This course builds upon the skills and coding practices learned in both Principles of Secure Coding and Identifying Security Vulnerabilities, courses one and two, in this specialization. This course uses the focusing technique that asks you to think about: “what to watch out for” and “where to look” to evaluate and ultimately remediate fragile C++ library code.
Об этом курсе
Калифорнийский университет в Девисе
UC Davis, one of the nation’s top-ranked research universities, is a global leader in agriculture, veterinary medicine, sustainability, environmental and biological sciences, and technology. With four colleges and six professional schools, UC Davis and its students and alumni are known for their academic excellence, meaningful public service and profound international impact.
- 5 stars
- 4 stars
- 3 stars
- 1 star
Лучшие отзывы о курсе IDENTIFYING SECURITY VULNERABILITIES IN C/C++PROGRAMMING
Thoroughly enjoyed the course. learned a lot. thank you.
I liked the course and the instructor is really nice. It could use more code. This course has very minimal code.
Practical demos could have added more fun to this course.
More code and Example would be good in this code, Example code for Discussion would be good for ideal reference
Специализация Secure Coding Practices: общие сведения
This Specialization is intended for software developers of any level who are not yet fluent with secure coding and programming techniques.Through four courses, you will cover the principles of secure coding, concepts of threat modeling and cryptography and exploit vulnerabilities in both C/C++ and Java languages, which will prepare you to think like a hacker and protect your organizations information. The courses provide ample practice activities including exploiting WebGoat, an OWASP project designed to teach penetration testing.
Часто задаваемые вопросы
Когда я получу доступ к лекциям и заданиям?
Что я получу, оформив подписку на специализацию?
Можно ли получить финансовую помощь?
Остались вопросы? Посетите Центр поддержки учащихся.