Feeds

SANS to certify programmers for security nous

SANS of time

Secure remote control for conventional and virtual desktops

The SANS Institute has assembled a coalition of security vendors to create a secure coding assessment and certification exam for programmers.

Several specialist computer security courses has been established on either side of the Atlantic but the SANS scheme has a different aim, helping general programmers to avoid common security pitfalls and creating a way for them to test their secure coding skills.

Participants have the option to sit four exams leading to GIAC Secure Software Programmer (GSSP) status. The four examinations cover a specific programming language suite: C/C++, Java/J2EE, Perl/PHP and .NET/ASP.

Students who pass the exams are expected to display expertise in identifying and correcting the common programming errors that lead to security vulnerabilities, such as buffer overflow flaws.

The scheme is supported by several major security firms including Symantec, Juniper, Mitre and TippingPoint as well as Tata, the Indian software development consultancy.

The exams are to be piloted in Washington in August with plans to roll them out worldwide through the remainder of 2007. "This assessment and certification program will help programmers learn what they don’t know, and help organizations identify programmers who have solid security skills," said Alan Paller, director of research at the SANS Institute.

Programmers with secure coding credentials stands a better chance of standing out in a highly competitive marketplace, Paller told El Reg, adding that feedback from programmers during the development of the scheme showed many were prepared to take the time to improve their programming skills. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
UK smart meters arrive in 2020. Hackers have ALREADY found a flaw
Energy summit bods warned of free energy bonanza
DRUPAL-OPCALYPSE! Devs say best assume your CMS is owned
SQLi hole was hit hard, fast, and before most admins knew it needed patching
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Mozilla releases geolocating WiFi sniffer for Android
As if the civilians who never change access point passwords will ever opt out of this one
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.