Master secure coding practices in C/C++, focusing on identifying and remediating common vulnerabilities like buffer overflows and input validation issues.
Master secure coding practices in C/C++, focusing on identifying and remediating common vulnerabilities like buffer overflows and input validation issues.
This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full Secure Coding Practices Specialization program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.
4.6
(79 ratings)
9,034 already enrolled
Instructors:
English
What you'll learn
Apply vulnerability identification techniques to C++ library code
Code robust versions of fragile C++ programs
Identify security issues in privilege management and input validation
Implement secure practices for cryptography and random number generation
Skills you'll gain
This course includes:
7.4 Hours PreRecorded video
8 quizzes
Access on Mobile, Tablet, Desktop
FullTime access
Shareable certificate
Get a Completion Certificate
Share your certificate with prospective employers and your professional network on LinkedIn.
Created by
Provided by

Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.





There are 4 modules in this course
This course builds upon the Principles of Secure Coding foundations and teaches advanced security vulnerability identification in C/C++ programming. Students learn to evaluate and remediate fragile C++ library code through practical examples and hands-on exercises. The curriculum covers crucial security topics including buffer overflows, input validation, privilege management, cryptography, and secure programming practices. Through extensive lab work and real-world examples, students develop skills to write robust, secure code resistant to common security vulnerabilities.
Users, Privileges, and Environment Variables
Module 1 · 6 Hours to complete
Validation and Verification, Buffer and Numeric Overflows, and Input Injections
Module 2 · 5 Hours to complete
Files, Subprocesses, and Race Conditions
Module 3 · 3 Hours to complete
Randomness, Cryptography, and Other Topics
Module 4 · 7 Hours to complete
Fee Structure
Instructor
Leading Expert in Computer Security at UC Davis
Professor Matthew Bishop is a distinguished faculty member in the Department of Computer Science at the University of California, Davis, with a research focus on computer security that spans over four decades. Since 1979, he has been deeply involved in various aspects of security, particularly vulnerability analysis and denial of service issues. His work also encompasses formal modeling, especially concerning access controls and the Take-Grant Protection Model, as well as intrusion detection and response mechanisms. Professor Bishop has significant expertise in the security of UNIX operating systems and is dedicated to enhancing education in information assurance; he is a charter member of the Colloquium for Information Systems Security Education. His influential textbook, Computer Security: Art and Science, published by Addison-Wesley in December 2002, serves as a key resource in the field. Through his extensive research and commitment to education, Professor Bishop continues to shape the landscape of computer security at UC Davis and beyond.
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
4.6 course rating
79 ratings
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.