Secure Software Development

Pluralsight
Course Summary
One of the weakest links in cyber-security are the attack vectors that sometimes get created with applications. In this course, you'll learn how to evaluate and integrate security and software development to protect your environment.
-
+
Course Description
Most companies have a well-oiled machine with the sole purpose to create, release, and maintain functional software. Still, the growing concerns and risks related with insecure software have brought increased attention to the need to mix security into the development process. In this course, Secure Software Development, you will gain an understanding of the the Software Development Life Cycle (SDLC) and the security implications that can arise to ensure that the software your organization uses is well written and secure through it's lifespan. First, you will learn about the different options when it comes to following a SDLC. Next, you will delve into the 5 phases that software runs through as it is being developed. Last, you will dive into how vulnerabilities creep into your environment in ways you may have not considered. By the end of this course, you will be able to apply a proper SDLC and ensure that additional attack vectors aren't created by mistake (or on purpose) to expose your resources and networks.
-
+
Course Syllabus
Course Overview- 2m 52s
—Course Overview 2m 52sWhat’s the Software Development Life Cycle (SDLC)?- 19m 1s
—Course Introduction 6m 28s
—What's the Problem? 6m 3s
—Do You Really "Need" a SDLC 5m 20s
—Summary 1m 8sSoftware Development Phases- 19m 27sSoftware Development Models- 19m 35sSoftware Vulnerabilities- 13m 52sCoding Best Practices- 49m 29sCode Reviews- 19m 27sSecurity Testing in Action- 51m 35s