Edureka

Secure Coding and SSDLC for Developers

Edureka

Secure Coding and SSDLC for Developers

ęœ¬čÆ¾ēØ‹ę˜Æ Secure Coding for Application Development 专锹课程 ēš„äø€éƒØåˆ†

Edureka

ä½ę•™åøˆļ¼šEdureka

åŒ…å«åœØ Coursera Plus äø­

ę·±å…„äŗ†č§£äø€äøŖäø»é¢˜å¹¶å­¦ä¹ åŸŗē”€ēŸ„čÆ†ć€‚
åˆēŗ§ 等级

ęŽØčä½“éŖŒ

9 å°ę—¶ 完成
ēµę“»ēš„č®”åˆ’
č‡Ŗč”Œå®‰ęŽ’å­¦ä¹ čæ›åŗ¦
ę·±å…„äŗ†č§£äø€äøŖäø»é¢˜å¹¶å­¦ä¹ åŸŗē”€ēŸ„čÆ†ć€‚
åˆēŗ§ 等级

ęŽØčä½“éŖŒ

9 å°ę—¶ 完成
ēµę“»ēš„č®”åˆ’
č‡Ŗč”Œå®‰ęŽ’å­¦ä¹ čæ›åŗ¦

ę‚Øå°†å­¦åˆ°ä»€ä¹ˆ

  • Analyze secure coding vulnerabilities and apply controls to prevent injection, authentication, and session risks.

  • Apply SSDLC practices to integrate security across design, development, testing, and deployment stages.

  • Evaluate application security using SAST, DAST, and threat modeling to identify and mitigate risks.

  • Implement DevSecOps practices to automate security checks and enforce secure CI/CD release workflows.

č¦äŗ†č§£ēš„čÆ¦ē»†äæ”ęÆ

åÆåˆ†äŗ«ēš„čÆä¹¦

ę·»åŠ åˆ°ę‚Øēš„é¢†č‹±ę”£ę”ˆ

ęœ€čæ‘å·²ę›“ę–°ļ¼

April 2026

ęŽˆčÆ¾čÆ­čØ€ļ¼šč‹±čÆ­ļ¼ˆEnglish)

äŗ†č§£é”¶ēŗ§å…¬åøēš„å‘˜å·„å¦‚ä½•ęŽŒę”ēƒ­é—ØęŠ€čƒ½

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal ēš„å¾½ę ‡

ē§Æē“Æē‰¹å®šé¢†åŸŸēš„äø“äøšēŸ„čÆ†

ęœ¬čÆ¾ēØ‹ę˜Æ Secure Coding for Application Development 专锹课程 äø“é”¹čÆ¾ēØ‹ēš„äø€éƒØåˆ†
åœØę³Øå†Œę­¤čÆ¾ēØ‹ę—¶ļ¼Œę‚Øčæ˜ä¼šåŒę—¶ę³Øå†Œę­¤äø“é”¹čÆ¾ēØ‹ć€‚
  • å‘č”Œäøšäø“å®¶å­¦ä¹ ę–°ę¦‚åæµ
  • čŽ·å¾—åÆ¹äø»é¢˜ęˆ–å·„å…·ēš„åŸŗē”€ē†č§£
  • é€ščæ‡å®žč·µé”¹ē›®åŸ¹å…»å·„ä½œē›øå…³ęŠ€čƒ½
  • čŽ·å¾—åÆå…±äŗ«ēš„čŒäøščÆä¹¦

čÆ„čÆ¾ēØ‹å…±ęœ‰4äøŖęØ”å—

Analyze the impact of insecure software by examining common vulnerability patterns, real-world security failures, and how attackers exploit weaknesses in application logic, input handling, and authentication mechanisms. Develop foundational secure coding skills by applying core security principles, validating inputs, and implementing secure authentication and session controls to prevent common attacks. Build practical analysis capabilities using Linux and Kali tools to navigate systems, analyze logs, apply regular expressions, and map application-level threats using frameworks such as MITRE ATT&CK, enabling a deeper understanding of how vulnerabilities translate into real-world attack behavior.

ę¶µē›–ēš„å†…å®¹

17个视频8ēÆ‡é˜…čÆ»ęę–™4个作业

Implement security across the software development lifecycle by integrating secure practices into requirements, design, development, testing, and release phases. Apply structured approaches such as shift-left security and basic threat modeling to identify risks early and reduce downstream vulnerabilities. Develop practical skills in security testing by analyzing applications using Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST), while incorporating continuous feedback mechanisms to improve code quality and ensure security is embedded as an ongoing process within development workflows.

ę¶µē›–ēš„å†…å®¹

9个视频4ēÆ‡é˜…čÆ»ęę–™3个作业

Analyze the role of DevSecOps in modern software delivery by examining how security can be integrated into continuous integration and continuous deployment (CI/CD) pipelines. Develop practical skills in automating security controls by implementing security as code, enforcing automated security gates, and integrating vulnerability detection into development workflows. Evaluate dependency risks using Software Composition Analysis (SCA) and apply automated security practices to ensure secure, scalable, and reliable software releases in fast-paced engineering environments.

