This course will change the way you look at your C/C++ code. We'll teach you the common weaknesses and their consequences that can allow hackers to attack your system, and – more importantly – best practices you can apply to protect yourself.
This training course offers a blended learning experience combinXing the Avatao platform with specialist content from our world-renowned Secure Coding partner Scademy.
To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likely would they be to succeed?
This course will change the way you look at your C/C++ code. We'll teach you the common weaknesses and their consequences that can allow hackers to attack your system, and – more importantly – best practices you can apply to protect yourself.
We give you a holistic view on C/C++ programming mistakes and their countermeasures from the machine code level to virtual functions and OS memory management. We present the entire course through live practical exercises to keep it engaging and fun.
Writing secure code will give you a distinct edge over your competitors. It is your choice to be ahead of the pack – take a step and be a game-changer in the fight against cybercrime.
Topics include:
IT security and secure coding
x86 machine code, memory layout and stack operations
Buffer overflow
Practical cryptography
Security protocols
XML security
Common coding errors and vulnerabilities
Principles of security and secure coding
Knowledge sources
Learners get two weeks access to the Avatao platform to practice what they have learnt in the classroom.
Prerequisites
General C/C++ development skills are required.
Learning Outcomes
Understand basic concepts of security, IT security and secure coding
Realize the severe consequences of unsecure buffer handling
Understand the architectural protection techniques and their weaknesses
Have a practical understanding of cryptography
Understand essential security protocols
Learn about XML security
Learn about typical coding mistakes and how to avoid them
Be informed about recent vulnerabilities in various platforms, frameworks and libraries
Get sources and further readings on secure coding practices
Note: This course comes with a number of easy-to-understand exercises providing real-time ethical hacking fun. By accomplishing these exercises with the support of the trainer, participants can analyze vulnerable code snippets and commit attacks against them in order to fully understand the root causes of certain security problems.
All exercises are prepared in a plug-and-play manner by using a pre-set desktop virtual machine, which provides a uniform development environment.
QA delivers training, apprenticeships and tech skills to UK companies large and small. We believe everything starts with our learners – transforming their careers, and their lives, is what motivates us.
We are specialists in technology – providing a comprehensive suite of talent and training services helping individuals and companies to be winners in the digital revolution.
More than 439,000 people learned with QA in 2022. We deliver services to over 3,500 organisations, representing a significant portion of the FTSE 250.
We have leading practices in agile, cyber security, cloud and DevOps – as well as many other technology specialisms. In addition, our deep-rooted vendor partnerships mean that we deliver 70% of the UK’s cloud training and are a Microsoft Gold delivery partner.
We specialise in the people side of technology transformation – our training programmes help businesses to upskill or reskill their existing employees and our talent services are used to identify, recruit and skill-up diverse technology talent.
We acquired Cloud Academy in 2019, expanding our reach into the US. Cloud Academy is a leading digital training platform, featuring guided learning paths, hands-on labs and skill assessments.
The platform supports not just our clients and their learners but also our apprentices and consultants on their skills journey, ensuring learning extends beyond the classroom and is embedded in developing workplace skills.
We are passionate about progress because we can see the bigger picture. Plotting the road ahead. Pushing the boundaries of learning. Powering potential.
Inventor CAM training teaches everything you need to program your CNC machine to generate your Inventor models. You’ll learn to create CNC strategies, create a CAM setup, plot toolpaths, simulate and post process them to G-code to program your CNC machine.
This Ruby Programming course is intended to teach candidates how to create and maintain Ruby programmes. Ruby is a high-level, interpreted, object-oriented, rapid development language used in various modern scenarios.
This course aims to provide the delegate with the knowledge to be able to produce simple computer programs that demonstrate an understanding of the three core principles of programming - sequence, selection, and iteration.
Natural Language Processing (NLP) Fundamentals with Python course is designed for IT professionals and Business Analysts who are looking forward to enhancing and upgrading their skills in the branch of AI (Artificial Intelligence) and ML (Machine Learning).
During this comprehensive Python course, learners will receive a strong foundation of knowledge about Python 3. This will include understanding and executing Python code, using common libraries, and debugging.
© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy