Description
Vendor: THE LINUX FOUNDATION
Course Outline
Chapter 1. Introduction
Chapter 2. Part 1: Requirements, Design and Reuse - Overview
Chapter 3. Security Basics
Chapter 4. Secure Design Principles
Chapter 5. Reusing External Software
Chapter 6. Part 2: Implementation - Overview
Chapter 7. Input Validation
Chapter 8. Processing Data Securely
Chapter 9. Calling Other Programs
Chapter 10. Sending Output
Chapter 11. Part 3: Verification and More Specialized Topics
Chapter 12. Verification
Chapter 13. Threat Modeling
Chapter 14. Cryptography
Chapter 15. Other Topics
Chapter 16. Final Exam