Enroll today to experience new and improved course content, including a new virtual programming lab.
A company may have millions of lines of existing code, and tens of millions of dollars of investment in their business based on those lines of code. It is not reasonable to expect that the applications that those millions of lines of code support can be redesigned securely from scratch in a cost-effective fashion.
In this course, learn and experience intermediate and advanced techniques that systems and applications programmers can use to write new code securely, as well as to find and mitigate vulnerabilities in existing code. In addition to covering these threats, we discuss various tools and techniques that can be used to secure large amounts of legacy code. Our course will demonstrate how to use off-the-shelf tools to secure an existing, large enterprise application.
You Will Learn
- Control Hijacking Attacks and Defenses
- Attacks Using Virtual Machines
- Tools for Writing Code Securely
- Static and Dynamic Analysis
- Language-based Security Models
- Isolation Techniques
- Himanshu Dwivedi, CEO, Data Theorem
- Mukul Khullar, Staff Information Security Engineer, LinkedIn
- Parisa Tabriz, Engineering Director, Google
We recommend you have the equivalent of a BS in Computer Science and/or a background in security.