Ultimate Application Security
Apply your knowledge to correct common security vulnerabilities to become a software security guru
IT and Software ,Network and Security,Cyber Security
Lectures -66
Duration -8.5 hours
Lifetime Access
Lifetime Access
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
This course will familiarize you with the common vulnerabilities that plague developed code as outlined in publications like the OWASP Top 10 and SANS Top 25. You will understand what type of development behaviours lead to vulnerabilities and how to avoid those behaviours when creating secure code. You will learn how to perform a threat model on development features to understand what threats could impact your code, where they come from, and how to mitigate them. You will also review and operate analysis tools that are available to developers in order to analyze their code and discover vulnerabilities, allowing you to correct them early in the development life cycle. Finally, you will understand how application security fits in an overall cybersecurity program.
Goals
- Learn to become a software security guru.
- Understand the OWASP Top 10 and other support from the industry.
- Develop a threat model and understand the risks to an architecture.
- Understand the role of security scanning tools in an SLDC.
- Rate security vulnerabilities using standard processes.
- Apply your knowledge to correct common security vulnerabilities.
- Learn how software security fits in the overall organization.
Prerequisites
- Basic software development knowledge.
- Understanding of IT systems and how software is developed, deployed, and managed in an environment.
- Basic understanding of development pipelines and the software development lifecycle.

Curriculum
Check out the detailed breakdown of what’s inside the course
Introduction
4 Lectures
-
Introduction 08:52 08:52
-
SSDLC Terms 08:08 08:08
-
Goals 18:31 18:31
-
WebGoat 10:29 10:29
Introduction to OWASP Top 10 and more terms
6 Lectures

Deep dive in to the OWASP Top 10
10 Lectures

Defensive Tools
11 Lectures

Session Management
7 Lectures

Risk Rating and Threat Modeling
8 Lectures

Encryption and Hashing
7 Lectures

Frameworks and Processes
5 Lectures

Security scanning and testing
7 Lectures

Conclusion
1 Lectures

Instructor Details

Derek Fisher
About me
Derek Fisher has several decades of experience designing systems in both hardware and software, and holds a graduate degree in cybersecurity from Boston University. He continues to work professionally as a leader, university instructor, and conference speaker in the security space where he provides his insight to multiple fields and disciplines.
Course Certificate
Use your certificate to make a career change or to advance in your current career.

Our students work
with the Best


































Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now