Skip to content

Latest commit

 

History

History
123 lines (88 loc) · 5.84 KB

security.md

File metadata and controls

123 lines (88 loc) · 5.84 KB

Security

Moderate

With this module, you'll learn how to keep secrets safe and write code that keeps user data private and secure.

Bank vault

Topics

OWASP Top 10

With this topic, you'll learn about the most common application security issues and how to mitigate them.

Learning Outcomes

  • Describe each of the vulnerabilities in the OWASP Top 10
  • Describe what threat modeling is
  • Explain how you might prevent the "Broken Access Control" vulnerability
  • Explain what remediation is and how you might remediate an "Injection" vulnerability

Resources

Exercises


Authentication and Authorization

With this topic, you'll learn about identity providers and how to use OAuth 2.0 to manage authentication and authorization in an application.

Learning Outcomes

  • Compare authentication with authorization and explain their differences
  • Use an identity provider to authenticate users in an application
  • Explain what "federated identities" are
  • Explain what the OAuth 2.0 standard is

Resources

Exercises


Managing Secrets

With this topic, you'll learn about application secrets and how to manage them effectively.

Learning Outcomes

  • Describe what an application secret is
  • Describe what an environment variable is
  • Explain why you might want to secure an application secret
  • Explain how you might inject secrets into an application using environment variables

Resources

Exercises


Continuous Security

With this topic, you'll learn about methods to integrate security scanning into a project CI/CD pipeline.

Learning Outcomes

  • Describe what continuous security is
  • List out some tools you might use to scan a project for vulnerabilities
  • Explain how you might go about remediating vulnerabilities found from automated scanning

Resources

Exercises


Working with Security Engineers

With this topic, you'll learn about the role of a security engineer and how to work with them on your team effectively.

Learning Outcomes

  • Describe the role of a security engineer
  • Identify what you need from a security engineer to complete software engineering tasks
  • Explain how you might work with a security engineer to remediate vulnerabilities

Resources

Exercises