Ultimate Application Security
Apply your knowledge to correct common security vulnerabilities to become a software security guru
IT and Software ,Network and Security,Cyber Security
Lectures -66
Duration -8.5 hours
Lifetime Access
Lifetime Access
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
This course will familiarize you with the common vulnerabilities that plague developed code as outlined in publications like the OWASP Top 10 and SANS Top 25. You will understand what type of development behaviours lead to vulnerabilities and how to avoid those behaviours when creating secure code. You will learn how to perform a threat model on development features to understand what threats could impact your code, where they come from, and how to mitigate them. You will also review and operate analysis tools that are available to developers in order to analyze their code and discover vulnerabilities, allowing you to correct them early in the development life cycle. Finally, you will understand how application security fits in an overall cybersecurity program.
Goals
- Learn to become a software security guru.
- Understand the OWASP Top 10 and other support from the industry.
- Develop a threat model and understand the risks to an architecture.
- Understand the role of security scanning tools in an SLDC.
- Rate security vulnerabilities using standard processes.
- Apply your knowledge to correct common security vulnerabilities.
- Learn how software security fits in the overall organization.
Prerequisites
- Basic software development knowledge.
- Understanding of IT systems and how software is developed, deployed, and managed in an environment.
- Basic understanding of development pipelines and the software development lifecycle.

Curriculum
Check out the detailed breakdown of what’s inside the course
Introduction
4 Lectures
-
Introduction 08:52 08:52
-
SSDLC Terms 08:08 08:08
-
Goals 18:31 18:31
-
WebGoat 10:29 10:29
Understanding Secure SDLC
6 Lectures

Defense in Depth
10 Lectures

Dive into the OWASP Top 10
11 Lectures

Supply Chain Security
7 Lectures

Cloud and Container Security
8 Lectures

Session Management
7 Lectures

Risk Rating and Basic Threat Modeling
5 Lectures

More Advanced Threat Modeling
7 Lectures

Encryption and Hashing
1 Lectures

Instructor Details

Derek Fisher
Course Certificate
Use your certificate to make a career change or to advance in your current career.

Our students work
with the Best


































Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now