Secure Software Development
Requirements, Design, and Reuse
Secure Software Development Fundamentals,
Modern software is under constant attack, but many software developers have never been told how to effectively counter those attacks. This course works to solve that problem, by explaining the fundamentals of developing secure software. Geared towards software developers, DevOps professionals, software engineers, web application developers, and others interested in learning how to develop secure software, this course focuses on practical steps that can be taken, even with limited resources, to improve information security. This course will enable software developers to create and maintain systems that are much harder to successfully attack, reduce the damage when attacks are successful, and speed the response so that any latent vulnerabilities can be rapidly repaired.
This course discusses the basics of security, such as what risk management really means. It discusses how to consider security as part of the requirements of a system, and what potential security requirements you might consider. This part then discusses how to design software to be secure, including various secure design principles that will help you avoid bad designs and embrace good ones. It also discusses how to secure your software supply chain, that is, how to more securely select and acquire reused software (including open source software) to enhance security.
This is the first of the three courses in the Secure Software Development Fundamentals Professional Certificate program, and was developed by the Open Source Security Foundation (OpenSSF), a project of the Linux Foundation focused on securing the open source ecosystem. The training courses included in this program focus on practical steps that you (as a developer) can take to counter most common kinds of attacks.
What you'll learn
- Security basics: risk management, the “CIA” triad, and requirements.
- Secure design principles: what are principles such as “least privilege” and how to apply these principles.
- Supply chain evaluation: tips on how to choose packages to reuse, and how to reuse them so that you can rapidly be alerted & update.
Get a Reminder
Rating | Not enough ratings |
---|---|
Length | 7 weeks |
Effort | 7 weeks, 1–2 hours per week |
Starts | On Demand (Start anytime) |
Cost | $199 |
From | The Linux Foundation via edX |
Instructor | David A. Wheeler |
Download Videos | On all desktop and mobile devices |
Language | English |
Subjects | Programming |
Tags | Computer Science |
Get a Reminder
Similar Courses
Careers
An overview of related careers and their average salaries in the US. Bars indicate income percentile.
Service Now Developers $56k
Pega Developers $59k
Need Software Developers & Programmers in IT Technologies $59k
ETL Developers $60k
Software Developers (ALL LEVELS) $61k
Integration Developers $64k
iOS Developers $65k
OBIEE Developers $65k
Microsoft DTA Developers with Security Clearance $66k
Mobile Developers $66k
Cloud Foundry Developers $66k
Excel/Access DTS Developers $78k
Write a review
Your opinion matters. Tell us what you think.
Please login to leave a review
Rating | Not enough ratings |
---|---|
Length | 7 weeks |
Effort | 7 weeks, 1–2 hours per week |
Starts | On Demand (Start anytime) |
Cost | $199 |
From | The Linux Foundation via edX |
Instructor | David A. Wheeler |
Download Videos | On all desktop and mobile devices |
Language | English |
Subjects | Programming |
Tags | Computer Science |
Similar Courses
Sorted by relevance
Like this course?
Here's what to do next:
- Save this course for later
- Get more details from the course provider
- Enroll in this course