Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

CertNexus Cyber Secure Coder (CSC-110)

EDUTAINMENT COURSE

CertNexus Cyber Secure Coder (CSC-110)

Instructor-led, video based E-Learning course.
Overview

Cyber Secure Coder will aid in developing an appropriate understanding of secure development practices and how those practices protect against various types of vulnerabilities.  You will learn the types of vulnerabilities,  the exploits that can occur from those vulnerabilities,  and the programming practices that will help prevent exploitation in an application.

Objectives

In this course,  you will employ best practices in software development to develop secure software.  You will: 

  •  Identify the need for security in your software projects.
  • Eliminate vulnerabilities within software.
  •  Use a Security by Design approach to design a secure architecture for your software.
  • Implement common protections to protect users and data. 
  • Apply various testing methods to find and correct security defects in your software.
  • Maintain deployed software to ensure ongoing security
Prerequisites
  •  Develop applications for a variety of platforms: web, cloud, mobile, desktop
  • Write and analyze use cases, technical requirements, specifications, and other application documentation
Target Audience

This course is designed for software developers,  testers,  and architects who design and develop software in various programming languages and platforms including desktop,  web,  cloud,  and mobile,  and who want to improve their ability to deliver software that is of high quality,  particularly regarding security and privacy.This course is also designed for students who are seeking the Logical Operations Cyber Secure Coder (CSC) Exam CSC-110 certification.

Instructor: ITProTV

ITProTV delivers the IT instruction that you need to advance or launch your IT career in a fun and creative way. With attractive studios and an interactive, talk-show style format, you'll watch more and learn more. From CompTIA, Cisco, and Microsoft to Security and Cloud Fundamentals, you can learn it all. Dive deep into one or master many with the friendly faces of IT training.

  1. SECURITY IN SOFTWARE
1
Start
Overview
2
Start
Prior Knowledge And Expectations
3
Start
Gather Software Requirements
4
Start
Assignment: Identity Requirments
5
Start
Activity: Identify Requirements
6
Start
Factors that Undermine Software Security
7
Start
Software Vulnerabilities And Attack Phases
8
Start
Attack Patterns
9
Start
Assignment: Find Vulnerabilities
10
Start
Activity: Find Vulnerabilities
11
Start
Assignment: New Password Requirements
12
Start
Activity: New Password Requirements
13
Start
Assignment: Hashing Passwords
14
Start
Activity: Hashing Passwords
15
Start
Vulnerability Intelligence
16
Start
Assignment: Vulnerability Search
17
Start
Activity: Vulnerability Search
  1. HANDLING VULNERABILITIES
18
Start
Bugs In Software
19
Start
External Libraries And Services
20
Start
Handling Errors Securely
21
Start
Human-Related Security
22
Start
Security Requirements And Design
23
Start
Security Through The Software Lifecycle
24
Start
Assignment: Exploring Leftover Artifacts
25
Start
Activity: Exploring Leftover Artifacts
  1. DESIGNING FOR SECURITY
26
Start
Principles Of Secure Design
27
Start
Avoid Common Mistakes
28
Start
Assignment: Common Security Design Flaws
29
Start
Activity: Common Security Design Flaws
30
Start
Understand Risk And Threats
31
Start
Risk Response Strategies
32
Start
Exploit Countermeasures
  1. DEVELOPING SECURE CODE
33
Start
Guidelines For Secure Coding
34
Start
Buffer Overflows And Prevention
35
Start
Race Conditions
36
Start
Assignment Using Locks Remediate Race Condition
37
Start
Activity Using Locks To Remediate Race Condition
38
Start
OWASP Top Ten Platform Vulnerabilities
39
Start
Web Application Vulnerabilities Deep Dive
40
Start
Mobile Application Vulnerabilities Deep Dive
41
Start
IoT Vulnerabilities Deep Dive
42
Start
Desktop Vulnerabilities Deep Dive
43
Start
Privacy Vulnerability Defects
  1. IMPLEMENTING COMMON PROTECTIONS
44
Start
Secure Session Management
45
Start
Users, Protections And Passwords
46
Start
Encryption And Data Protections
47
Start
Error Handling And Protections
  1. TESTING AND MAINTAINING SOFTWARE SECURITY
48
Start
Testing Software for Security
49
Start
Monitoring And Logging Of Production Applications
EDUTAINMENT COURSE
?Instructor-led, video based E-Learning course.
USD 19
  • 9:57:00
    Hours of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access
  • 10-Day money-back guarantee
Back to Top