Tags
Language
Tags
March 2024
Su Mo Tu We Th Fr Sa
25 26 27 28 29 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6

Introduction to Secure Software Training Video

Posted By: IrGens
Introduction to Secure Software Training Video

Introduction to Secure Software Training Video
2016-03-17 | .MP4, AVC, 1000 kbps, 1280x720 | English, AAC, 64 kbps, 2 Ch | 8.25 hours | 2.04 GB
Instructor: Brian Sletten

It's an unfortunate truism that many good developers are bad at software security. They cling to the belief that security is something you can just buy and bolt on, but that's not the case. It's not that developers want to be bad at security, they just don't know where to start and where they should go. This video offers a clear route.

It begins with a high level overview of today's security threats and the organizational strategies used to counter those threats; it details the roles that SSG members, developers, testers and operations personnel must perform in a security focused SDLC; and finishes with a survey of the protocols, tactics, and tools used to optimize security at the physical, network, application, and perimeter levels.

- Understand the goals, costs, and limitations of software security
- Identify fifteen types of security attacks such as WebSocket, SQL injection, and TLS Heartbleed
- Discover six core principles of software security including Defense in Depth and Fail Securely
- Learn about threat modeling using tools like STRIDE, CAPEC, and attack trees
- Recognize the capabilities and limitations of password policies, WAFS, and Firewalls
- Review authentication/authorization techniques like HTTP Digest, OAuth 2 and JWT
- Learn about the CORS, CSP, and HSTS security policies and protocols
- Explore the W3C Web Cryptography Working Group's newest security protocols

Brian Sletten is a software engineer who focuses on security consulting, web architecture, resource-oriented computing, social networking, the Semantic Web, data science, 3D graphics, visualization, scalable systems, and other technologies. He has experience in retail, banking, online games, defense, finance, hospitality and healthcare.


Introduction to Secure Software Training Video