A company may have millions of lines of existing code and millions of dollars of investment in its business based on those lines of code. It is not reasonable to expect that the applications that those millions of lines of code support can be redesigned securely from scratch in a cost-effective fashion.
This course covers intermediate and advanced techniques that you can use to write new code securely, as well as ways to find and mitigate vulnerabilities in existing and legacy code for an existing, large enterprise application.
Control Hijacking Attacks
Writing Secure Code Tools
Dan Boneh, Professor of Computer Science and of Electrical Engineering, Stanford University
Neil Daswani, Chief Information Security Officer, LifeLock
John Mitchell, Professor of Computer Science and, by courtesy, of Electrical Engineering and of Education, Stanford University