Description

Course Outline
1. Introduction
2. Part 1: Requirements, Design and Reuse - Overview
3. Security Basics
4. Secure Design Principles
5. Reusing External Software
6. Part 2: Implementation - Overview
7. Input Validation
8. Processing Data Securely
9. Calling Other Programs
10. Sending Output
11. Part 3: Verification and More Specialized Topics
12. Verification
13. Threat Modeling
14. Cryptography
15. Other Topics
16. Final Exam
Let's talk for make something great together. We are trusted by over 100+ clients. Join them by using our services and grow your business.
Appsec Asia