Description

Overview

  • 9:57:00 Hours
  • 12 Months Access
  • Presented by highly qualified, industry leading experts

Cyber Secure Coder will aid in developing an appropriate understanding of secure development practices and how those practices protect against various types of vulnerabilities. You will learn the types of vulnerabilities, the exploits that can occur from those vulnerabilities, and the programming practices that will help prevent exploitation in an application.

Course Details

Objectives

In this course, you will employ best practices in software development to develop secure software. You will:

  • Identify the need for security in your software projects.
  • Eliminate vulnerabilities within software.
  • Use a Security by Design approach to design a secure architecture for your software.
  • Implement common protections to protect users and data.
  • Apply various testing methods to find and correct security defects in your software.
  • Maintain deployed software to ensure ongoing security

Audience

  • This course is designed for software developers, testers, and architects who design and develop software in various programming languages and platforms including desktop, web, cloud, and mobile, and who want to improve their ability to deliver software that is of high quality, particularly regarding security and privacy.
    This course is also designed for students who are seeking the Logical Operations Cyber Secure Coder (CSC) Exam CSC-110 certification.

Prerequisites

  • Develop applications for a variety of platforms: web, cloud, mobile, desktop
  • Write and analyze use cases, technical requirements, specifications, and other application documentation

SECURITY IN SOFTWARE

  • Overview
  • Prior Knowledge And Expectations
  • Gather Software Requirements
  • Assignment: Identity Requirments
  • Activity: Identify Requirements
  • Factors that Undermine Software Security
  • Software Vulnerabilities And Attack Phases
  • Attack Patterns
  • Assignment: Find Vulnerabilities
  • Activity: Find Vulnerabilities
  • Assignment: New Password Requirements
  • Activity: New Password Requirements
  • Assignment: Hashing Passwords
  • Activity: Hashing Passwords
  • Vulnerability Intelligence
  • Assignment: Vulnerability Search
  • Activity: Vulnerability Search

HANDLING VULNERABILITIES

  • Bugs In Software
  • External Libraries And Services
  • Handling Errors Securely
  • Human-Related Security
  • Security Requirements And Design
  • Security Through The Software Lifecycle
  • Assignment: Exploring Leftover Artifacts
  • Activity: Exploring Leftover Artifacts

DESIGNING FOR SECURITY

  • Principles Of Secure Design
  • Avoid Common Mistakes
  • Assignment: Common Security Design Flaws
  • Activity: Common Security Design Flaws
  • Understand Risk And Threats
  • Risk Response Strategies
  • Exploit Countermeasures

DEVELOPING SECURE CODE

  • Guidelines For Secure Coding
  • Buffer Overflows And Prevention
  • Race Conditions
  • Assignment Using Locks Remediate Race Condition
  • Activity Using Locks To Remediate Race Condition
  • OWASP Top Ten Platform Vulnerabilities
  • Web Application Vulnerabilities Deep Dive
  • Mobile Application Vulnerabilities Deep Dive
  • IoT Vulnerabilities Deep Dive
  • Desktop Vulnerabilities Deep Dive
  • Privacy Vulnerability Defects

IMPLEMENTING COMMON PROTECTIONS

  • Secure Session Management
  • Users, Protections And Passwords
  • Encryption And Data Protections
  • Error Handling And Protections

TESTING AND MAINTAINING SOFTWARE SECURITY

  • Testing Software for Security
  • Monitoring And Logging Of Production ApplicationsBottom of Form