Skip to content
English
  • There are no suggestions because the search field is empty.

Secure Coding Collection

Secure Coding

SecureCoding_ClientMarketingFlyer_8-5x11_THUMBNAIL

Audience: Technical Employees
Difficulty Level: Beginner/Intermediate
Time: 11 modules, ≈1-5 minutes Videos + 3 Questions per Module

Availability: Available on Training Platform as individual modules. 

Modules:

  • Secure Coding - Introduction (0:59 Video)
  • Secure Coding - Authentication & Authorization (1:34 Video)
  • Secure Coding - Injection (1:40 Video)
  • Secure Coding - Least Privilege (1:16 Video)
  • Secure Coding - OWASP Introduction (1:18 Video)
  • Secure Coding - OWASP Update - updated Q4 2022 (4:51 Video)
  • Secure Coding - Patching (1:42 Video)
  • Secure Coding - Source Code Secrets (1:41 Video)
  • Secure Coding - Static Analysis (1:08 Video)
  • Secure Coding - Threat Modeling (1:18 Video)
  • Secure Coding - Vulnerable Dependencies (1:20 Video)

Trailer:


Marketing Materials:  Secure Coding Marketing Kit


Major Themes: Technical employees need introductory training too! These short training modules will introduce your developers and other technical employees to various secure coding concepts. For end users who are already familiar with these concepts, Secure Coding is a great reminder of their importance.

Major Learning Concepts:

  • Introduction
    • Security in the development process
  • Authentication and Authorization
    • Authentication vs authorization
    • Software testing
    • Who You Are tests and What You Can Do tests
  • Injection
    • Value of data
    • Basics of injection attacks
    • SQL and OS command injection attacks
    • Preventing injection attacks
  • Least Privilege
    • Basics of least privilege
    • Least privilege during the development process
    • Regular review of access
  • OWASP Introduction
    • OWASP organization introduction
    • Utilizing the OWASP Top 10
    • ASVS and other OWASP resources
  • OWASP Update
    • OWASP Top 10 categories as of 2021
    • New categories
    • Renamed and altered categories
  • Patching
    • Importance of patching
    • Consequences of not patching
    • Patch management systems
  • Source Code Secrets
    • Dangers of oversharing
    • Data in Github repositories
    • Encryption
    • Identifying source code secrets
  • Static Analysis
    • Identifying bugs before deployment
    • Tools available
    • Improving code quality
  • Threat Modeling
    • Usage of threat modeling
    • Threat modeling steps
    • Tools and resources available
  • Vulnerable Dependencies
    • Downsides to using others’ source code
    • Importance of patching
    • Tools that can help identify vulnerabilities

OWASP Update Note: Please note, all training remains relevant to the most recent OWASP update. Verbiage for all modules (except the OWASP Update) is based off of 2017 OWASP Top 10 List. The Secure Coding - OWASP Update modules discusses the 2021 OWASP Top 10 List.

🔍 View Secure Coding in your Living Security platform catalog here!