Security Programming: Code Identification


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Learners can explore code recognition of various programming languages used in security applications, and security exploits, including Python, C, C++, and SQL, in this 14-video course. You will examine common programming paradigms, and learn how to classify them based on their features. Then you will learn how to identify Bash and Python scripts. Next, learners will examine the similarities and differences of C# compared to the C and C++ languages, and regular expressions in typical regex engines. You will learn how to identify PowerShell scripts based on their features, and how to identify the elements of a SQL statement, and how to use SQLite, a tool to manage local databases in file form without servers. This course continues by examining common security vulnerabilities in code that can lead to exploits. You will learn how to identify the structure of common executable formats based on their binary signatures. Finally, this course demonstrates how to verify the integrity of a downloaded file based on its hash value.



Expected Duration (hours)
1.1

Lesson Objectives

Security Programming: Code Identification

  • discover the key concepts covered in this course
  • describe common programming paradigms and classify them based on their features
  • identify bash scripts based on their features
  • identify Python scripts based on their features
  • identify the elements that make up a common C program
  • identify the elements of a typical C++ program
  • describe the similarities and differences of C# when compared to C and C++
  • identify regular expressions found in typical regex engines
  • identify PowerShell scripts based on their features
  • identify the elements of a SQL statement
  • describe common security vulnerabilities in code that can lead to exploits
  • identify the structure of common executable formats based on their binary signatures
  • verify the integrity of a downloaded files based on its hash value
  • summarize the key concepts covered in this course
  • Course Number:
    it_cypgsodj_02_enus

    Expertise Level
    Beginner