Course Overview

Secure coding with C is a top concern. Although the C programming language, which is commonly used in numerous applications and operating systems is popular, flexible, and versatile, it is inherently vulnerable to exploitation.   

Writing a secure code is crucial. Because there is no direct method to handle the exception (no inbuilt try and catch such as in another high-level language like C#) in the C language, it becomes the responsibility of the C developer to become extra vigilant while writing code. This course begins with a detailed explanation of the overall security of any C application. Further, it provides insights on how to write better C code, particularly a secure code that prevents pitfalls commonly encountered in the C language.

This course shows you how to avoid vulnerabilities and security flaws resulting from the incorrect use of dynamic memory management functions. You will understand how to eliminate integer-related problems resulting from signed integer overflows, unsigned integer wrapping, and truncation errors.  

What You Will Learn

  • Develop a C program in a Secured Way
  • Learn about the basics of C Programming Language
  • Learn about String Formatting in C
  • Learn about Null Pointers in C
  • Learn how to identify potential vulnerabilities in a C language Code

Program Curriculum

  • Improving C Application Security
  • Developing your First C Program
  • Identifying Common C Weaknesses
  • Chapter 1 Quiz

  • Memory Allocation and the Stack
  • Buffer Overflow Vulnerabilities:
  • Introduction to ROP
  • Chapter 2 Quiz

  • Introduction to Format String Specifiers
  • Format String Vulnerabilities
  • Chapter 3 Quiz

  • Introduction to Variable Types and Typecasting
  • Integer Overflow Vulnerabilities
  • Integer Underflow Vulnerabilities
  • Chapter 4 Quiz

  • Introduction to Pointers
  • Potential Pointer Problems
  • Null Pointer Dereference
  • Misuse of Freed Pointers
  • Chapter 5 Quiz

  • Managing User Input
  • Securely Performing I/O
  • Chapter 6 Quiz
Load more modules

Instructor

Howard Poston

Author

Howard Poston has over a decade of experience in C, C++, Java programming and a background in cybersecurity. He is a blockchain and cybersecurity trainer, writer, consultant, and researcher and has a Master’s degree in Cyber Operations, and is a Certified Ethical Hacker. Howard also has experience in teaching online courses, having created and delivered half a dozen different courses live, remotely, and on-demand on different cybersecurity topics

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8