Free Course

Secure Coding

time10 Hours
ceu10 CEU/CPE
Sunny Wears profile image

Secure Coding
Course Intro
In the Secure Coding training course, Sunny Wear will show you how secure coding is important when it comes to lowering risk and vulnerabilities. Learn about XSS, Direct Object Reference, Data Exposure, Buffer Overflows, & Resource Management.
Module 01 OWASP Top 10 A1 Injection
Module 02 OWASP Top 10 A2 Broken Authentication and Session Management
Module 03 OWASP Top 10 A3 Cross-site Scripting
Module 04 OWASP Top 10 A4 Insecure Direct Object Reference
Module 05 OWASP Top 10 A5 Security Misconfiguration
Module 06 OWASP Top 10 A6 Sensitive Data Exposure
Module 07 OWASP Top 10 A7 Missing Function Level Access Control
Module 08 OWASP Top 10 A8 Cross-site Request Forgery
Module 09 OWASP Top 10 A9 Using Components with Known Vulns
Module 10 OWASP Top 10 A10 Unvalidated Redirects and Forwards
Module 11 CWE SANS Top 25 Buffer Overflows
Module 12 CWE SANS Top 25 Insecure Interaction Between Components
Module 13 CWE SANS Top 25 Risky Resource Management
Module 14 CWE SANS Top 25 Porous Defenses
Module 15 Honorable Mentions
Module 16 Active Defenses
Module 17 Threat Modeling
Course Description

About Cybrary’s Free Secure Coding Training Course

In this course, participants are introduced to the primary best practices of Secure Coding, including the following:
• Lab Tools, vulnerable web apps OWASP Top 10 for 2013
• SANS Top 25 for 2011
• Active Defenses
• Threat Modelling

Knowing the principles behind secure coding carries a variety of benefits to individuals and employees who are writing code and building applications / software products. Some of the main benefits include:
• Protection of applications
• Protection of Intellectual property
• Protection of Business Reputation
• Government mandates (eg PCI_DSS/PA-DSS)
The instructor also discusses how secure coding is important when it comes to lowering risk and vulnerabilities. Learn about XSS, Direct Object Reference, Data Exposure, Buffer Overflows, Resource Management, Active Defenses, and Threat Modeling. If you know what these vulns look like, then you will have a better chance of engineering products that prevent against them. This secure coding course is a non-language specific class that EVERY engineer should take!

Instructor: @sunnywear
Course Length: 9.5 hours

Do you know someone who could benefit from this training class? Email them an invite and they can join you, and you earn cybytes

Complete this course and earn a Secure Coding Certificate of Completion
Complete this course and add the Secure Coding course badge to your profile

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?