5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Aspire     Programmer to Secure Agile Programmer     Secure Agile Programmer Track 3: Defensive Programmer

In this course, learners discover the importance of exception handling, validation, and parameter checking in programming. Explore how to handle exceptions and apply validation in Java, Python, C#, and Javascript, as well as how to configure component trust and reuse code, in this 17-video course. Begin by learning how to apply exception handling effectively, and then take a look at validation techniques and procedures. Learners will explore reliability, resiliency, and recoverability and how it can be achieved in software engineering. Next, you will look at CDI/UDI (constrained data item/unrestrained data item), why it is important, and how it should be done. You will delve into parameter checking; using Java exception handling; using Python exception handling, and using Javascript exception handling. You will then explore using Java validation; Python validation; C# validation, and Javascript validation. In the final tutorials you will examine component trust, including when and how to achieve trust of components, and learn how to reuse code effectively and defensively.



Objectives

Defensive Programmer: Defensive Techniques

  • discover the key concepts covered in this course
  • apply exception handling effectively
  • describe validation techniques and procedures
  • describe reliability, resiliency, and recoverability and how it can be achieved in software engineering
  • describe CDI/UDI, why it is important and how it should be done
  • apply parameter checking
  • use Java exception handling
  • use Python exception handling
  • use C# exception handling
  • use JavaScript exception handling
  • use Java validation
  • use Python validation
  • use C# validation
  • use JavaScript validation
  • describe component trust including when and how to achieve trust of components
  • describe how to reuse code effectively and defensively
  • summarize the key concepts covered in this course