ę¶µē›–ēš„å†…å®¹

9个视频4ēÆ‡é˜…čÆ»ęę–™3个作业

This module is designed to assess an individual on the various concepts and teachings covered in this course. Evaluate your knowledge with a comprehensive graded quiz.

ę¶µē›–ēš„å†…å®¹

1个视频1ēÆ‡é˜…čÆ»ęę–™2个作业

čŽ·å¾—čŒäøščÆä¹¦

å°†ę­¤čÆä¹¦ę·»åŠ åˆ°ę‚Øēš„ LinkedIn äøŖäŗŗčµ„ę–™ć€ē®€åŽ†ęˆ–å±„åŽ†äø­ć€‚åœØē¤¾äŗ¤åŖ’ä½“å’Œē»©ę•ˆč€ƒę øäø­åˆ†äŗ«ć€‚

ä½ę•™åøˆ

Edureka
Edureka
182 门课程165,859 åå­¦ē”Ÿ

ęä¾›ę–¹

Edureka

从 Computer Security and Networks ęµč§ˆę›“å¤šå†…å®¹

äŗŗä»¬äøŗä»€ä¹ˆé€‰ę‹© Coursera ę„åø®åŠ©č‡Ŗå·±å®žēŽ°čŒäøšå‘å±•

Felipe M.

自 2018å¼€å§‹å­¦ä¹ ēš„å­¦ē”Ÿ
''čƒ½å¤ŸęŒ‰ē…§č‡Ŗå·±ēš„é€Ÿåŗ¦å’ŒčŠ‚å„å­¦ä¹ čÆ¾ēØ‹ę˜Æäø€ę¬”å¾ˆę£’ēš„ē»åŽ†ć€‚åŖč¦ē¬¦åˆč‡Ŗå·±ēš„ę—¶é—“č”Øå’Œåæƒęƒ…ļ¼Œęˆ‘å°±åÆä»„å­¦ä¹ ć€‚'

Jennifer J.

自 2020å¼€å§‹å­¦ä¹ ēš„å­¦ē”Ÿ
''ęˆ‘ē›“ęŽ„å°†ä»ŽčÆ¾ēØ‹äø­å­¦åˆ°ēš„ę¦‚åæµå’ŒęŠ€čƒ½åŗ”ē”Øåˆ°äø€äøŖä»¤äŗŗå…“å„‹ēš„ę–°å·„ä½œé”¹ē›®äø­ć€‚'

Larry W.

自 2021å¼€å§‹å­¦ä¹ ēš„å­¦ē”Ÿ
''å¦‚ęžœęˆ‘ēš„å¤§å­¦äøęä¾›ęˆ‘éœ€č¦ēš„äø»é¢˜čÆ¾ēØ‹ļ¼ŒCoursera ä¾æę˜Æęœ€å„½ēš„åŽ»å¤„ä¹‹äø€ć€‚'

Chaitanya A.

''å­¦ä¹ äøä»…ä»…ę˜ÆåœØå·„ä½œäø­åšēš„ę›“å„½ļ¼šå®ƒčæœäøę­¢äŗŽę­¤ć€‚Coursera č®©ęˆ‘ę— é™åˆ¶åœ°å­¦ä¹ ć€‚'
Coursera Plus

é€ščæ‡ Coursera Plus å¼€åÆę–°ē”Ÿę¶Æ

ę— é™åˆ¶č®æé—® 10,000+ äø–ē•Œäø€ęµēš„čÆ¾ēØ‹ć€å®žč·µé”¹ē›®å’Œå°±äøšå°±ē»ŖčÆä¹¦čÆ¾ēØ‹ - ę‰€ęœ‰čæ™äŗ›éƒ½åŒ…å«åœØę‚Øēš„č®¢é˜…äø­

é€ščæ‡åœØēŗæå­¦ä½ęŽØåŠØę‚Øēš„čŒäøšē”Ÿę¶Æ

čŽ·å–äø–ē•Œäø€ęµå¤§å­¦ēš„å­¦ä½ - 100% 在线

åŠ å…„č¶…čæ‡ 3400 家选择 Coursera for Business ēš„å…Øēƒå…¬åø

ęå‡å‘˜å·„ēš„ęŠ€čƒ½ļ¼Œä½æå…¶åœØę•°å­—ē»ęµŽäø­č„±é¢–č€Œå‡ŗ

åøøč§é—®é¢˜

¹ ęœ¬čÆ¾ēØ‹ēš„éƒØåˆ†ä½œäøšé‡‡ē”Ø AI čÆ„åˆ†ć€‚åÆ¹äŗŽčæ™äŗ›ä½œäøšļ¼Œå°†ę ¹ę® Coursera éšē§å£°ę˜Žä½æē”Øę‚Øēš„ę•°ę®ć€‚