Mastering The Security Code Review

Posted By: ELK1nG

Mastering The Security Code Review
Published 12/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 700.08 MB | Duration: 2h 0m

Secure, Clean, Scalable, and Effective Code Reviews for Teams

What you'll learn

Learn how to setup a process for conducting efficient and effective security code reviews

Dive into the human side of code reviews and learn how to communicate with your team

Review examples of Code Review Checklists, Reports, and Metrics

Gain insight into scoping techniques based on Data Flow Decomposition and Threat Modeling

Learn about common vulnerabilities to look for when performing a security code review

Find out how to spot anti-patterns during code reviews

Get actionable information on code crawling techniques to help focus your review

Gain insight into how automation with SAST tools can support your code review efforts

Requirements

An understanding of basic software development and security practices are helpful.

Description

Unlock the key to secure software development with Mastering the Security Code Review. This comprehensive course is designed for developers, security professionals, and anyone involved in the software development lifecycle who wants to enhance their skills in identifying and mitigating security vulnerabilities through effective code review practices.Course Highlights:Understanding Security Principles: Explore foundational security principles and concepts to establish a strong knowledge base for secure coding practices.Code Review Process: Learn a systematic approach to conducting security code reviews, from setting objectives to prioritizing findings.Identifying Common Vulnerabilities: Gain hands-on experience in identifying and understanding common security vulnerabilities, including injection attacks, authentication flaws, and more.Secure Coding Best Practices:Explore industry best practices for writing secure code and learn how to integrate security considerations into the development process.Tools and Techniques: Familiarize yourself with popular code analysis tools and techniques used in security code reviews to streamline the review process.Code Review Automation: Discover how to integrate automated tools and scripts into your code review process to enhance efficiency and accuracy.Collaboration and Communication: Explore effective communication strategies for collaborating with development teams, fostering a culture of security awareness.Documentation and Reporting: Learn how to create comprehensive and clear documentation and reports to communicate findings and recommendations to stakeholders.Continuous Improvement: Discuss strategies for incorporating security code reviews into the broader software development lifecycle and fostering a culture of continuous improvement.This course is designed to equip participants with the skills and knowledge needed to confidently conduct security code reviews and contribute to building secure software. Join us on this journey to enhance your expertise in securing applications from potential threats and vulnerabilities.

Overview

Section 1: Introduction

Lecture 1 Introduction

Lecture 2 The Security Code Review

Lecture 3 Course Structure and Content

Section 2: Foundation Concepts

Lecture 4 Building Secure Software

Lecture 5 Risk Management

Section 3: Reviewing Code - Not People

Lecture 6 When Your Code is Being Reviewed

Lecture 7 When You Are Reviewing Code

Section 4: Conducting the Security Code Review

Lecture 8 Secure Code Review Maturity

Lecture 9 The SCR Process

Lecture 10 SDLC and the Secure Code Review

Lecture 11 Vulnerability Lists as a Guide

Lecture 12 Data Flow as a Guide

Lecture 13 Threat Modeling as a Guide

Lecture 14 Metrics

Lecture 15 Templates for Checklists, Reports, and Metrics

Section 5: What to Look For: Code-Based Vulnerabilities

Lecture 16 Types of Vulnerabilities

Lecture 17 Deep Dive: Authorization and Session Management

Lecture 18 Deep Dive: Cookies

Lecture 19 Deep Dive: Input Validation

Lecture 20 Deep Dive: Error Handling and Logging

Section 6: What to Look For: Anti-Patterns and Bad Practices

Lecture 21 What is an Anti-Pattern?

Lecture 22 Deep Dive: Not Knowing What Libraries Contain

Lecture 23 Deep Dive: Using Production Data

Lecture 24 Deep Dive: Blacklists for Input Validation

Lecture 25 Deep Dive: Unsafe String Concatenation

Lecture 26 Deep Dive: Systems That Can't Be Updated

Section 7: Crawling the Code

Lecture 27 Code Crawling 101

Lecture 28 HTML Tags

Lecture 29 HTTP Request Strings

Lecture 30 HTML Output and Cookies

Lecture 31 Input Controls

Lecture 32 SQL and Databases

Lecture 33 JavaScript

Section 8: Leveraging Automation

Lecture 34 SAST Basics

Lecture 35 Common SAST Tools

Lecture 36 SAST Supports the Code Review

Lecture 37 Coverage and Focus

Section 9: Conclusion

Lecture 38 Summary and Thank You

Application Security Architects,Application Developers,Software Engineering Professionals,Engineering Managers,Security Managers