Course Description
Presently, there is a vast opportunity for developing programs, using different techniques, but a structural approach has to be taken to keep security involved throughout the entire lifecycle of a solution. In this course, you learn about the software development lifecycle and software security guidelines. You will learn about a range of software vulnerabilities and exploitations, such as buffer overflow, injection attacks, cross-site scripting, directory traversal, and session hijacking. You will also learn about coding principles to reduce the risk of these attacks.
  • A strong foundation in basic networking concepts
  • A solid understanding of TCP/IP protocols and how they work
James Michael Stewart
Michael has over 30 years experience with computers and technology with a focus on security, certification, and various operating systems. He has been teaching job skills and certification courses on topics like CISSP, ethical hacking and penetration testing, computer forensics, and Security Plus for over 20 years. He is also the primary author of two books and holds a variety of certifications including CISSP, CEH, CHFI, ECSA, and Security Plus.