This course teaches you how to achieve a desired behaviour and prevent undesired behaviour in a sensitive website like bank, word processor or blogs.
Learning how to maintain confidentiality, integrity and availability in websites are the main subject matters of this course. There are much vulnerability and defects in a website and they can be breached. You will learn how to tackle these issues skillfully in this course.
Assessment
This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.
Certification
Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.
Having an Official Edukite Certification is a great way to celebrate and share your success. You can:
- Add the certificate to your CV or resume and brighten up your career
- Show it to prove your success
Course Credit: University of Maryland
Course Curriculum
Module 01 | |||
Software security – Introducing Computer Security | 00:06:00 | ||
Software security – Tour of the course and expected background | 00:12:00 | ||
Software security – What is software security | 00:08:00 | ||
Software security – Low Level Security Introduction | 00:06:00 | ||
Software security – Memory Layout | 00:11:00 | ||
Software security – Buffer Overflow | 00:06:00 | ||
Software security – Code Injection | 00:07:00 | ||
Software security – Other Memory Exploits | 00:12:00 | ||
Software security – Format String Vulnerabilities | 00:07:00 | ||
Software security – Defenses Against Low Level Attacks Introduction | 00:03:00 | ||
Module 02 | |||
Software security – Memory Safety | 00:17:00 | ||
Software security – Type Safety | 00:05:00 | ||
Software security – Avoiding Exploitation | 00:10:00 | ||
Software security – Return Oriented Programming – ROP | 00:11:00 | ||
Software security – Control Flow Integrity | 00:15:00 | ||
Software security – Secure Coding | 00:18:00 | ||
Software security – Security for the Web Introduction | 00:04:00 | ||
Software security – Web Basics | 00:11:00 | ||
Software security – SQL Injection | 00:11:00 | ||
Software security – SQL Injection Countermeasures | 00:09:00 | ||
Module 03 | |||
Software security – Web based State Using Hidden Fields and Cookies | 00:14:00 | ||
Software security – Session Hijacking | 00:07:00 | ||
Software security – Cross site Request Forgery CSRF | 00:07:00 | ||
Software security – Web 2 0 | 00:05:00 | ||
Software security – Cross site Scripting | 00:14:00 | ||
Software security – Designing and Building Secure Software Introduction | 00:07:00 | ||
Software security – Threat Modeling, or Architectural Risk Analysis | 00:09:00 | ||
Software security – Security Requirement | 00:13:00 | ||
Software security – Avoiding Flaws with Principles | 00:08:00 | ||
Software security – Design Category Favor Simplicity | 00:11:00 | ||
Module 04 | |||
Software security – Design Category Trust With Reluctance | 00:13:00 | ||
Software security – Design Category Defense in Depth, Monitoring Traceability | 00:05:00 | ||
Software security – Top Design Flaw | 00:09:00 | ||
Software security – Case Study Very Secure FTP daemon | 00:12:00 | ||
Software security – Static Analysis Introduction part 1 | 00:05:00 | ||
Software security – Static Analysis Introduction part 2 | 00:08:00 | ||
Software security – Flow Analysis | 00:09:00 | ||
Software security – Flow Analysis Adding Sensitivity | 00:09:00 | ||
Software security – Context Sensitive Analysis | 00:09:00 | ||
Software security – Flow Analysis Scaling it up to a Complete Language and Problem Set | 00:12:00 | ||
Module 05 | |||
Software security – Challenges and Variations | 00:08:00 | ||
Software security – Introducing Symbolic Execution | 00:11:00 | ||
Software security – Symbolic Execution A Little History | 00:03:00 | ||
Software security – Basic Symbolic Execution | 00:14:00 | ||
Software security – Symbolic Execution as Search, and the Rise of Solvers | 00:13:00 | ||
Software security – Symbolic Execution Systems | 00:08:00 | ||
Software security – Penetration Testing Introduction | 00:10:00 | ||
Software security – Pen Testing | 00:14:00 | ||
Software security – Fuzzing | 00:15:00 | ||
Assessment | |||
Submit Your Assignment | 00:00:00 | ||
Certification | 00:00:00 |
Course Reviews
No Reviews found for this course.