RiseUpp Logo
Educator Logo

Secure Software Development: Verification

This course is part of Secure Coding Essentials Certificate.

This comprehensive course focuses on developing secure software fundamentals, specifically targeting software developers and DevOps professionals. It covers practical security verification methods, threat modeling, and cryptography essentials. Students learn to implement static and dynamic analysis approaches, integrate security testing in continuous integration pipelines, and understand cryptographic capabilities. The course emphasizes practical defense strategies against common attacks and techniques for rapid vulnerability response, making it an essential resource for creating robust, secure software systems.

Instructors:

English

Arabic, German, English, 9 more

Powered by

Provider Logo
Secure Software Development: Verification

This course includes

7 Weeks

Of Self-paced video lessons

Beginner Level

Completion Certificate

awarded on course completion

20,590

Audit For Free

What you'll learn

  • Master security verification techniques including static and dynamic analysis

  • Implement effective threat modeling using STRIDE methodology

  • Understand and apply cryptographic capabilities in software development

  • Deploy secure software and manage vulnerability responses efficiently

Skills you'll gain

DevOps
Cryptography
Security Verification
Threat Modeling
Software Development
SAST
CI/CD
Linux

This course includes:

PreRecorded video

Graded assignments, Final Exam

Access on Mobile, Tablet, Desktop

Limited Access access

Shareable certificate

Closed caption

Get a Completion Certificate

Share your certificate with prospective employers and your professional network on LinkedIn.

Provided by

Certificate

Top companies offer this course to their employees

Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.

icon-0icon-1icon-2icon-3icon-4

There are 6 modules in this course

The course covers essential aspects of secure software development, focusing on verification techniques and specialized security topics. Key areas include security verification methods, threat modeling using STRIDE, cryptographic implementations, and continuous integration security practices. Students learn both theoretical concepts and practical applications in securing software systems.

Welcome!

Module 1

Verification

Module 2

Threat Modeling

Module 3

Cryptography

Module 4

Other Topics

Module 5

Final Exam

Module 6

Fee Structure

Individual course purchase is not available - to enroll in this course with a certificate, you need to purchase the complete Professional Certificate Course. For enrollment and detailed fee structure, visit the following: Secure Coding Essentials Certificate

Instructor

Distinguished Open Source Security Expert and Linux Foundation Director

David A. Wheeler serves as the Director of Open Source Supply Chain Security at the Linux Foundation, bringing decades of expertise in secure software development and open source software (OSS). His significant contributions include authoring the influential "Secure Programming HOWTO" and pioneering work on countering malicious tools through Diverse Double-Compiling (DDC). As an adjunct professor at George Mason University, he teaches graduate courses in secure software development while leading the OpenSSF Best Practices Badge project at the Linux Foundation. His academic credentials include a Ph.D. in Information Technology, a Master's in Computer Science, certificates in Information Security and Software Engineering, and a B.S. in Electronics Engineering, all from George Mason University. A Certified Information Systems Security Professional (CISSP) and IEEE Senior Member, Wheeler has significantly influenced OSS security through his work with the National Information Assurance Partnership and contributions to the U.S. Department of Defense's OSS policy. His research and publications on secure software development, open source evaluation, and supply chain security continue to shape industry standards and practices.

Secure Software Development: Verification

This course includes

7 Weeks

Of Self-paced video lessons

Beginner Level

Completion Certificate

awarded on course completion

20,590

Audit For Free

Testimonials

Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.

Frequently asked questions

Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.