UOP-CYB535: Secure Programming

(UOP-CYB535.AK1)
Lessons
Lab
Lab (Add-on)
TestPrep
Get A Free Trial

Skills You’ll Get

1

Identifying the Need for Security in Your Software Projects

  • Introduction
  • TOPIC A: Identify Security Requirements and Expectations
  • TOPIC B: Identify Factors That Undermine Software Security
  • TOPIC C: Find Vulnerabilities in Your Software
  • TOPIC D: Gather Intelligence on Vulnerabilities and Exploits
2

Handling Vulnerabilities

  • TOPIC A: Handle Vulnerabilities Due to Software Defects and Misconfiguration
  • TOPIC B: Handle Vulnerabilities Due to Human Factors
  • TOPIC C: Handle Vulnerabilities Due to Process Shortcomings
3

Designing for Security

  • TOPIC A: Apply General Principles for Secure Design
  • TOPIC B: Design Software to Counter Specific Threats
4

Developing Secure Code

  • TOPIC A: Follow Best Practices for Secure Coding
  • TOPIC B: Prevent Platform Vulnerabilities
  • TOPIC C: Prevent Privacy Vulnerabilities
5

Implementing Common Protections

  • TOPIC A: Limit Access Using Login and User Roles
  • TOPIC B: Protect Data in Transit and At Rest
  • TOPIC C: Implement Error Handling and Logging
  • TOPIC D: Protect Sensitive Data and Functions
  • TOPIC E: Protect Database Access
6

Testing and Maintaining Software Security

  • TOPIC A: Perform Security Testing
  • TOPIC B: Analyze Code to Find Security Problems
  • TOPIC C: Use Automated Testing Tools to Find Security Problems
  • TOPIC D: Monitor and Log Applications to Support Security
  • TOPIC E: Maintain Security After Deployment
7

About

1

Identifying the Need for Security in Your Software Projects

  • Identifying Vulnerabilities in an Application
  • Cracking a Password Hash
  • Fixing a Password Hash Vulnerability
2

Handling Vulnerabilities

  • Identifying Vulnerabilities in a Software Project
  • Examining the Project Files
  • Identifying Software Defects and Misconfiguration
  • Managing People Risks
  • Managing Software Development Process Risks
3

Designing for Security

  • Designing for Security
4

Developing Secure Code

  • Performing a Memory-Based Attack
  • Finding Common Web Vulnerabilities
  • Handling Privacy Defects
5

Implementing Common Protections

  • Handling Authentication and Authorization Defects
  • Protecting Data in Transit and at Rest
  • Reviewing Error Handling
  • Improving Error Handling
  • Protecting Sensitive Data and Functions
  • Staging a Persisted XSS Attack on an Administrator Function
  • Protecting Database Access
6

Testing and Maintaining Software Security

  • Performing Manual Inspection and Review
  • Performing Code Analysis
  • Using a Test Suite to Automate Unit Testing
  • Monitoring and Logging a Deployed Application

Related Courses

All Courses
scroll to top