Enroll today to experience new and improved course content, including an exclusive interview with Himanshu Dwivedi, CEO of Data Theorem and Parisa Tabriz, Engineering Director, Google.
A company may have millions of lines of existing code, and tens of millions of dollars of investment in their business based on those lines of code. It is not reasonable to expect that the applications that those millions of lines of code support can be redesigned securely from scratch in a cost-effective fashion. In this course, learn and experience intermediate and advanced techniques that systems and applications programmers can use to write new code securely, as well as to find and mitigate vulnerabilities in existing code. In addition to covering threats to legacy code, we focus on discussing tools and techniques that can be used to secure large amounts of legacy code. Our course will demonstrate how to use off-the-shelf tools to secure an existing, large enterprise application.
You Will Learn
- Control Hijacking Attacks
- Writing Secure Code Tools
We recommend you have the equivalent of a BS in Computer Science and a background in security.
We highly recommend that you take this course, Software Security Foundations (XACS101) as the 1st course within the Stanford ACS certificate program. It provides the fundamentals necessary for the subsequent courses in the program.