Static Code Analysis with Coverity

[**A COMMUNITY CURATED COURSE**](/terms-service/dmca-takedown-policy/) **What is static code analysis?** Static code analysis, also known as ‘white-box testing,’ is a method of computer program debugging that is done by examining the code without executing the program. **Why do I need this course?**For the types of problems that can be detected during the software development phase itself, this is a powerful phase to employ such tools, as it provides immediate feedback to the developer on issues they might be introducing into the code during code development itself. **What will I learn?**The Static Code Analysis with Coverity course introduces students to the idea of integrating static code analysis tools into the software development process. **What is Coverity?**Coverity is a static code analysis tool for C, C++, C#, Java, and JavaScript. **Learn Static Code Analysis with Coverity Today:** Static code analysis, also known as ‘white-box testing,’ is a method of computer program debugging that is done by examining the code without executing the program. It is a critical step in both the SDLC and security testing phase of a software product. Tools such as Coverity frequently serve as aids for an analyst to help them zero in on security relevant portions of code so they can find flaws more efficiently, rather than a tool that simply finds flaws automatically. For the types of problems that can be detected during the software development phase itself, this is a powerful phase to employ such tools, as it provides immediate feedback to the developer on issues they might be introducing into the code during code development itself. The Static Code Analysis with Coverity course introduces individuals to the idea of integrating static code analysis tools into the software development process. Coverity is a static code analysis tool for C, C++, C#, Java, and JavaScript. It is derived from the Stanford Checker, a research tool for finding bugs through static analysis. The focus of this course is how developers can use tools such as Coverity to identify and remove Common Weakness Enumerations (CWE) from applications in which the source code is available, prior to deployment.

0
0
M
Time
intermediate
difficulty

[A COMMUNITY CURATED COURSE](/terms-service/dmca-takedown-policy/)

What is static code analysis?

Static code analysis, also known as ‘white-box testing,’ is a method of computer program debugging that is done by examining the code without executing the program.

Why do I need this course?For the types of problems that can be detected during the software development phase itself, this is a powerful phase to employ such tools, as it provides immediate feedback to the developer on issues they might be introducing into the code during code development itself.

What will I learn?The Static Code Analysis with Coverity course introduces students to the idea of integrating static code analysis tools into the software development process.

What is Coverity?Coverity is a static code analysis tool for C, C++, C#, Java, and JavaScript.

Learn Static Code Analysis with Coverity Today: Static code analysis, also known as ‘white-box testing,’ is a method of computer program debugging that is done by examining the code without executing the program. It is a critical step in both the SDLC and security testing phase of a software product.

Tools such as Coverity frequently serve as aids for an analyst to help them zero in on security relevant portions of code so they can find flaws more efficiently, rather than a tool that simply finds flaws automatically. For the types of problems that can be detected during the software development phase itself, this is a powerful phase to employ such tools, as it provides immediate feedback to the developer on issues they might be introducing into the code during code development itself.

The Static Code Analysis with Coverity course introduces individuals to the idea of integrating static code analysis tools into the software development process. Coverity is a static code analysis tool for C, C++, C#, Java, and JavaScript. It is derived from the Stanford Checker, a research tool for finding bugs through static analysis.

The focus of this course is how developers can use tools such as Coverity to identify and remove Common Weakness Enumerations (CWE) from applications in which the source code is available, prior to deployment.

Learning Partner