Secure Cyber Coding

(DV-SEC270.AK1)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Identifying the Need for Security in Your Software Projects

  • TOPIC A: Identify Security Requirements and Expectations
  • TOPIC B: Identify Factors That Undermine Software Security
  • TOPIC C: Find Vulnerabilities in Your Software
  • TOPIC D: Gather Intelligence on Vulnerabilities and Exploits
2

Handling Vulnerabilities

  • TOPIC A: Handle Vulnerabilities Due to Software Defects and Misconfiguration
  • TOPIC B: Handle Vulnerabilities Due to Human Factors
  • TOPIC C: Handle Vulnerabilities Due to Process Shortcomings
3

Designing for Security

  • TOPIC A: Apply General Principles for Secure Design
  • TOPIC B: Design Software to Counter Specific Threats
4

Developing Secure Code

  • TOPIC A: Follow Best Practices for Secure Coding
  • TOPIC B: Prevent Platform Vulnerabilities
  • TOPIC C: Prevent Privacy Vulnerabilities
5

Implementing Common Protections

  • TOPIC A: Limit Access Using Login and User Roles
  • TOPIC B: Protect Data in Transit and At Rest
  • TOPIC C: Implement Error Handling and Logging
  • TOPIC D: Protect Sensitive Data and Functions
  • TOPIC E: Protect Database Access
6

Testing Software Security

  • TOPIC A: Perform Security Testing
  • TOPIC B: Analyze Code to Find Security Problems
  • TOPIC C: Use Automated Testing Tools to Find Security Problems

1

Identifying the Need for Security in Your Software Projects

  • Module 1
2

Handling Vulnerabilities

  • Identifying Vulnerabilities in a Software Project
  • Identifying Software Defects and Misconfiguration
  • Managing Software Development Process Risks
  • Module 2
3

Designing for Security

  • Examining the Project Files
  • Managing People Risks
  • Applying OWASP Security by Design Principles
  • Module 3
4

Developing Secure Code

  • Performing a Memory-Based Attack
  • Finding Common Web Vulnerabilities
  • Handling Privacy Defects
  • Module 4
5

Implementing Common Protections

  • Handling Authentication and Authorization Defects
  • Protecting Data in Transit and at Rest
  • Protecting Database Access
  • Module 5
6

Testing Software Security

  • Performing Manual Inspection and Review
  • Performing Code Analysis
  • Using a Test Suite to Automate Unit Testing
  • Module 6

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

We can Secure Cyber Coding

$279.99

Buy Now

Related Courses

All Courses
scroll to top