- Joined
- Jan 8, 2019
- Messages
- 56,605
- Solutions
- 2
- Reputation
- 32
- Reaction score
- 100,451
- Points
- 2,313
- Credits
- 32,570
6 Years of Service
76%

Methodologies and tools to develop secure applications.
What you'll learn
Secure programming of application code
Main vulnerabilities inherent in applications
Secure coding
Owasp methodologies and standards
Understand how to mitigate and not introduce vulnerabilities in applications
Web Application Security
Course content
8 sections • 41 lectures • 2h 33m total length
Requirements
Knowledge of programming languages
Description
The course is suitable for programmers, project managers or software architects and provides indications on the methodological bases, standards (as Owasp best practices) and tools (as SAST and DAST tools) for developing secure code, avoiding the inclusion of bugs or vulnerabilities in the programs. Various practical workshops are carried out to support the theoretical treatment, which show the use of the tools and the mitigation of some of the vulnerabilities most frequently found in web or desktop applications.
Disclaimer
The information contained in this course is distributed "as is" and is intended for educational purposes only. While the author/instructor has made every effort to ensure the accuracy of the information contained in this course, the author/instructor assumes no responsibility for any loss, damage, inconvenience, or disruption caused to third parties due to any action taken or not taken based on this course. Despite all precautions taken, errors or omissions may have inadvertently crept into this course. The author/instructor would appreciate it if such errors or omissions were brought to their attention for possible correction.
All trademarks and brands mentioned in this course are for educational and explanatory purposes only, not for commercial purposes, and are the property of their respective owners.
Who this course is for:
Software developers
Project managers
Software architects
https://www.udemy.com/course/secure-coding-secure-application-development
To see this hidden content, you must like this content.