How to Write Secure Code Training Course

Last updated

Course Code

seccode

Duration

35 hours (usually 5 days including breaks)

Requirements

  • Basic knowledge of any programming language 
  • Basic knowledge of the software development life cycle 

Overview

After the major attacks against national infrastructures, Security Professionals found that the majority of the vulnerabilities that caused the attacks came from poor and vulnerable code that the developers write. 

Developers now need to master the techniques of how to write Secure Code, because we are in a situation where anyone can use availble tools to write a script that can effectivly disable a large organization's systems because the developers have written poor code.

This Course aims to help in the following:

  1. Help Developers to master the techniques of writing Secure Code
  2. Help Software Testers to test the security of the application before publishing to the production environment
  3. Help Software Architects to understand the risks surrounding the applications
  4. Help Team Leaders to set the security base lines for the developers
  5. Help Web Masters to configure the Servers to avoid miss-configurations

In this course you will also see details of the latest cyber attacks that have been used and the countermeasures used to stop and prevent these attacks.

You will see for yourself how developers mistakes led to catastrophic attacks, and by participatig in the labs during the course you will be able to put into practise the security controls and gain the experience and knowledge to produce secure coding.

Who should Attend this Course? 

This Secure Code Training is ideal for those working in positions such as, but not limited to:

  • Web Developers
  • Mobile Developers
  • Java Developers
  • Dot Net Developers
  • Software Architects
  • Software Tester
  • Security Professionals
  • Web Masters

Course Outline

  • Module1 Introduction to Secure Coding
  • Module2 Web, Windows and Mobile Application bases
  • Module3 Applications Attacks and Exploits, XSS, SQL injection
  • Module4 Servers Attacks and Exploits, DOS, BOF
  • Module5 Validation And Verification
  • Module6 Security Controls and Countermeasures
  • Module7 Mobile Application Secure Coding
  • Module8 Security Standards and Testing

Testimonials

★★★★★
★★★★★

Related Categories

Related Courses

Course Discounts

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

is growing fast!

We are looking to expand our presence in Saudi Arabia!

As a Business Development Manager you will:

  • expand business in Saudi Arabia
  • recruit local talent (sales, agents, trainers, consultants)
  • recruit local trainers and consultants

We offer:

  • Artificial Intelligence and Big Data systems to support your local operation
  • high-tech automation
  • continuously upgraded course catalogue and content
  • good fun in international team

If you are interested in running a high-tech, high-quality training and consulting business.

Apply now!

This site in other countries/regions