About this Course

29,838 recent views
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Intermediate Level

1-2 years of experience with some form of computer programming language like C/C++ or Java.

Approx. 16 hours to complete
English
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Intermediate Level

1-2 years of experience with some form of computer programming language like C/C++ or Java.

Approx. 16 hours to complete
English

Offered by

Placeholder

University of California, Davis

Syllabus - What you will learn from this course

Week
1

Week 1

3 hours to complete

Secure Programming Philosophy

3 hours to complete
10 videos (Total 66 min), 1 reading, 2 quizzes
10 videos
Module 1 Introduction1m
The Philosophy of Secure Programming2m
Defining Secure Programming4m
Robust vs. Secure Programming14m
Security Policies and Procedures8m
Secure Programming General Philosophy10m
Checking Design and Implementation9m
Where to Look for Vulnerabilities11m
Secure Programming Summary49s
1 reading
A Note From UC Davis10m
2 practice exercises
Module 1 Practice Quiz30m
Module 1 Quiz45m
Week
2

Week 2

4 hours to complete

Secure Programming Design Principles

4 hours to complete
11 videos (Total 36 min), 1 reading, 2 quizzes
11 videos
Secure Programming Design Principles Overview2m
Principle of Least Privilege3m
Fail-Safe Defaults3m
Principle of Economy of Mechanism1m
Principle of Complete Mediation1m
Separation of Privilege Principle3m
Principle of Open Design7m
Principle of Least Common Mechanism4m
Principle of Least Astonishment6m
Secure Programming Design Principles Summary1m
1 reading
Complete Mediation - What Is Going On?10m
2 practice exercises
Module 2 Practice Quiz30m
Module 2 Quiz30m
Week
3

Week 3

5 hours to complete

Robust Programming

5 hours to complete
9 videos (Total 61 min), 2 readings, 2 quizzes
9 videos
Robust Programming Overview43s
Robust Programming Basic Principles3m
An Example Of Fragile Code13m
Error Handling11m
Cohesion, New Interfaces, and Token Generation13m
Token Generation and Interpretation5m
Creating and Deleting a Queue5m
Adding and Removing Elements to a Queue5m
2 readings
Before You Begin This Module...5m
Fragile Programs - What Is Going On?10m
2 practice exercises
Module 3 Practice Quiz15m
Module 3 Quiz30m
Week
4

Week 4

4 hours to complete

Methods for Robustness

4 hours to complete
8 videos (Total 41 min), 1 reading, 2 quizzes
8 videos
Methods Overview: Formal, Informal, and Ad Hoc Methods3m
Overview of Formal Methods2m
Login Program Example10m
Incorporating Hierarchical Decomposition Methodology9m
Login Program: Authenticating a User11m
Login Program: Preconditions and Postconditions32s
Course Summary1m
1 reading
Robust Programs - What Is Going On?10m
2 practice exercises
Module 4 Practice Quiz15m
Module 4 Quiz30m

Reviews

TOP REVIEWS FROM PRINCIPLES OF SECURE CODING

View all reviews

About the Secure Coding Practices Specialization

Secure Coding Practices

Frequently Asked Questions

More questions? Visit the Learner Help Center.