• LOGIN
  • No products in the cart.

You must be logged in to take this course  →   LOGIN | REGISTER NOW

This course teaches you how to achieve a desired behaviour and prevent undesired behaviour in a sensitive website like bank, word processor or blogs.

Learning how to maintain confidentiality, integrity and availability in websites are the main subject matters of this course. There are much vulnerability and defects in a website and they can be breached. You will learn how to tackle these issues skillfully in this course.

Assessment

This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.

Certification

Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.

 

Having an Official Edukite Certification is a great way to celebrate and share your success. You can:

  • Add the certificate to your CV or resume and brighten up your career
  • Show it to prove your success

 

Course Credit: University of Maryland

Course Curriculum

Module 01
Software security – Introducing Computer Security 00:06:00
Software security – Tour of the course and expected background 00:12:00
Software security – What is software security 00:08:00
Software security – Low Level Security Introduction 00:06:00
Software security – Memory Layout 00:11:00
Software security – Buffer Overflow 00:06:00
Software security – Code Injection 00:07:00
Software security – Other Memory Exploits 00:12:00
Software security – Format String Vulnerabilities 00:07:00
Software security – Defenses Against Low Level Attacks Introduction 00:03:00
Module 02
Software security – Memory Safety 00:17:00
Software security – Type Safety 00:05:00
Software security – Avoiding Exploitation 00:10:00
Software security – Return Oriented Programming – ROP 00:11:00
Software security – Control Flow Integrity 00:15:00
Software security – Secure Coding 00:18:00
Software security – Security for the Web Introduction 00:04:00
Software security – Web Basics 00:11:00
Software security – SQL Injection 00:11:00
Software security – SQL Injection Countermeasures 00:09:00
Module 03
Software security – Web based State Using Hidden Fields and Cookies 00:14:00
Software security – Session Hijacking 00:07:00
Software security – Cross site Request Forgery CSRF 00:07:00
Software security – Web 2 0 00:05:00
Software security – Cross site Scripting 00:14:00
Software security – Designing and Building Secure Software Introduction 00:07:00
Software security – Threat Modeling, or Architectural Risk Analysis 00:09:00
Software security – Security Requirement 00:13:00
Software security – Avoiding Flaws with Principles 00:08:00
Software security – Design Category Favor Simplicity 00:11:00
Module 04
Software security – Design Category Trust With Reluctance 00:13:00
Software security – Design Category Defense in Depth, Monitoring Traceability 00:05:00
Software security – Top Design Flaw 00:09:00
Software security – Case Study Very Secure FTP daemon 00:12:00
Software security – Static Analysis Introduction part 1 00:05:00
Software security – Static Analysis Introduction part 2 00:08:00
Software security – Flow Analysis 00:09:00
Software security – Flow Analysis Adding Sensitivity 00:09:00
Software security – Context Sensitive Analysis 00:09:00
Software security – Flow Analysis Scaling it up to a Complete Language and Problem Set 00:12:00
Module 05
Software security – Challenges and Variations 00:08:00
Software security – Introducing Symbolic Execution 00:11:00
Software security – Symbolic Execution A Little History 00:03:00
Software security – Basic Symbolic Execution 00:14:00
Software security – Symbolic Execution as Search, and the Rise of Solvers 00:13:00
Software security – Symbolic Execution Systems 00:08:00
Software security – Penetration Testing Introduction 00:10:00
Software security – Pen Testing 00:14:00
Software security – Fuzzing 00:15:00
Assessment
Submit Your Assignment 00:00:00
Certification 00:00:00

Course Reviews

4.7

4.7
9 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

764 STUDENTS ENROLLED
©2021 Edukite. All Rights Resereved
Edukite is A Part Of Ebrahim College, Charity Commission
Reg No 110841