Software security: preventing vulnerabilities through secure programming

Software security: preventing vulnerabilities through secure programming

The module introduces the practices and techniques for designing, developing and maintaining secure applications, protecting them from the most common vulnerabilities. The course will cover the fundamentals of software security, focusing on secure and defensive programming techniques, with the aim of preventing vulnerabilities and reducing the risk of attack.

Would you like to attend the course live with the tutor? Download the course timetable and get in touch

Topics

Fundamentals of software security; principles of secure programming; defensive programming; common vulnerabilities and prevention; security testing; security tools and frameworks; advanced practices and DevSecOps; practical exercises.

Target

  • Companies, organisations and public authorities involved in software development at various levels
  • Designers and software developers
  • Master’s and PhD students

Course structure

Module 1 – Common Vulnerabilities and Prevention
14 hours
  • Specific examples of common vulnerabilities in various fields and programming languages (e.g. stack overflow and format string vulnerabilities in C, deserialisation in Java, loose comparison in PHP, etc.)
  • Mitigation and prevention techniques
Module 2 - SECURE AND DEFENSIVE PROGRAMMING
14 hours
  • Existing standards
  • A practical example: SEI CERT
  • Examples of vulnerable code and an assessment of its compliance with standards
Workshop
16 hours

Through practical exercises, case studies and real-world examples, participants will acquire the skills needed to write robust, secure and error-resistant code.

  • Practical exercises
  • Themed vulnerability research challenges
  • Exercises in secure and defensive programming based on practical examples (e.g. vulnerable programmes to be fixed and/or the development of short examples that comply with the standards discussed)

Software security: preventing vulnerabilities through secure programming

Index

Request more information

Fill in all sections of the form and click CONFIRM.

You may also be interested in…