پیشنهاد فرادرس

آموزش توسعه نرم افزار امن

دسته بندی ها: آموزش های پلورال سایت (Pluralsight)
Secure Software Development Publisher:Pluralsight Author:Dale Meredith Duration:3h 15m Level:Beginner

One of the weakest links in cyber-security are the attack vectors that sometimes get created with applications. In this course, you'll learn how to evaluate and integrate security and software development to protect your environment.
Most companies have a well-oiled machine with the sole purpose to create, release, and maintain functional software. Still, the growing concerns and risks related with insecure software have brought increased attention to the need to mix security into the development process. In this course, Secure Software Development, you will gain an understanding of the Software Development Life Cycle (SDLC) and the security implications that can arise to ensure that the software your organization uses is well written and secure through its lifespan. First, you will learn about the different options when it comes to following a SDLC. Next, you will delve into the 5 phases that software runs through as it is being developed. Last, you will dive into how vulnerabilities creep into your environment in ways you may have not considered. By the end of this course, you will be able to apply a proper SDLC and ensure that additional attack vectors aren't created by mistake (or on purpose) to expose your resources and networks.

Course Overview
2m 52s
Course Overview
2m 52s
What's the Software Development Life Cycle (SDLC)?
19m 1s
Course Introduction
6m 28s
What's the Problem?
6m 3s
Do You Really "Need" a SDLC
5m 20s
Summary
1m 8s
Software Development Phases
19m 27s
Introduction
1m 30s
Planning Phase
1m 42s
Requirement Phase
2m 25s
Design Phase
3m 23s
Implementation Phase
1m 25s
Testing Phase
1m 18s
Deployment Phase
2m 30s
Maintenance Phase
1m 11s
End-of-Life Phase
1m 53s
Summary
2m 5s
Software Development Models
19m 35s
Introduction
1m 35s
Code-and-Fix
1m 55s
Waterfall
2m 29s
Agile
6m 47s
Iterative
2m 57s
Spiral
2m 40s
Summary
1m 9s
Software Vulnerabilities
13m 52s
Introduction
1m 23s
How Does It Happen?
6m 2s
Input Validation
1m 18s
Buffer Overflow
2m 26s
Command Injection
1m 39s
Summary
1m 2s
Coding Best Practices
49m 29s
Introduction to Coding Best Practices
1m 43s
What's the Goal Here?
1m 50s
Input Validation
2m 41s
Output Encoding
1m 10s
Authentication & Password Management
9m 58s
Session Management
3m 42s
Access Control
4m 19s
Cryptographic Practices
1m 29s
Error Handling & Logging
3m 1s
Data Protection
2m 37s
Communication Security
1m 38s
System Configuration
3m 37s
Database Security
3m 36s
File Management
2m 31s
Memory Management
1m 36s
General Coding Practices
2m 48s
Summary
1m 4s
Code Reviews
19m 27s
Introduction to Coding Review
1m 17s
Why a Code Review?
3m 30s
Types of Reviews
7m 31s
Incorporate These 3 Outlines
1m 42s
Some Common Sense Tips
4m 21s
Summary
1m 4s
Security Testing in Action
51m 35s
Introduction
3m 56s
Intercept Proxies
1m 17s
DEMO: Create a Hackable Web Server
14m 47s
DEMO: Burp Suite
8m 25s
DEMO: OWASP ZAP
6m 53s
Web Application Firewalls
1m 48s
DEMO: Nikto
5m 46s
Source Authenticity
3m 3s
Reverse Engineering
3m 13s
Module/Course Summary
2m 22s

پیشنهاد فرادرس

لینک های دانلود حجم فایل: 286.0MB همراه با زیرنویس انگلیسی Pluralsight Secure Software Development_git.ir.rar
captcha