Cyber Secure Coder - CSC-110

Training Summary

The stakes for software security are very high, and yet many development teams dealwithsoftware security only after the code has been developed and the software is beingprepared for delivery. As with any aspect of software quality, to ensure successfulimplementation, security and privacy issues should be managed throughout the entiresoftware development lifecycle.

This course presents an approach for dealing with security and privacy throughouttheentire software development lifecycle. You will learn about vulnerabilities thatundermine security, and how to identify and remediate them in your own projects. Youwill learn general strategies for dealing with security defects and misconfiguration,how to design software to deal with the human element in security, and how toincorporate security into all phases of development.

This course presents secure programming concepts that apply to many different typesofsoftware development projects. Although this course uses Python®, HTML, andJavaScript® to demonstrate various programming concepts, you do not needto have experience in these languages to benefit from this course. However, you shouldhave some programming experience, whether it be developing desktop, mobile, web, orcloud applications. Logical Operations provides a variety of courses covering softwaredevelopment that you might use to prepare for this course, such as: • Developing Secure Universal Windows® Platform Apps in C# andXAML • Developing Secure iOS® Apps for Business • Developing Secure Android™ Apps for Business • Python® Programming: Introduction • Python® Programming: Advanced • Programming Google App Engine™ Applications in Python® • HTML5: Content Authoring with New and Advanced Features • SQL Querying: Fundamentals
3 Days
This course is designed for software developers, testers, and architects who designanddevelop software in various programming languages and platforms, including desktop,web,cloud, and mobile, and who want to improve their ability to deliver software thatis ofhigh quality, particularly regarding security and privacy. This course is also designed for students who are seeking the Logical Operations CyberSecure Coder (CSC) Exam CSC-110 certification.
Course Topics

In this course, you will employ best practices in software development to developsecuresoftware.

You will:
•Identify the need for security in your software projects.
•Eliminate vulnerabilities within software.
•Use a Security by Design approach to design a secure architecture for yoursoftware.
•Implement common protections to protect users and data.
•Apply various testing methods to find and correct security defects in yoursoftware.
•Maintain deployed software to ensure ongoing security.

Related Scheduled Courses