Identifying Security Vulnerabilities in C/C++Programming

This course is part of Secure Coding Practices Specialization

Instructor: Matthew Bishop, PhD

What you'll learn

  •    Apply “what to watch out for” and “where to look” to evaluate fragility of C++ library code.
  •   Given a fragile C++ library, code a robust version.
  •   Identify problems w/ privilege, trusted environments, input validation, files & sub-processes, resource mngmt, asynchronicity, & randomness in C/C++.
  •   Remediate examples of problems that apply to C/C++ interactions with the programming environment.
  • Skills you'll gain

  •   OS Process Management
  •   Data Validation
  •   File Management
  •   C and C++
  •   C (Programming Language)
  •   Secure Coding
  •   Cryptography
  •   Linux
  •   Application Security
  •   Vulnerability Assessments
  •   Debugging
  •   Identity and Access Management
  •   Security Engineering
  •   Encryption
  •   User Accounts
  • There are 4 modules in this course

    The techniques you’ll be examining will make your programs perform accurately and be resistant to attempts to perform inaccurately. This is really what the term secure programming means. You will be shown common errors that people make, and then learn how to program more robustly. You will apply tips and best practices to help you improve your programming style and help you to avoid common problems like buffer overflows, which may or may not cause security problems.

    Validation and Verification, Buffer and Numeric Overflows, and Input Injections

    Files, Subprocesses, and Race Conditions

    Randomness, Cryptography, and Other Topics

    Explore more from Computer Security and Networks

    ©2025  ementorhub.com. All rights reserved