Enroll today to experience a new and improved version of this course, including a virtual programming lab.
A company may have millions of lines of existing code, and tens of millions of dollars of investment in their business based on those lines of code. It is not reasonable to expect that the applications that those millions of lines of code support can be redesigned securely from scratch in a cost-effective fashion.
In this course, learn and experience intermediate and advanced techniques that systems and applications programmers can use to write new code securely, as well as to find and mitigate vulnerabilities in existing code. In addition to covering threats, we focus on discussing tools and techniques that can be used to secure large amounts of legacy code. Our course will demonstrate how to use off-the-shelf tools to secure an existing, large enterprise application.
Includes exclusive interviews with Himanshu Dwivedi (CEO, Data Theorem Inc.), Mukul Khullar (Staff Information Security Engineer, LinkedIn) and Parisa Tabriz (Engineering Director, Google).
Control Hijacking Attacks and Defenses
Tools for Writing Code Securely
Language-based Security Models
Dan Boneh, Professor of Computer Science and of Electrical Engineering, Stanford University
John Mitchell, Professor of Computer Science and, by courtesy, of Electrical Engineering and of Education, Stanford University