Course Outline
Lesson 1: Identifying the Need for Security in Your Software Projects
Topic A: Identify Security Requirements and Expectations
Topic B: Identify Factors That Undermine Software Security
Topic C: Discover Vulnerabilities in Your Software
Topic D: Gather Intelligence on Vulnerabilities and Exploits
Lesson 2: Managing Vulnerabilities
Topic A: Address Vulnerabilities Due to Software Defects and Misconfiguration
Topic B: Address Vulnerabilities Due to Human Factors
Topic C: Address Vulnerabilities Due to Process Shortcomings
Lesson 3: Designing for Security
Topic A: Apply General Principles of Secure Design
Topic B: Design Software to Mitigate Specific Threats
Lesson 4: Developing Secure Code
Topic A: Adhere to Best Practices for Secure Coding
Topic B: Prevent Platform Vulnerabilities
Topic C: Prevent Privacy Vulnerabilities
Lesson 5: Implementing Common Protections
Topic A: Limit Access Using Login and User Roles
Topic B: Protect Data in Transit and at Rest
Topic C: Implement Error Handling and Logging
Topic D: Secure Sensitive Data and Functions
Topic E: Secure Database Access
Lesson 6: Testing Software Security
Topic A: Conduct Security Testing
Topic B: Analyze Code to Identify Security Issues
Topic C: Utilize Automated Testing Tools to Detect Security Issues
Lesson 7: Maintaining Security in Deployed Software
Topic A: Monitor and Log Applications to Enhance Security
Topic B: Sustain Security Post-Deployment
Appendix A: Mapping Course Content to Cyber Secure Coder (Exam CSC-110)
Requirements
Testimonials (5)
The trainer provided up-to-date information and valuable references and tools.
Jose Vicente - EID
Course - C/C++ Secure Coding
Nothing it was perfect.
Zola Madolo - Vodacom
Course - Android Security
The labs
Katekani Nkuna - Vodacom
Course - The Secure Coding Landscape
It opens up a lot and gives lots of insight what security
Nolbabalo Tshotsho - Vodacom SA
Course - Advanced Java Security
I was benefit from the exercises (SQL injection, XSS, CRSF. .).