LinuxFoundationX: Secure Software Development: Implementation
|
Learn the practical steps software developers can take, even if they have limited resources, to implement secure software.
About this course
Modern software is under constant attack, but many software developers have never been told how to effectively counter those attacks. This course works to solve that problem, by explaining the fundamentals of developing secure software. Geared towards software developers, DevOps professionals, software engineers, web application developers, and others interested in learning how to develop secure software, this course focuses on practical steps that can be taken, even with limited resources to improve information security. This course will enable software developers to create and maintain systems that are much harder to successfully attack, reduce the damage when attacks are successful, and speed the response so that any latent vulnerabilities can be rapidly repaired.
This course focuses on key implementation issues: input validation (such as why allowlists should be used and not denylists), processing data securely, calling out to other programs, sending output, and error handling. It focuses on practical steps that you (as a developer) can take to counter the most common kinds of attacks.
This is the second of the three courses in the Secure Software Development Fundamentals Professional Certificate program, and was developed by the Open Source Security Foundation (OpenSSF), a project of the Linux Foundation focused on securing the open source ecosystem.
At a Glance:
Institution: LinuxFoundationX
Subject: Computer Science
Level: Introductory
Prerequisites:
We presume that the student already knows how to develop software to some degree.
Language: English
Video Transcripts: اَلْعَرَبِيَّةُ, Deutsch, English, Español, Français, हिन्दी, Bahasa Indonesia, Português, Kiswahili, తెలుగు, Türkçe, 中文
Associated programs:
Professional Certificate in Secure Software Development Fundamentals
Associated skills:Exception Handling, Data Validation, Software Development, DevOps, Software Engineering, Linux, Vulnerability
User Reviews
Be the first to review “LinuxFoundationX: Secure Software Development: Implementation” Cancel reply
Related Products

Linux Unhatched
A quick introduction to the popular operating system, Linux.

RedHat: Fundamentals of Red Hat Enterprise Linux 9
This course is designed to equip students with the skills and knowledge needed for effective administration of Linux systems, with a particular focus on Red Hat® Enterprise Linux® . It covers fundamental Linux concepts, command-line tools, system management, and network configuration, using both the command-line interface and web console.

Linux Essentials
Build foundational Linux skills and prepare for the Linux Essentials certificate exam from Linux Professional Institute.

IBM: Linux Commands & Shell Scripting
This mini-course describes shell commands and how to use the advanced features of the Bash shell to automate complicated database tasks. For those not familiar with shell scripting, this course provides an overview of common Linux Shell Commands and shell scripting basics.

LinuxFoundationX: Open Source Software Development: Linux for Developers
Start your open source software (OSS) adventure today by learning the key concepts of developing open source software and how to work productively in a Linux environment.

LinuxFoundationX: Secure Software Development: Requirements, Design, and Reuse
Learn the security basics that allow you to develop software that is hardened against attacks, and understand how you can reduce the damage and speed the response when a vulnerability is exploited.
There are no reviews yet.