Online Course – Certified Professional Internship in Secure Coding from Google and the University of California, Davis

Discover our world of content with a wide variety of articles, guides, and tips that will provide you with useful and extensive information in every field. Log in now and enjoy high-quality, accessible content.

Suggested by: Coursera (What is Coursera?)

Professional Certificate

Intermediate level

No prior knowledge required

Time to complete the course

7-day free trial

No unnecessary risks

Skills you will acquire in the course

  • Cyber
  • Secure programming
  • C/C++

What you will learn in the course

Courses for which the course is suitable

  • Software developer
  • Software Engineer
  • Information Security Specialist
  • Cybersecurity researcher
  • Application developer
  • Systems developer
  • Secure coding expert
  • Vulnerability Analyst
  • C/C++ developer
  • Java developer

Internship – Series of 4 courses

General description

This specialization is intended for software programmers of all levels who have not yet mastered secure coding techniques.

What will you learn?

  • Principles of secure coding
  • Threat modeling concepts
  • Cryptography
  • Exploiting vulnerabilities in C/C++ and Java languages

Course objectives

You will learn to exploit vulnerabilities in C/C++ and Java languages, so you can think like a hacker and protect your organization’s information.

Practice activities

  • Using WebGoat
  • An OWASP project designed to teach penetration testing
The Applied Learning Project

The courses provide many practice activities, including using WebGoat, an OWASP project designed to teach penetration testing.

Summary

This specialization is intended for software programmers of all levels who have not yet mastered secure coding techniques.

Details of the courses that make up the specialization

In secure coding principles

  • Course 1
    • 15 hours
    • 4.4 (346 ratings)
  • Course Details
    • What you’ll learn
      • This curriculum introduces the principles of secure programming.
      • A discussion of the philosophy and principles of secure programming.
      • Introducing strong programming and the relationship between strong programming and secure programming.
      • A detailed example of writing strong code.
      • Many common programming problems and their relationship to writing robust and secure software.
      • Eight design principles that guide secure coding.
      • Poor design choices and their impact on implementation in coding.
      • Informal, formal, and workaround coding methods.
      • Methods for improving the security and robustness of programs.
      • Opportunity to practice the concepts in various laboratory activities.
      • Knowledge of the C programming language is helpful, but not required.

Identifying security vulnerabilities

  • Course 2
    • 13 hours
    • 4.7 (171 ratings)
  • Course Details
    • What you’ll learn
      • Building a foundation of secure programming concepts.
      • Threat modeling and cryptography.
      • Creating threat models and critical thinking about existing models.
      • The basics of using cryptography: encryption and secure blame.
      • Attackers can exploit vulnerabilities in applications.
      • Injection problems in web applications.
      • Application authentication and session management.
      • Sensitive data disclosure issues.
      • Storing information related to passwords.
      • A coding task to understand mechanisms for storing information.

Skills you will acquire

  • Category: Cryptography
  • Category: Secure Programming
  • Category: Authentication Methods

Identifying security vulnerabilities in C/C++ languages

  • Course 3
    • 22 hours
    • 4.6 (79 ratings)
  • Course Details
    • What you’ll learn
      • Assessment of C++ library code vulnerability.
      • Writing a robust version of a broken C++ library.
      • Identify problems with permissions, trusted environments, input validation.
      • Resource management, asynchrony, and randomness in C/C++ languages.
      • Fixing examples of problems in C/C++ interactions.

Exploiting and protecting against vulnerabilities in Java applications

  • Course 4
    • 23 hours
    • 4.4 (65 ratings)
  • Course Details
    • What you’ll learn
      • Protection against cross-site scripting (XSS) attacks.
      • Designing programs to reduce injection vulnerabilities.
      • Strategies and controls for granting secure authentication.
      • Detecting and repairing exposure components.

Skills you will acquire

  • Category: Java
  • Category: Secure Programming
  • Category: Security
  • Category: Java Programming