Claim your FREE 7-day trial

Learn Secure Coding Fundamentals

This path describes common development mistakes, how they can be exploited and possible mitigations.

14 courses  //   93 videos  //   9 hours of training

Secure Coding Fundamentals training

Most software vulnerabilities are caused by the same few development mistakes. This path describes these vulnerabilities and how to recognize them in code, demonstrates how they are exploited by attackers (including real-world case studies of vulnerable applications in production), and describes ways by which the vulnerabilities can be mitigated.

Learning path components

Secure Coding Fundamentals Project
Practice Exam
Secure Coding Fundamentals Project

Secure Coding Fundamentals Project

A hands-on project to help you learn Secure Coding Fundamentals.

Number of questions: 1

Introduction to Secure Coding Fundamentals
Course
Introduction to Secure Coding Fundamentals

Introduction to Secure Coding Fundamentals

This course introduces the need for secure coding and the tools used in this learning path.

2 videos
7 minutes of training

Buffer Overflows
Course
Buffer Overflows

Buffer Overflows

This course introduces the buffer overflow vulnerability, its exploitation and possible mitigations.

7 videos
51 minutes of training

Integer Overflows and Underflows
Course
Integer Overflows and Underflows

Integer Overflows and Underflows

This course introduces integer overflow and underflow vulnerabilities, their exploitation and possible mitigations.

7 videos
53 minutes of training

Race Conditions
Course
Race Conditions

Race Conditions

This course introduces race conditions, their exploitation and possible mitigations.

7 videos
50 minutes of training

Format String Vulnerabilities
Course
Format String Vulnerabilities

Format String Vulnerabilities

This course introduces format string vulnerabilities, their exploitation and possible mitigations.

7 videos
34 minutes of training

Command Injection
Course
Command Injection

Command Injection

This course introduces command injection vulnerabilities, their exploitation and possible mitigations.

7 videos
40 minutes of training

Least Privilege
Course
Least Privilege

Least Privilege

This course introduces the principle of least privilege and its importance in secure coding.

7 videos
33 minutes of training

Credential Management
Course
Credential Management

Credential Management

This course describes how poor credential management can make an application vulnerable to attack, how it can be exploited and how to manage credentials properly.

7 videos
61 minutes of training

Cryptography
Course
Cryptography

Cryptography

This course discusses how the poor use of cryptography can leave an application vulnerable to attack and how it can be exploited, as well as potential mitigations.

7 videos
40 minutes of training

SQL Injection
Course
SQL Injection

SQL Injection

This course introduces SQL injection vulnerabilities, their exploitation and possible mitigations.

7 videos
44 minutes of training

Cross-Site Scripting
Course
Cross-Site Scripting

Cross-Site Scripting

This course introduces cross-site scripting vulnerabilities, their exploitation and possible mitigations.

7 videos
31 minutes of training

Cross-Site Request Forgery
Course
Cross-Site Request Forgery

Cross-Site Request Forgery

This course introduces cross-site request forgery vulnerabilities, their exploitation and possible mitigations.

7 videos
23 minutes of training

Poor HTTP Usage
Course
Poor HTTP Usage

Poor HTTP Usage

This course describes how poor use of HTTP and HTML can be exploited, as well as possible mitigations.

7 videos
43 minutes of training

Error Handling
Course
Error Handling

Error Handling

This course describes how poor error handling can be exploited and possible mitigations for this problem.

7 videos
27 minutes of training

 

What you’ll learn.

  • Common vulnerabilities, such as buffer overflows and SQL injections
  • How poor credential management, crytpography use and HTTP use are exploited
  • Mitigating those vulnerabilities through secure code

Who is this for?

This skill path is designed for:

  • Software engineers
  • Application and web developers
  • Project managers
  • Anyone interested in learning about secure coding

You're in good company

"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had." 

James Coyle

FireEye, Inc.

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer

Plans and pricing

Personal

$299

Annually

Teams

$599 / license

Annually. Includes all content plus team admin and reporting.