Description

Vendor: THE LINUX FOUNDATION

Course Outline

Chapter 1. Introduction

Chapter 2. Part 1: Requirements, Design and Reuse - Overview

Chapter 3. Security Basics

Chapter 4. Secure Design Principles

Chapter 5. Reusing External Software

Chapter 6. Part 2: Implementation - Overview

Chapter 7. Input Validation

Chapter 8. Processing Data Securely

Chapter 9. Calling Other Programs

Chapter 10. Sending Output

Chapter 11. Part 3: Verification and More Specialized Topics

Chapter 12. Verification

Chapter 13. Threat Modeling

Chapter 14. Cryptography

Chapter 15. Other Topics

Chapter 16. Final Exam

Price