This learning path starts with a discussion of the secure coding landscape and the tools that will be used. This course discusses why knowledge of secure coding techniques is so necessary for modern development and introduces the deliberately vulnerable applications that will be used to demonstrate the impact of different vulnerabilities.
Introduction to Secure CodingDuration: 1:37
This video introduces the need for secure coding and the current vulnerability landscape.
Introduction to Vulnerable Web AppsDuration: 4:44
This video introduces the three tools that will be used for demonstrations in this path.
Meet the author
Howard Poston is a cybersecurity researcher with a background in blockchain, cryptography and malware analysis. He has a master's degree in Cyber Operations from the Air Force Institute of Technology and two years of experience in cybersecurity research and development at Sandia National Labs. He currently works as a freelance consultant providing training and content creation for cyber and blockchain security. He can be reached by email at firstname.lastname@example.org or via his website at https://www.howardposton.com.
You're in good company
"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had."
"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."
"I’ve taken five boot camps with Infosec and all my instructors have been great."