Security System and Application Development
Explore the process of secure system development
Secure design is a crucial consideration within software development. It helps to guarantee that systems are reliable, trustworthy and properly functioning.
This two-week course offers you the chance to equip yourself with a range of techniques for the design and implementation of secure systems. You’ll have the chance to explore secure programming principles, investigate how formal modelling can be incorporated into the development process, and review options for managing secure system development.
Implement robust security operation practices
In the first week of this course, you’ll have the opportunity to learn the principles of secure programming. You’ll build your understanding of layered security and the principles of secure programming, and will be able to discuss how these apply to real-world systems. This week also covers potential implementation errors, providing you with a list of common pitfalls and vulnerabilities.
Apply core security technologies within your system
You’ll familiarise yourself with a variety of core security technologies, such as encryption, different authentication techniques, and access control. Once you’ve covered the basics, you’ll be able to develop secure systems using these tools and experiment with your system’s functionality.
Upon completion of this course, you’ll have a sound understanding of the principles and technologies used in secure programming, ready to try them out and build your knowledge so you can carry out ongoing security tests and maintenance.
- Implementing secure systems
- Managing secure system development
Learning on this course
On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.
What will you achieve?
By the end of the course, you‘ll be able to...
- Explain the principles of secure programming and its application in real world systems
- Explore implementation errors and exploits
- Experiment with a system’s functioning using formal models
- Apply a range of core security technologies (eg access control, encryption, authentication techniques)
- Develop secure systems using the respective tools
Who is the course for?
This course is suited to people looking to increase their understanding of software development lifecycle and security considerations. It has been designed for security analysts, security architects, software developers, and aspiring security specialists.
If you want to further your understanding, you may be interested in these courses. They’re from the same provider and share the same overall learning outcomes:
Do you know someone who'd love this course? Tell them about it...
Learners who joined this course have also enjoyed these courses.