Principles of Secure Coding
- Descrição
- Currículo
- FAQ
- Revisões
Principles of Secure Coding offers a comprehensive exploration of secure coding practices, emphasizing the importance of incorporating security throughout the entire development process. This course will equip you with the skills and mindset necessary to protect your applications against potential threats, setting you on the path towards developing robust and resilient software.
Dive into essential security concepts such as authentication, authorization, encryption, and encoding. Learn the importance of version control and best practices for maintaining sensitive information. Engage with real-life and fictional security horror stories, including an exclusive tale from YouTube sensation Tom Scott, to gain insight into the potential consequences of insecure coding.
Explore secure coding techniques using C# as our primary language while emphasizing broader applicability to other programming languages. Delve into methods for safeguarding data, preventing information leaks, and mitigating vulnerabilities. Develop an understanding of security testing and code review processes to ensure your applications remain secure and compliant.
Continuing the course, we’ll investigate the OWASP Top Ten security risks for 2021, enabling you to recognize and address recurring security issues. By diving deep into these prevalent concerns, you’ll gain invaluable insight into the mindset and thought processes that often lead to security problems.
New! A bonus module examining three new online authentication methods and how they work, as well as how they fit into the context of encryption and security. Have you ever wondered how Google or Microsoft Authenticator works? We will dig into what is happening under the covers.
Seize the opportunity to enhance your software development skills with this course. Enroll today and propel your skills to new heights!
-
3IntroductionVídeo Aula
Some definitions of "security", and some clarity on the pain of insecurity.
-
4A Quick Security PrimerVídeo Aula
Who you are, what you can do, and how this goes wrong.
-
5Encoding, Encryption, and SerializationVídeo Aula
Untangling some security terms from each other and from their common usage.
-
6Demo: Serialization and SecurityVídeo Aula
We'll look at a nuts and bolts example of how serialization can cause problems.
-
7The Nature of Security on the InternetVídeo Aula
We'll understand how and why the nature of the Internet is fundamentally insecure.
-
8Accidental vs. Malicious ExposureVídeo Aula
Understanding the bad guys both outside the walls and in.
-
9SummaryVídeo Aula
We'll wrap up the section and review what we talked about.
-
10IntroductionVídeo Aula
What it is we're talking about when we say "the security of version control".
-
11Secrets Do Not Belong in Version ControlVídeo Aula
Why secrets do not belong in version control, and what we mean by that.
-
12A Github Horror StoryVídeo Aula
A story about what goes wrong when secrets end up in version control.
-
13The Right Way to Control SecretsVídeo Aula
Working with secrets managers, and what doing that correctly requires.
-
14How to Avoid SecretsVídeo Aula
How we can avoid secrets and the pain of working with them altogether.
-
15Demo: Coding with SecretsVídeo Aula
We'll demo a secrets manager and talk about how to manage secrets in Production.
-
16The Day Google Forgot to Check PasswordsVídeo Aula
We'll close out the section with a discussion of Tom Scott's legendary YouTube short, "The (Fictional) Day Google Forgot to Check Passwords".
-
17SummaryVídeo Aula
We'll wrap up the section and review what we talked about.
-
18IntroductionVídeo Aula
We'll talk about the nature of server-side code and how it can go wrong.
-
19Reflection AttacksVídeo Aula
We'll talk about the risks associated with the very common practice of code reflection.
-
20Working with Data Types SecurelyVídeo Aula
We'll look at some C#-specific solutions to reducing the copies of your sensitive data floating around.
-
21Demo: A Look at a FunctionVídeo Aula
We'll look at the ins and outs of read-only structs and reflect on the other uses of the readonly keyword.
-
22A Note on C# and SecureStringVídeo Aula
Why SecureString isn't, and what happens to best practices.
-
23Never Write Your Own EncryptionVídeo Aula
Why you're not good enough (and neither am I) to write your own encryption.
-
24Serialization and Transport PitfallsVídeo Aula
One more look at the problems associated with serialization and an approach to deal with them.
-
25Microsoft's RecommendationsVídeo Aula
What Microsoft says about secure coding.
-
26Mitigating with Virtualization StrategiesVídeo Aula
A look at the role that containers and VMs can play in secure coding.
-
27SummaryVídeo Aula
We'll wrap up the section and review what we talked about.
-
28IntroductionVídeo Aula
We'll talk about choosing in security, and another horror story from poor security.
-
29Securing DatabasesVídeo Aula
We'll look at a common source of data breaches, and what practices can prevent it.
-
30Hashing and SaltVídeo Aula
An in depth look at what we're talking about with hashing and salt.
-
31Transparent Data Encryption and Cloud ProvidersVídeo Aula
A look at Microsoft's cloud encryption solution for databases, Transparent Data Encryption.
-
32Demo: Working with Secure AssetsVídeo Aula
We'll look at connecting to an Azure Key Vault to manage our secrets.
-
33Once Again, Avoiding SecretsVídeo Aula
A discussion of Social Security Numbers and their meaning in security.
-
34Logging and SecurityVídeo Aula
How sensitive data gets into logs, and why it happens.
-
35Demo: What Bad Logging Looks LikeVídeo Aula
A nuts and bolts example of getting a piece of sensitive data into the logs, and how to keep it out.
-
36SummaryVídeo Aula
We'll wrap up the section and review what we talked about.
-
37IntroductionVídeo Aula
An overview of OWASP and what the Top Ten means from year to year.
-
38Broken Access ControlVídeo Aula
What happens when users get outside of their intended permissions.
-
39Cryptographic FailuresVídeo Aula
What happens when we fail to protect our data.
-
40InjectionVídeo Aula
What happens when users can execute code we did not intend.
-
41Insecure DesignVídeo Aula
What happens when our system is designed wrongly from the start, in security terms.
-
42Security MisconfigurationVídeo Aula
What happens when you haven't configured your applications and systems for secure operation.
-
43Vulnerable and Outdated ComponentsVídeo Aula
When updating that package is too much trouble, so you end up with a security breach.
-
44Identification and Authentication FailuresVídeo Aula
When the basis of your authentication is inadequate evidence that a user is who they say they are.
-
45Software and Data Integrity FailuresVídeo Aula
What happens when our application trusts stuff it shouldn't.
-
46Security Logging and Monitoring FailuresVídeo Aula
When we don't know what's going on with our system, or can't.
-
47Server-Side Request ForgeryVídeo Aula
When an internal server is tricked into making a request on the behalf of an attacker.
-
48Demo: OWASP ZAPVídeo Aula
Working with OWASP's automated scanning tool, ZAP.
-
49Penetration TestingVídeo Aula
Why getting help from security experts can be painful, but is worth it.
-
50SummaryVídeo Aula
We'll wrap up the section and review what we talked about.
