- Level Professional
-
Offered by
About
How vulnerable are your applications to security risks and threats? This course will help you identify vulnerabilities and monitor the health of your applications and systems. You’ll examine and implement secure code practices to prevent events like data breaches and leaks, and discover how practices like monitoring and observability can keep systems safe and secure. You will gain extensive knowledge on various practices, concepts, and processes for maintaining a secure environment, including DevSecOps practices that automate security integration across the software development lifecycle (SDLC), Static Application Security Testing (SAST) for identifying security flaws, Dynamic Analysis, and Dynamic Testing. You’ll also learn about creating a Secure Development Environment, both on-premise and in the cloud. You’ll explore the Open Web Application Security Project (OWASP) top application security risks, including broken access controls and SQL injections. Additionally, you will learn how monitoring, observability, and evaluation ensure secure applications and systems. You’ll discover the essential components of a monitoring system and how application performance monitoring (APM) tools aid in measuring app performance and efficiency. You’ll analyze the Golden Signals of monitoring, explore visualization and logging tools, and learn about the different metrics and alerting systems that help you understand your applications and systems. Through videos, hands-on labs, peer discussion, and the practice and graded assessments in this course, you will develop and demonstrate your skills and knowledge for creating and maintaining a secure development environment.Modules
Welcome
1
Videos
- Course Introduction
Introduction to DevSecOps
1
Assignment
- Introduction to DevSecOps
2
Videos
- Security by Design
- What is DevSecOps?
1
Readings
- Summary & Highlights - Introduction to DevSecOps
Understanding the Role of Network Security
1
Assignment
- Understanding the Role of Network Security
1
External Tool
- Hands on Lab: Using OpenSSL to Encrypt and Decrypt Files
5
Videos
- The OSI Model
- Securing Layers for Application Development
- Security Patterns
- TLS/SSL
- What is OpenSSL?
1
Readings
- Summary and Highlights - Understanding the Role of Network Security
Inspecting Security in Application Development
1
Assignment
- Inspecting Security in Application Development
1
External Tool
- Hands on Lab: Scanning a Network Environment with Nmap
3
Videos
- Vulnerability Scanning and Threat Modeling
- Threat Monitoring
- Security Concepts and Terminology
2
Readings
- Getting Started with Network and Port Scanning with Nmap
- Summary and Highlights - Inspecting Security in Application Development
Module 1 Cheat Sheet, Glossary and Graded Quiz
1
Assignment
- Graded Quiz: Introduction to Security for Application Development
Introduction to Security Testing and Mitigation Strategies
1
Assignment
- Introduction to Security Testing and Mitigation Strategies
2
External Tool
- Hands-on Lab: Using Static Analysis
- Hands-on Lab: Using Dynamic Analysis
3
Videos
- Introduction to Security Testing and Mitigation Strategies
- Static Analysis
- Dynamic Analysis
1
Readings
- Summary & Highlights - Introduction to Security Testing and Mitigation Strategies
Implementing Key Analysis in Applications
1
Assignment
- Implementing Key Analysis in Applications
2
External Tool
- Hands-on Lab: Evaluating Vulnerability Analysis
- Hands-on Lab: Evaluate Software Component Analysis
6
Videos
- Code Review
- Vulnerability Analysis
- Demo Video: Evaluating Vulnerability Analysis
- Runtime Protection
- Software Component Analysis
- Continuous Security Analysis
1
Readings
- Summary & Highlights - Implementing Key Analysis in Applications
Graded Quiz: Module 2 - Security Testing and Mitigation Strategies
1
Assignment
- Graded Quiz: Security Testing and Mitigation Strategies
Introducing OWASP Top 10
1
Assignment
- Practice Quiz: Introducing OWASP Top 10
5
Videos
- Intro to OWASP (Top 10) Sec Vulnerabilities
- OWASP Top 1-3
- OWASP Top 4-6
- OWASP Top 7-10
- Demo Video: Snyk (SAST) Free Tool
2
Readings
- Discover Code Vulnerabilities with Snyk (SAST) Free Tool
- Summary & Highlights - Introducing OWASP Top 10
Diving Deeper into OWASP Risks
1
Assignment
- Diving Deeper into OWASP
3
External Tool
- Hands-on Lab: Understanding SQL Injections
- Hands-on Lab: Cross Site Scripting
- Hands-on Lab: Storing Secrets Securely
5
Videos
- SQL Injections
- Other Types of SQL Injection Attacks
- Demo Video: Example of an SQL Injection
- Cross Site Scripting
- Storing Secrets Securely
1
Readings
- Summary & Highlights - Diving Deeper into OWASP
Module 3 Cheat Sheet, Glossary and Graded Quiz
1
Assignment
- Graded Quiz: OWASP Application Security Risks
Code Development Practices
1
Assignment
- Code Development Practices
2
External Tool
- Hands-on Lab: Code Practices
- Hands-on Lab: Secure Development Environment
3
Videos
- Code Practices
- Dependencies
- Secure Development Environment
1
Readings
- Summary & Highlights - Code Development Practices
Module 4 Cheat Sheet, Glossary and Graded Quiz
1
Assignment
- Graded Quiz: Security Best Practices
Final Project
1
Assignment
- Graded Quiz: Final Project
Final Assessment
1
Assignment
- Final Assessment
Course Wrap-up
2
Readings
- Congratulations and Next Steps
- Thanks from the Course Team
Auto Summary
"Application Security and Monitoring" by Coursera focuses on identifying vulnerabilities and ensuring the security of your applications. Ideal for professional development, the course covers secure code practices and system health monitoring. Available with Starter and Professional subscriptions.