(CSC-210.AK1) / ISBN : 978-1-64459-217-5
This course includes
Lessons
TestPrep
Hands-On Labs
AI Tutor (Add-on)
224 Review
Get A Free Trial

Get the support you need. Enroll in our Instructor-Led Course.

Lessons

8+ Lessons | 56+ Quizzes | 116+ Flashcards | 116+ Glossary of terms

TestPrep

60+ Pre Assessment Questions | 2+ Full Length Tests | 60+ Post Assessment Questions | 120+ Practice Test Questions

Hands-On Labs

23+ LiveLab | 00+ Minutes

1

Introduction

  • Course Description
  • How to Use This Course?
  • Course-Specific Technical Requirements
  • Install the Course Data Files
2

Identifying the Need for Security in Your Software Projects

  • TOPIC A: Identify Security Requirements and Expectations
  • TOPIC B: Identify Factors That Undermine Software Security
  • TOPIC C: Find Vulnerabilities in Your Software
  • TOPIC D: Gather Intelligence on Vulnerabilities and Exploits
3

Handling Vulnerabilities

  • TOPIC A: Handle Vulnerabilities Due to Software Defects and Misconfiguration
  • TOPIC B: Handle Vulnerabilities Due to Human Factors
  • TOPIC C: Handle Vulnerabilities Due to Process Shortcomings
4

Designing for Security

  • TOPIC A: Apply General Principles for Secure Design
  • TOPIC B: Design Software to Counter Specific Threats
5

Developing Secure Code

  • TOPIC A: Follow Best Practices for Secure Coding
  • TOPIC B: Prevent Platform Vulnerabilities
  • TOPIC C: Prevent Privacy Vulnerabilities
6

Implementing Common Protections

  • TOPIC A: Limit Access Using Login and User Roles
  • TOPIC B: Protect Data in Transit and At Rest
  • TOPIC C: Implement Error Handling and Logging
  • TOPIC D: Protect Sensitive Data and Functions
  • TOPIC E: Protect Database Access
7

Testing Software Security

  • TOPIC A: Perform Security Testing
  • TOPIC B: Analyze Code to Find Security Problems
  • TOPIC C: Use Automated Testing Tools to Find Security Problems
8

Maintaining Security in Deployed Software

  • TOPIC A: Monitor and Log Applications to Support Security
  • TOPIC B: Maintain Security After Deployment

1

Identifying the Need for Security in Your Software Projects

  • Identifying Vulnerabilities in an Application
  • Cracking a Password Hash
  • Fixing a Password Hash Vulnerability
2

Handling Vulnerabilities

  • Identifying Vulnerabilities in a Software Project
  • Examining the Project Files
  • Identifying Software Defects and Misconfiguration
  • Managing People Risks
  • Managing Software Development Process Risks
3

Designing for Security

  • Designing for Security
4

Developing Secure Code

  • Performing a Memory-Based Attack
  • Finding Common Web Vulnerabilities
  • Handling Privacy Defects
5

Implementing Common Protections

  • Handling Authentication and Authorization Defects
  • Protecting Data in Transit and at Rest
  • Reviewing Error Handling
  • Improving Error Handling
  • Protecting Sensitive Data and Functions
  • Staging a Persisted XSS Attack on an Administrator Function
  • Protecting Database Access
6

Testing Software Security

  • Performing Manual Inspection and Review
  • Performing Code Analysis
  • Using a Test Suite to Automate Unit Testing
7

Maintaining Security in Deployed Software

  • Monitoring and Logging a Deployed Application

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact us now

Related Courses

All Course
scroll to top