • An Organization’s Culture in the Web 2.0 Era
  • Information Assurance Curriculum Content
  • Security Training Delivery Methods
  • Implementing a Training Solution
  • Enforcing Computer Policy and Computer Crime Investigations
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
13

A Culture Of Security

  • Confidentiality, Integrity, and Availability
  • Driving the Development Process with Consistency
  • Secure Software Design—Legal Environment
  • Security Policy in the Organization
  • Enforcing Security Policy
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
14

Web Application Threats

  • The Client at Risk
  • The Biggest Threats to Web Applications
  • JavaScript and AJAX
  • Adobe Flash
  • ActiveX
  • Simplify, Restrict, and Scrub
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
15

Secure Data Management

  • Modern Threats to Database Security
  • Managing Roles and Access
  • Database Auditing
  • Database Backup and Recovery Strategy
  • Data in the Cloud Environment
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
16

Zero Day And Beyond

  • Prediction Through Penetration Testing
  • The Insider Threat and Beyond
  • Mitigation to Defend Against the Unknown
  • The Organization Incident Response
  • The Business Continuity Plan
  • Becoming and Staying Proactive
  • Lesson Summary
  • Lesson Exercise
  • Business Application
  • Critical Thinking
  • Graduate Focus
  • Bibliography
17

Practice Labs

1

The Network Environment

  • Identifying Vulnerabilities in an Application
  • Cracking a Password Hash
  • Fixing a Password Hash Vulnerability
2

The Database Environment

  • Protecting Database Access
3

Vulnerability Mapping

  • Identifying Vulnerabilities in a Software Project
  • Finding Common Web Vulnerabilities
4

Application Review and Testing

  • Examining the Project Files
  • Identifying Software Defects and Misconfiguration
  • Reviewing Error Handling
5

Personnel Training

  • Managing People Risks
6

A Culture Of Security

  • Designing for Security
7

Web Application Threats

  • Managing Software Development Process Risks
8

Secure Data Management

  • Protecting Data in Transit and at Rest
  • Protecting Sensitive Data and Functions
9

Practice Labs

  • Performing a Memory-Based Attack
  • Improving Error Handling
  • Performing Manual Inspection and Review
  • Performing Code Analysis
  • Using a Test Suite to Automate Unit Testing
  • Monitoring and Logging a Deployed Application
  • Handling Privacy Defects
  • Handling Authentication and Authorization Defects
  • Staging a Persisted XSS Attack on an Administrator Function

Related Courses

All Courses
scroll to top