Skip to main content
Side panel
Courses
Programs
Help
Getting Started
Discussion Forums
Help Center & FAQ
Search
Close
Search
Toggle search input
Log in or Sign up
Courses
Programs
Help
Getting Started
Discussion Forums
Help Center & FAQ
CS406: Information Security (2018.A.01)
Sections
Course Introduction
Unit 1: Computer Security Concepts
Unit 2: Basic Cryptographic Concepts
Unit 3: Public-Key Encryption
Unit 4: Access Control Mechanisms
Unit 5: Security Solutions
Unit 6: Firewalls, Intrusion Detection, and Intrusion Prevention
Unit 7: Physical Security
Unit 8: Malicious Software and Software Security
Unit 9: Security Risk Management
Final Exam
Resources
Activities
Quizzes
Home
My programs
CS406: Information Security (2018.A.01)
Home
Courses
(hidden)
CS406: Information Security (2018.A.01)
Sections
Unit 8: Malicious Software and Software Security
8.4: Secure Coding
Open Web Application Security Project: "Secure Coding Principles"
Back to '8.4: Secure Coding\'
Open Web Application Security Project: "Secure Coding Principles"
Mark as completed
Read this page.
Click
http://web.archive.org/web/20160609191546/https://www.owasp.org/index.php/Secure_Coding_Principles
link to open resource.
Mark as completed
Previous
Jump to...
Jump to...
Course Syllabus
Course Terms of Use
Unit 1 Learning Outcomes
The Open University: "An Introduction to Information Security"
George Mason University: Paul A. Strassman's "Information Assurance for Defense Security"
University of Miami School of Medicine: "Confidentiality, Integrity, and Availability"
National Institute of Standards and Technology: "Standards for Security Categorization of Federal Information and Information Systems"
Robert J. Shimonski's "Threats and Your Assets: What Is Really at Risk?"
Unit 2 Learning Outcomes
Steve Weis' "Theory and Practice of Cryptography"
Gary C. Kessler's "An Overview of Cryptography: The Purpose of Cryptography"
Gary C. Kessler's "An Overview of Cryptography: Some of the Finer Details of DES, Breaking DES, and DES Variants"
Tropical Software: "Triple DES Encryption"
Gary C. Kessler's "An Overview of Cryptography: The Advanced Encryption Standard and Rijndael"
Unit 3 Learning Outcomes
Whitfield Diffie's "Before, During, and After Public-Key Cryptography"
Naval Postgraduate School: "Public Key Cryptography"
Gary C. Kessler's "An Overview of Cryptography: Public-Key Cryptography"
Gary C. Kessler's "An Overview of Cryptography: Some of the Finer Details of RSA Public-Key Cryptography"
Gary C. Kessler's "An Overview of Cryptography: Some of the Finer Details of Diffie-Hellman"
CrypTool: http://www.cryptool.org/
Unit 4 Learning Outcomes
Open Web Application Security Project: "Authentication"
Open Web Application Security Project: "Access Control and Authorization"
National Institute of Standards and Technology: "An Introduction to Role-Based Access Control"
Purdue University: Sylvia Osborn's "The Role Graph Model and Its Extensions"
Unit 5 Learning Outcomes
Indian Institute of Technology, Kharagpur: Indranil Sengupta's "Basic Cryptographic Concepts"
Gary C. Kessler's "An Overview of Cryptography: IP Security (IPSec) Protocol"
Gary C. Kessler's "An Overview of Cryptography: The SSL Family of Secure Transaction Protocols for the World Wide Web"
Gary C. Kessler's "An Overview of Cryptography: Pretty Good Privacy (PGP)"
Unit 6 Learning Outcomes
Indian Institute of Technology, Kharagpur: Indranil Sengupta's "Intranet, Extranet, Firewall"
The Open University: "Firewalls - An Overview"
Jeff Tyson's "How Firewalls Work”
Ricky M. Magalhaes' "Host-Based IDS vs. Network-Based IDS"
University of Cambridge: Ross Anderson's "Network Attack and Defense"
Unit 7 Learning Outcomes
University of Cambridge: Ross Anderson's "Monitoring Systems"
University of Cambridge: Ross Anderson's "Physical Protection"
National Aeronautics and Space Administration: "Physical Security Program"
Sarah Granger's "Social Engineering Fundamentals, Part I: Hacker Tactics"
Unit 8 Learning Outcomes
University of Washington: Giovanni Vigna's "From Badware to Malware: Taming the Malicious Web"
Talks at Google: "Vint Cerf"
Carnegie Mellon University: "Denial of Service"
Bennett Todd's "Distributed Denial of Service Attacks"
Carnegie Mellon University: Robert Seacord's "Top Ten Secure Coding Practices"
University of Cambridge: Ross Anderson's "Electronic and Information Warfare"
Unit 9 Learning Outcomes
Open Web Application Security Project: "How Much Security Do You Really Need?"
Purdue University: Jack Jones' "Shifting Focus: Aligning Security with Risk Management"
U.S. Government Accountability Office: "Information Security Practices of Leading Organizations"
Microsoft Security Assessment Tool
CS406: Certificate Final Exam
CS406: Proctored Final Exam
Next