• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE-CS_LogoTM-orange
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
IEEE-CS_LogoTM-orange

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2026 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Publications
  • /Tech News
  • /Build Your Career
  • Home
  • / ...
  • /Tech News
  • /Build Your Career

Software Security for the People: Free and Open Resources for Software Security Training

By IEEE Computer Society Team on
May 16, 2022

software securityThe rising demand for security traverses all sectors of the software industry—and expands to include end-users, government organizations, academia, and so on. Recent statistics show that besides a rise in cybercrime targeting networks and systems, over 30% of companies detected attempts to exploit vulnerabilities found in software. This underscores the need to train developers with the skills to design, write, test, and assess code to make software resistant to being exploited.


Want More Tech News? Subscribe to ComputingEdge Newsletter Today!


The Need for Training


With over 4 million software engineers in the US and a compound annual growth rate of 4%, software is available in abundance. But an understanding of the vulnerabilities and potential for exploitation has not increased commensurately. When addressing cybersecurity strategies and policies, most organizations focus on their networks and hardware, and inadequate attention is given to the role of software security in a company’s cybersecurity posture.

The Resources and Methods

The key to providing comprehensive training is to formulate a curriculum with the right approach, components, and delivery.

  • Approach. The approach should include putting materials together that can reach the broadest audience. It should be based on spanning the technical depth and breadth of the industry, as well as crossing cultural and linguistic boundaries.
  • Components. In harmony with the development of the approach, components such as visual aids, multi-language closed captioning of video lectures, resources for the instructors, and interactive exercises must be included. There also needs to be an effective means for periodic evaluation and assessment of trainees.
  • Delivery. Methods of delivery need to reflect the needs of the widest audience possible, so there would need to be provisions for classroom learning to focus on students, as well as professional training courses for your existing workforce, motivational lectures for workshops, and supplemental video lectures to support your instructors.

To get an overview of the current software security curriculum ecosystem, download and read the complete article, “Software Security for the People: Free and Open Resources for Software Security Training” by Elisa R. Heymann and Barton P. Miller, first appearing in the IEEE Security & Privacy Magazine in March-April 2022.

LATEST NEWS
Computing’s Top 30: Li Yang
Computing’s Top 30: Li Yang
Women in STEM Workshop and CodeFest in Bhutan: Empowering the Next Generation of Female Technologists
Women in STEM Workshop and CodeFest in Bhutan: Empowering the Next Generation of Female Technologists
Automating Compliance in Life Sciences for Real-Time Audit Readiness
Automating Compliance in Life Sciences for Real-Time Audit Readiness
Computing’s Top 30: Rohan Basu Roy
Computing’s Top 30: Rohan Basu Roy
Episode 3 | How IEEE Can Support and Enhance Academia
Episode 3 | How IEEE Can Support and Enhance Academia
Read Next

Computing’s Top 30: Li Yang

Women in STEM Workshop and CodeFest in Bhutan: Empowering the Next Generation of Female Technologists

Automating Compliance in Life Sciences for Real-Time Audit Readiness

Computing’s Top 30: Rohan Basu Roy

Episode 3 | How IEEE Can Support and Enhance Academia

Behind the Scenes: How SC Volunteers Power One of the World’s Fastest Growing Conferences and Trade Show

Computing’s Top 30: Bo Han

From Clicks to Conversations: How HCI Is Evolving in an AI-First World

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter