Course curriculum

    1. Introduction and course overview

    1. Vulnerabilities are still everywhere

    2. Traditional SAST tools still use a reactive approach

    3. With secure guardrails we can be more proactive

    1. We can borrow ideas from the DevOps movement

    2. Secure defaults, shift left, and secure guardrails

    3. Secure guardrail examples

    1. Why customize rules

    2. Semgrep analysis architecture

    3. Semgrep Playground

    1. Writing test code

    2. Structure mode

    3. The first rule: marking a banned function

    4. Enforce the order of API calls

    5. Blocklist DES and TripleDES

    6. Sec Fetch Metadata headers

    1. Problem domain and search language

    2. Semgrep under the hood: matches, ranges, and set logic

    3. Debugging negative patterns

    4. pattern-not versus pattern-not-inside

About this course

  • Free
  • 45 lessons
  • 3.5 hours of video content

Discover your potential, starting today

Course Reviews

Check out what other students have to say!

5 star rating

Excellent blend of theory and practical exercises

J C

This was a great course with a mix of diagrams, explanations and of course practical rule writing. The combination of TDD + Semgrep Playground makes this acc...

Read More

This was a great course with a mix of diagrams, explanations and of course practical rule writing. The combination of TDD + Semgrep Playground makes this accessible. The latter stage of the course discusses complex material but the pacing seemed right. Minor things to improve: - the volume is not always consistent between sections - one 8min video is repeated

Read Less
5 star rating

Excellent

Keith Douglas

Recommending this to both cyber security colleagues who need to understand more about cyber security automation and to my developer colleagues who need to un...

Read More

Recommending this to both cyber security colleagues who need to understand more about cyber security automation and to my developer colleagues who need to understand more about static code analysis.

Read Less