CertNexus Cyber Secure Coder
CertNexus Cyber Secure Coder CSC-110 Online Courses
2KO South Africa offers online CertNexus Cyber Secure Coder CSC-110 courses in South Africa for Cisco certification. 2KO Africa is a professional training company, delivering cutting edge programs in the IT space and in selected business applications. Our training is offered online, live online and also by instructor led classes. 2KO Africa's business courses are available world-wide, many of them leading to European Certification, to ensure students have access to the best Cisco certification training in South Africa.
Overview
Cyber Secure Coder will aid in developing an appropriate
understanding of secure development practices and how those
practices protect against various types of vulnerabilities.
You will learn the types of vulnerabilities, the exploits
that can occur from those vulnerabilities, and the
programming practices that will help prevent exploitation in
an application.
Objectives
In this course, you will employ best practices in software
development to develop secure software. You will:
Identify the need for security in your software projects.
Eliminate vulnerabilities within software.
Use a Security by Design approach to design a secure
architecture for your software.
Implement common protections to protect users and data.
Apply various testing methods to find and correct security
defects in your software.
Maintain deployed software to ensure ongoing security
Target Audience
This course is designed for software developers, testers,
and architects who design and develop software in various
programming languages and platforms including desktop, web,
cloud, and mobile, and who want to improve their ability to
deliver software that is of high quality, particularly
regarding security and privacy. This course is also designed
for students who are seeking the Logical Operations Cyber
Secure Coder (CSC) Exam CSC-110 certification.
Register for an Online I.T. Course Here
Curriculum
SECURITY IN SOFTWARE
Overview
Prior Knowledge And Expectations
Gather Software Requirements
Assignment: Identity Requirments
Activity: Identify Requirements
Overview
Prior Knowledge And Expectations
Gather Software Requirements
Assignment: Identity Requirements
Activity: Identify Requirements
Factors that Undermine Software Security
Software Vulnerabilities And Attack Phases
Attack Patterns
Assignment: Find Vulnerabilities
Activity: Find Vulnerabilities
Assignment: New Password Requirements
Activity: New Password Requirements
Assignment: Hashing Passwords
Activity: Hashing Passwords
Vulnerability Intelligence
Assignment: Vulnerability Search
Activity: Vulnerability Search
HANDLING VULNERABILITIES
Bugs In Software
External Libraries And Services
Handling Errors Securely
Human-Related Security
Security Requirements And Design
Security Through The Software Lifecycle
Assignment: Exploring Leftover Artifacts
Activity: Exploring Leftover Artifacts
DESIGNING FOR SECURITY
Principles Of Secure Design
Avoid Common Mistakes
Assignment: Common Security Design Flaws
Activity: Common Security Design Flaws
Understand Risk And Threats
Risk Response Strategies
Exploit Countermeasures
DEVELOPING SECURE CODE
Guidelines For Secure Coding
Buffer Overflows And Prevention
Race Conditions
Assignment Using Locks Remediate Race Condition
Activity Using Locks To Remediate Race Condition
OWASP Top Ten Platform Vulnerabilities
Web Application Vulnerabilities Deep Dive
Mobile Application Vulnerabilities Deep Dive
IoT Vulnerabilities Deep Dive
Desktop Vulnerabilities Deep Dive
Privacy Vulnerability Defects
IMPLEMENTING COMMON PROTECTIONS
Secure Session Management
Users, Protections And Passwords
Encryption And Data Protections
Error Handling And Protections
TESTING AND MAINTAINING SOFTWARE SECURITY
Testing Software for Security
Monitoring And Logging Of Production Applications
Details about this
course
10
hours
of learning
Includes video, presentations, workbooks, quizzes, flashcards &
games
Receive a Certificate of Excellence on successful completion
Presented by highly qualified, industry leading experts
12 Months access (Unless indicated otherwise)