We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Secure Coding with C#

Alexander Tushinsky

This course will teach secure coding practices while using .NET 6.0 and C#, using OWASP recommended security best practices.

Read more

This course will teach secure coding practices while using .NET 6.0 and C#, using OWASP recommended security best practices.

There is a high demand for software developers to produce secure code, yet many don’t know where to begin. In this course, Secure Coding with C#, you’ll learn to write secure code using C# and NET 6 security best practices. First, you'll learn about OWASP, an organization focused on secure code, providing the concepts behind a secure software development lifecycle, and threat modeling. Next, you'll discover OWASP’s key projects that help identify and prevent vulnerabilities within C# code. Finally, you'll explore the main vulnerabilities found in software today, how to identify them, and how to mitigate them within C# code. When you’re finished with this course, you’ll have the skills and mindset to help identify and deal with potential security issues within the software you write.

Enroll now

What's inside

Syllabus

Course Overview
Introduction to Secure Coding
Broken Access Control
Cryptographic Failures
Read more
Injection
Insecure Design
Security Misconfiguration
Vulnerable and Outdated Components
Identification and Authentication Failures
Security Logging and Monitoring Failures
Server-side Request Forgery (SSRF)

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops secure software coding practices using C# and provides a foundation in OWASP best practices
Taught by Alexander Tushinsky, a recognized secure coding and C# expert
Examines the main vulnerabilities found in software today and provides mitigation strategies
Teaches secure coding principles in the context of industry-standard NET 6 security best practices

Save this course

Save Secure Coding with C# to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Secure Coding with C#. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Secure Coding with C# will develop knowledge and skills that may be useful to these careers:
Software Developer
A Software Developer designs, develops, and maintains software applications. Software Developers are in high demand, and this course will help you build a strong foundation in secure coding practices. This course will teach you how to identify and mitigate vulnerabilities in your code, which will make you a more valuable asset to any organization.
Security Analyst
A Security Analyst plans and implements security measures to protect an organization's computer systems and networks. This course will help you build a strong foundation in secure coding practices, which will make you a more valuable asset to any organization.
Information Security Analyst
An Information Security Analyst plans and implements security measures to protect an organization's computer systems and networks. This course will help you build a strong foundation in secure coding practices, which will make you a more valuable asset to any organization.
Cybersecurity Analyst
A Cybersecurity Analyst plans and implements security measures to protect an organization's computer systems and networks. This course will help you build a strong foundation in secure coding practices, which will make you a more valuable asset to any organization.
Security Engineer
A Security Engineer designs, implements, and maintains security systems to protect an organization's computer systems and networks. This course will help you build a strong foundation in secure coding practices, which will make you a more valuable asset to any organization.
Web Security Analyst
A Web Security Analyst analyzes an organization's website and web applications to identify and mitigate security risks. This course will help you build a strong foundation in secure coding practices, which will make you a more effective Web Security Analyst. You will learn how to identify and mitigate vulnerabilities in code, which will make you a valuable asset to any organization.
Application Security Engineer
An Application Security Engineer designs, implements, and maintains security systems to protect an organization's applications. This course will help you build a strong foundation in secure coding practices, which will make you a more effective Application Security Engineer. You will learn how to identify and mitigate vulnerabilities in code, which will make you a valuable asset to any organization.
IT Auditor
An IT Auditor evaluates an organization's computer systems and networks to ensure that they are secure and compliant with regulations. This course will help you build a strong foundation in secure coding practices, which will make you a more effective IT Auditor. You will learn how to identify and mitigate vulnerabilities in code, which will make you a valuable asset to any organization.
Network Security Engineer
A Network Security Engineer designs, implements, and maintains security systems to protect an organization's computer systems and networks. This course will help you build a strong foundation in secure coding practices, which will make you a more effective Network Security Engineer. You will learn how to identify and mitigate vulnerabilities in code, which will make you a valuable asset to any organization.
Cloud Security Engineer
A Cloud Security Engineer designs, implements, and maintains security systems to protect an organization's cloud-based computer systems and networks. This course will help you build a strong foundation in secure coding practices, which will make you a more effective Cloud Security Engineer. You will learn how to identify and mitigate vulnerabilities in code, which will make you a valuable asset to any organization.
Security Architect
A Security Architect designs, implements, and maintains security systems to protect an organization's computer systems and networks. This course will help you build a strong foundation in secure coding practices, which will make you a more effective Security Architect. You will learn how to identify and mitigate vulnerabilities in code, which will make you a valuable asset to any organization.
Ethical Hacker
An Ethical Hacker is a security professional who is hired to find and exploit vulnerabilities in an organization's computer systems and networks. This course will help you build a strong foundation in secure coding practices, which will make you a more effective Ethical Hacker. You will learn how to identify and exploit vulnerabilities in code, which will make you a valuable asset to any organization.
Data Security Analyst
A Data Security Analyst analyzes an organization's data to identify and mitigate security risks. This course will help you build a strong foundation in secure coding practices, which will make you a more effective Data Security Analyst. You will learn how to identify and mitigate vulnerabilities in code, which will make you a valuable asset to any organization.
Privacy Analyst
A Privacy Analyst analyzes an organization's privacy practices to identify and mitigate risks. This course will help you build a strong foundation in secure coding practices, which will make you a more effective Privacy Analyst. You will learn how to identify and mitigate vulnerabilities in code, which will make you a valuable asset to any organization.
Risk Analyst
A Risk Analyst analyzes an organization's risks to identify and mitigate threats. This course may be useful to you in your role as a Risk Analyst. You will learn how to identify and mitigate vulnerabilities in code, which will make you a valuable asset to any organization.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Secure Coding with C#.
Introduces the principles of threat modeling and provides practical guidance on how to apply them.
Provides a comprehensive overview of security engineering principles and practices.
Provides practical guidance on how to perform security testing on web applications.
Provides a comprehensive overview of secure coding principles and practices.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser