About the course
A company may have millions of lines of existing code, and tens of millions of dollars of investment in their business based on those lines of code. It is not reasonable to expect that the applications that those millions of lines of code support can be redesigned securely from scratch in a cost-effective fashion.
In this course, learn and experience intermediate and advanced techniques that systems and applications programmers can use to write new code securely, as well as to find and mitigate vulnerabilities in existing code. In addition to covering these threats, we discuss various tools and techniques that can be used to secure large amounts of legacy code. Our course will demonstrate how to use off-the-shelf tools to secure an existing, large enterprise application.
This course also features an interactive, virtual lab. In a controlled environment, you’ll be given an opportunity to identify flaws and manipulate systems. By understanding how these hacks are executed, you’ll be better equipped to defend against them.
You Will Learn
- Control Hijacking Attacks and Defenses
- Attacks Using Virtual Machines
- Tools for Writing Code Securely
- Static and Dynamic Analysis
- Language-based Security Models
- Isolation Techniques
John Mitchell is the Mary and Gordon Crary Family Professor in the School of Engineering at Stanford University. He has a faculty appointment in Computer Science, as well as courtesy appointments in Electrical Engineering and the Graduate School of Education. He has research interests in computer...
Professor Boneh heads the applied cryptography group and co-directs the computer security lab. Professor Boneh's research focuses on applications of cryptography to computer security. His work includes cryptosystems with novel properties, web security, security for mobile devices, and cryptanalys...
Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.
We are happy to help you find a suitable online alternative.