Presently, there is a vast opportunity for developing programs, using different techniques, but a structural approach has to be taken to keep security involved throughout the entire lifecycle of a solution. In this course, you learn about the software development lifecycle and software security guidelines. You will learn about a range of software vulnerabilities and exploitations, such as buffer overflow, injection attacks, cross-site scripting, directory traversal, and session hijacking. You will also learn about coding principles to reduce the risk of these attacks.
- A strong foundation in basic networking concepts
- A solid understanding of TCP/IP protocols and how they work