{"id":8815,"date":"2024-11-01T10:39:33","date_gmt":"2024-11-01T09:39:33","guid":{"rendered":"https:\/\/republify.se\/?post_type=product&#038;p=8815"},"modified":"2026-01-08T19:11:05","modified_gmt":"2026-01-08T18:11:05","slug":"code-responsibly-with-generative-ai-in-c","status":"publish","type":"product","link":"https:\/\/republify.se\/index.php\/produkt\/code-responsibly-with-generative-ai-in-c\/","title":{"rendered":"Code responsibly with generative AI in C++"},"content":{"rendered":"<div class=\"detail-text\">\n<div class=\"detail-text\">\n<div class=\"detail-text\">\n<div class=\"detail-text\">\n<p>Platform: Generative AI<br \/>\nAudience: C\/C++ developers<br \/>\nPreparedness: General C++ and C development<br \/>\nStandards and references: SEI CERT, CWE and Fortify Taxonomy<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p class=\"detail-title\"><strong>What you will learn<\/strong><\/p>\n<div class=\"detail-text\">\n<ul>\n<li>Getting familiar with essential cyber security concepts<\/li>\n<li>Correctly implementing various security features<\/li>\n<li>Identify vulnerabilities and their consequences<\/li>\n<li>Learn the security best practices in C++<\/li>\n<li>Managing vulnerabilities in third party components<\/li>\n<li>Input validation approaches and principles<\/li>\n<\/ul>\n<div class=\"course-details\">\n<div class=\"row\">\n<div class=\"col-12\">\n<p>&nbsp;<\/p>\n<p class=\"detail-title\"><strong>Description<\/strong><\/p>\n<div class=\"detail-text\">\n<p>Embark on a comprehensive exploration of cybersecurity and secure coding practices in this intensive three-day course. It is primarily focusing on C++, but also integrates some C concepts. Based on a primer on machine code, assembly, and memory overlay (Intel and ARM versions available), the curriculum addresses critical security issues related to memory management. Various protection techniques on the level of source code, compiler, OS or hardware are discussed \u2013 such as stack smashing protection, ASLR or the non-execution bit \u2013 to understand how they work and make clear what we can and what we can\u2019t expect from them.<\/p>\n<p>The various secure coding subjects are aligned to common software security weakness categories, such as security features, error handling or code quality. Many of the weaknesses are, however, linked to missing or improper input validation. In this category you\u2019ll learn about injection, the surprising world of integer overflows, and about handling file names correctly to avoid path traversal.<\/p>\n<p>Through hands-on labs and real-world case studies, you will navigate the details of secure coding practices to get essential approaches and skills in cybersecurity.<\/p>\n<p>So that you are prepared for the forces of the dark side.<\/p>\n<p>So that nothing unexpected happens.<\/p>\n<p>Nothing.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"note-wrapper\">\n<div class=\"row\">\n<div class=\"col-12\">\n<h4 class=\"section-title note-wrapper__title\">Note:<\/h4>\n<div class=\"note-wrapper__text\">\n<p><em>This variant of the course deals extensively with how certain security problems in code are handled by GitHub Copilot.\u00a0Through a number of hands-on labs participants will get first hand experience about how to use Copilot responsibly, and how to prompt it to generate the most secure code. In some cases it is trivial, but in most of the cases it is not; and in yet some other cases it is basically impossible.\u00a0At the same time, the labs provide general experience with using Copilot in everyday coding practice &#8211; what you can expect from it, and what are those areas where you shouldn&#8217;t rely on it.<\/em><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"detail-text\">\n<p>&nbsp;<\/p>\n<h3>Kursen levereras i samarbete med<\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-medium wp-image-1202 lazyload\" data-src=\"https:\/\/republify.se\/wp-content\/uploads\/2022\/02\/cydrill_logo-300x83.jpg\" alt=\"\" width=\"300\" height=\"83\" data-srcset=\"https:\/\/republify.se\/wp-content\/uploads\/2022\/02\/cydrill_logo-300x83.jpg 300w, https:\/\/republify.se\/wp-content\/uploads\/2022\/02\/cydrill_logo.jpg 427w\" data-sizes=\"(max-width: 300px) 100vw, 300px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 300px; --smush-placeholder-aspect-ratio: 300\/83;\" \/><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p><strong>Through hands-on labs and real-world case studies, you will navigate the details of secure coding practices to get essential approaches and skills in cybersecurity.<\/strong><\/p>\n<p>The training is delivered teacher-led online<\/p>\n","protected":false},"featured_media":4533,"comment_status":"open","ping_status":"closed","template":"","meta":{"wds_primary_product_brand":0,"wds_primary_product_cat":0},"product_brand":[],"product_cat":[137,77,134,57,31],"product_tag":[],"class_list":{"0":"post-8815","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ai","7":"product_cat-c-technical","8":"product_cat-cyber-security","9":"product_cat-secure-coding","10":"product_cat-security","12":"first","13":"instock","14":"taxable","15":"shipping-taxable","16":"purchasable","17":"product-type-simple"},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/republify.se\/index.php\/wp-json\/wp\/v2\/product\/8815","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/republify.se\/index.php\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/republify.se\/index.php\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/republify.se\/index.php\/wp-json\/wp\/v2\/comments?post=8815"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/republify.se\/index.php\/wp-json\/wp\/v2\/media\/4533"}],"wp:attachment":[{"href":"https:\/\/republify.se\/index.php\/wp-json\/wp\/v2\/media?parent=8815"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/republify.se\/index.php\/wp-json\/wp\/v2\/product_brand?post=8815"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/republify.se\/index.php\/wp-json\/wp\/v2\/product_cat?post=8815"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/republify.se\/index.php\/wp-json\/wp\/v2\/product_tag?post=8815"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}