Defensive Programmer: Defensive Concepts

placeholder

Explore key defensive programming concepts including the Cert Top 10 practices for secure coding along with other topics covered in this 9-video course. To begin take a look at the general defense coding concepts the basic concepts and principles that permeate defensive programming. The next two-part tutorial concerns CERT top 10 secure coding practices: Part A on the first five CERT top 10 secure coding practices—validate input Heed compiler warnings Architect and design for security keep it simple and the default deny. Part B covers the last five CERT top 10 secure coding practices—adhere to the principles of least privilege sanitize data sent to other systems practice defense in depth use effective quality assurance techniques and adopt a secure coding standard. This leads learners into learning how to apply defensive coding; using Open Source Security Testing Methodology Manual concepts for secure testing and applying the Flaw Hypothesis Method. The final tutorial in this course looks at the role of Six Sigma in producing better quality secure programming.