Identifying the Need for Security in Your Software Projects

The first step in tackling the problem of software security is to understand the challenges you're up against.

16 videos  //  119 minutes of training

Free training week — 1,400+ on-demand courses and hands-on labs

Course description

In this course, you will identify requirements and cybersecurity standards that apply to your software development projects, and the consequences of not meeting them; identify people, process and product factors that undermine software security; identify ways that software security may be broken to gain insights into software vulnerabilities; and use information sources to find vulnerabilities and exploits affecting your software projects.

Course syllabus

IntroductionDuration: 0:54

Identify Security Requirements and ExpectationsDuration: 14:38

Activity - Identifying Security Requirements and ExpectationsDuration: 6:16

Identify Factors that Undermine Software SecurityDuration: 12:04

Identify Factors that Undermine Software Security, Part 2Duration: 4:54

Find Vulnerabilities in Your SoftwareDuration: 14:58

Activity - Identifying Vulnerabilities in an ApplicationDuration: 11:09

Building and Breaking PasswordsDuration: 9:23

Activity - Adding a Security Feature to Your CodeDuration: 6:59

Activity - Protect Against a Poison Null ByteDuration: 7:48

Activity - Hashing a PasswordDuration: 4:33

Activity - Securing the Password HashDuration: 5:24

Activity - Saving Hashes for Future UseDuration: 6:13

Activity - Validating a PasswordDuration: 4:20

Activity - Having Fun with a Modern Hashing AlgorithmDuration: 5:39

Gather Intelligence on Vulnerabilities and ExploitsDuration: 4:15

Meet the author

Chrys Thorsen

LinkedIn

Chrys Thorsen is a technology and education consultant with 25 years of experience. Her work has taken her around the U.S. and overseas, including as a contractor for the CDC using technology to help fight HIV/AIDS in Africa. During her career, she has acquired 40 IT certifications, authored over 25 textbooks on a wide range of IT subjects, including secure iOS and Android coding, and created an equal number of IT-related video courses. When not working, Chrys enjoys reading scientific articles and experimenting with Internet-of-Things devices. She currently lives in Virginia with her sister, her cat and her dog which, as she describes it, "have the worst sibling rivalry imaginable."

Plans & pricing

Infosec Skills Personal

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

Book a Meeting
  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training that you can trust

IDC MarketScape Leader: U.S. IT Training

IDC MarketScape Leader: U.S. IT Training

Infosec Skills

eLearning Content

eLearning Content

Infosec Skills

Best Product - Cybersecurity Training for Infosec Professionals

Best Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Security Education & Platform

Security Education & Platform

Infosec Skills

Ranked #52 in Top 100 Global Software Sellers

Ranked #52 in Top 100 Global Software Sellers

Infosec