Secure coding course

Leeds University is to offer IT undergraduates a course in secure programming techniques, as concern grows about the impact of...

Leeds University is to offer IT undergraduates a course in secure programming techniques, as concern grows about the impact of software vulnerabilities on the security of computer systems.

The security module - the first of its type in the UK - will train undergraduates how to avoid classic security problems, such as buffer overflows, which can be exploited by hackers to gain access to systems.

"We realised that there was a gap in teaching programming security. About a third of universities do not have modules on security and those that do teach security of networks, rather than secure coding," said Nick Efford, senior teaching fellow at Leeds University.

Undergraduates will be taught how to analyse the security of code, how to model threats and vulnerabilities, how to fix programs, and the differences between secure and insecure programming languages.

The university, which developed the course with support from Microsoft, believes the module will give its graduates an edge in the jobs market and provide employers with sought-after skills.

Leeds University plans to work with other universities to encourage them to offer similar security courses in the future. It also said it wants to work closely with businesses in developing the course contents.

Read more on Antivirus, firewall and IDS products

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close