Week 11
Read Chapter 10
Chapter 11 – Managing Application Security
Action – Ian’s Book Key Elements
Read pages 335 – 362 taking notes
Complete all 33 review questions
Any review questions that are wrong or missing then go back into the chapter and read those areas
Action – Videos Professor Messer

https://www.professormesser.com/security-plus/sy0-601/sy0-601-video/sy0-601-comptia-security-plus-course/

2.3 Secure Application Development

  • Secure Deployments
  • Provisioning and Deprovisioning
  • Secure Coding Techniques
  • Software Diversity
  • Automation and Scripting

2.6 Embedded Systems

  • Embedded Systems
  • Embedded Systems Communications
  • Embedded Systems

3.2 Application Security
32. Application Hardening

Boot Integrity
Endpoint Protections
Application Security especially:

  • Input Validation
  • HTTP Headers
  • Code Signing
  • Manual/Static/Dynamic Code Analyzers
  • Fuzzing

Hardening
FDE
TPM/HSM
SED
IoT
SoC
Specialized Devices
Embedded Systems
SCADA/ICS
Communication Consideration
Software Development Lifecycle in order

  • Development
  • Test
  • Staging
  • Production

Automatization/Scripting especially

  • Continuous Integration
  • Continuous Validation/Verification

Version Control
Secure Coding Techniques especially

  • Race Condition
  • Pointer/Object Dereference
  • Proper Error Handling
  • Stored Procedure
  • API considerations/Shimming
  • Obfuscation
  • Memory Management
  • Use of Third-Party Library
  • SDK
  • Database Normalization
  • Front End/Back End
  • Client Side/Server Side

OWASP
Capture the Flag
Phishing Campaigns