Search result for Software design threats Online Courses & Certifications
Get Course Alerts by Email
Software Design Threats and Mitigations
by Albert Glock- 4.7
Approx. 19 hours to complete
The design step in developing software has some unique characteristics. Secure software design is good software design. Secure software design is good software design Specific Design Considerations Design Principles in detail -- I Design Principles in detail - II Design Principles in detail Simple software compromises Software Life Cycle and Management considerations...
OWASP top 10: Web Application Security (no coding!)
by Soerin Bipat- 4.2
1 hour on-demand video
I will teach you the 10 most common threats identified by the Open Web Application Security Project (OWASP). The threats are explained conceptually, since the implementation of a threat may differ per situation. I've also added privacy by design resources in this course. This means both security by design and privacy by design! - Overview of a secure software development process....
$18.99
CompTIA Security+ Certification - SY0-401 (2014 Objectives)
by Infinite Skills- 4.4
9 hours on-demand video
This course will teach you about network design elements and wireless networks....
$14.99
Design and Analyze Secure Networked Systems
by Edward Chow- 3.8
Approx. 15 hours to complete
We will learn the risk management framework for analyzing the risks in a network system, and apply the basic security design principles to protect the data and secure computer systems. Vulnerabilities and Threats In Software We Trust. Using GPG to Sign/Verify Software Sign Software with GPG Verify Software Integrity and Authenticity...
Systems and Application Security
by (ISC)² Education & Training- 4.8
Approx. 17 hours to complete
Malicious Code and Activity: Software Exploitation Methods Malicious Code and Activity: Software Exploitation Methods Malicious Code and Activity: Software Exploitation Methods Malicious Code and Activity: Software Exploitation Methods Cloud Security: Technologies to Address Threats Cloud Security: Technologies to Address Threats...
Hardware Security
by Gang Qu- 4.3
Approx. 12 hours to complete
Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware. Vulnerabilities in Digital Logic Design Design Intellectual Property Protection...
Cyber Security in Manufacturing
by Shambhu Upadhyaya- 4.7
Approx. 22 hours to complete
The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. Software Security Flaws and Threats Additional (optional) Resources: Software Security and Secure Programming Practices Intellectual Property Protection from Threats...
Related searches
IT Security: Defense against the digital dark arts
by Google Career CertificatesTop Instructor- 4.8
Approx. 30 hours to complete
It introduces threats and attacks and the many ways they can show up. Understanding Security Threats Malicious Software Supplemental Reading for Malicious Software Malicious Software Understanding Security Threats Network Software Hardening Software Patch Management Creating a Company Culture for Security - Design Document...
IT Security Fundamentals: CompTIA Security+ 2015
by LearnSmart LLC- 0.0
24.5 hours on-demand video
Section 30: Intrusion Detection System (IDS) is a device or software that monitors network activities and system activities. Section 31: Exploit is a common term in the computer security community that refers to a piece of software that takes advantage of a bug or glitch. Threats can come from inside our network and the internet....
$199.99
Introduction to Cyber Attacks
by Dr. Edward G. Amoroso- 4.7
Approx. 19 hours to complete
Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Examining Cyber Threats More Closely Botnet Design Mapping Assets to Threats Final Quiz - What level of security risk do you estimate for the following threat-asset matrix entries for the ACME Software Company:...