We may earn an affiliate commission when you visit our partners.
Gavin Johnson-Lynn

Secure coding is a skill that every web developer needs to ensure they are protected from common vulnerabilities. This course teaches you about those vulnerabilities, how an attacker might exploit them, and how to avoid them in your Python websites.

Read more

Secure coding is a skill that every web developer needs to ensure they are protected from common vulnerabilities. This course teaches you about those vulnerabilities, how an attacker might exploit them, and how to avoid them in your Python websites.

There are a number of common vulnerabilities that can be exposed by a website which a malicious user can attack. This can result in anything from the website being defaced to the web server and all of its contents being accessed by unauthorized users. In this course, Python Secure Coding Playbook, you’ll learn to protect your websites from attack. First, you'll explore the most common vulnerabilities that you’re likely to see in a website. Then, you'll see what these vulnerabilities could allow an attacker to do and how they might do it. Finally, you’ll learn how to write your Python code to protect your website from attack. When you’re finished with this course, you’ll have the knowledge of secure coding in Python that you need to protect your website from the attacks that it is most likely to face.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Secure Coding Principles
Injection Flaws
Broken Authentication
Read more
Sensitive Data Exposure
XML External Entities (XXE)
Broken Access Control
Security Misconfiguration
Cross-Site Scripting (XSS)
Insecure Deserialization
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Emphasizes industry-standard secure coding principles
Focuses on common vulnerabilities faced by websites
Provides tangible examples of how vulnerabilities can be exploited
Guided by the expertise of Gavin Johnson-Lynn
Tackles the practicalities of protecting Python websites from attack

Save this course

Save Python Secure Coding Playbook to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Python Secure Coding Playbook with these activities:
Review Core Vulnerability Types
Build a strong foundation by familiarizing yourself with the types of vulnerabilities that can put your Python websites at risk.
Show steps
  • Read the course syllabus to familiarize yourself with the vulnerabilities covered in the course.
  • Review examples of each vulnerability type, noting common attack methods and potential consequences.
  • Complete practice exercises or quizzes to test your understanding.
Show all one activities

Career center

Learners who complete Python Secure Coding Playbook will develop knowledge and skills that may be useful to these careers:
Web Developer
A Web Developer constructs and maintains websites and applications. They are responsible for the website's functionality, usability, and design. The Python Secure Coding Playbook course can help Web Developers build websites that are protected from common vulnerabilities and attacks.
Information Security Analyst
An Information Security Analyst plans and implements security measures to protect an organization's computer systems and networks. They assess risks, develop policies, and monitor systems for vulnerabilities. The Python Secure Coding Playbook course can help Information Security Analysts learn about common web vulnerabilities and how to protect against them.
Security Engineer
A Security Engineer designs, implements, and maintains security systems to protect an organization's computer systems and networks. They work with Information Security Analysts to assess risks and develop security policies. The Python Secure Coding Playbook course can help Security Engineers learn about common web vulnerabilities and how to protect against them.
Software Engineer
A Software Engineer designs, develops, and maintains software applications. They work with other engineers, designers, and business analysts to create software that meets the needs of users. The Python Secure Coding Playbook course can help Software Engineers learn about common web vulnerabilities and how to protect against them.
Security Auditor
A Security Auditor reviews and evaluates an organization's security systems and procedures. They identify vulnerabilities and make recommendations for improvements. The Python Secure Coding Playbook course can help Security Auditors learn about common web vulnerabilities and how to protect against them.
Database Administrator
A Database Administrator manages and maintains databases. They ensure that databases are running smoothly and that data is secure. The Python Secure Coding Playbook course can help Database Administrators learn about common web vulnerabilities and how to protect against them.
Systems Administrator
A Systems Administrator manages and maintains computer systems and networks. They ensure that systems are running smoothly and that data is secure. The Python Secure Coding Playbook course can help Systems Administrators learn about common web vulnerabilities and how to protect against them.
Security Consultant
A Security Consultant provides advice and guidance to organizations on how to protect their computer systems and networks. They assess risks, develop policies, and recommend security measures. The Python Secure Coding Playbook course can help Security Consultants learn about common web vulnerabilities and how to protect against them.
Cloud Security Engineer
A Cloud Security Engineer designs and implements security measures to protect cloud-based applications and data. They work with other engineers and security professionals to ensure that cloud environments are secure. The Python Secure Coding Playbook course can help Cloud Security Engineers learn about common web vulnerabilities and how to protect against them.
Network Administrator
A Network Administrator manages and maintains computer networks. They ensure that networks are running smoothly and that data is secure. The Python Secure Coding Playbook course can help Network Administrators learn about common web vulnerabilities and how to protect against them.
Risk Manager
A Risk Manager identifies, assesses, and manages risks to an organization. They work with other managers and executives to develop and implement risk management strategies. The Python Secure Coding Playbook course can help Risk Managers learn about common web vulnerabilities and how to protect against them.
Information Technology Manager
An Information Technology Manager plans and directs the implementation of an organization's IT systems and infrastructure. They work with other managers and executives to ensure that IT systems meet the needs of the business. The Python Secure Coding Playbook course can help Information Technology Managers learn about common web vulnerabilities and how to protect against them.
Security Manager
A Security Manager plans and directs the implementation of an organization's security program. They work with other managers and executives to ensure that the organization is protected from threats. The Python Secure Coding Playbook course can help Security Managers learn about common web vulnerabilities and how to protect against them.
Compliance Manager
A Compliance Manager ensures that an organization complies with all applicable laws and regulations. They work with other managers and executives to develop and implement compliance programs. The Python Secure Coding Playbook course can help Compliance Managers learn about common web vulnerabilities and how to protect against them.
Chief Information Security Officer (CISO)
A Chief Information Security Officer (CISO) is responsible for the overall security of an organization's IT systems and networks. They work with other executives to develop and implement security policies and procedures. The Python Secure Coding Playbook course can help CISOs learn about common web vulnerabilities and how to protect against them.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Python Secure Coding Playbook.
Provides a comprehensive guide to web security testing, covering topics such as threat modeling, vulnerability management, and security best practices.
Provides a textbook for software security, covering topics such as secure coding, security architecture, and risk management.
Provides a coding standard for C, covering topics such as secure coding principles, common vulnerabilities, and attack techniques.
Provides a coding guideline for secure software practices, covering topics such as secure coding principles, common vulnerabilities, and attack techniques.
Provides a standard for security and privacy controls for federal information systems and organizations, covering topics such as secure coding principles, common vulnerabilities, and attack techniques.
Provides a comprehensive guide to web application hacking, covering topics such as web application architecture, common vulnerabilities, and attack techniques.
Provides a cookbook of web security testing techniques, covering topics such as reconnaissance, vulnerability assessment, and penetration testing.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Python Secure Coding Playbook.
Secure Coding: Preventing Broken Access Control
Most relevant
Common Vulnerabilities and Exploits with Python
Most relevant
Kubernetes Security: Minimizing Microservice...
Most relevant
Assets, Threats, and Vulnerabilities
Most relevant
Security Event Triage: Revealing Attacker Methodology in...
Most relevant
Basic Security Concepts for Cisco Networks
Most relevant
Secure Software Implementation for CSSLP®
Most relevant
Secure Coding in React
Most relevant
Analyzing and Visualizing Data in Looker
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser