Develop yourself from Programmer to Secure Agile Programmer (incl. guidance)

$949.00
$1,148.29 incl. vat

duration: 56 hours |

Language: English (US) |

access duration: 365 days |

Details

Are you a programmer / software developer and would you like to make an even greater contribution to the processes within your organisation? Then this learning path is for you! Every organisation would like to optimise its processes and secure itself against ever-growing threats. As a result, there is an increasing demand for Secure Agile Programmers who have the relevant education and experience in Agile methodologies that not only relate to software development, but also to secure programming.

With this learning path you will gain the necessary knowledge and skills to develop yourself into a Secure Agile Programmer.

When you choose for this learning path you get:

  • access to the training courses about the roles of programmer, secure programmer, defensive programmer and agile secure programmer. In addition you get access to many more training courses, practice exams, bootcamps, e-books and so on.
  • guidance from our Learning & Development team, together with you we set goals, make a planning and monitor your progress.

In this learning path you will gradually discover the roles of programmer, secure programmer, defensive programmer and agile secure programmer. You discover programming standards for secure programming. In addition, you will work with security concepts, vulnerabilities, encryption, attacks and resiliency coding. Next, you will focus on defensive concepts and techniques, cryptography, code sampling, secure testing, and advanced defensive programming concepts. Finally, you will work with secure Agile programming concepts, techniques, modelling, and testing.)

Result

After completing this learning path, you will have developed yourself into a Secure Agile Programmer. You will have knowledge of Agile methodologies that not only relate to software development, but also to secure programming.

Prerequisites

You have at least basic knowledge and experience of programming. Basic knowledge of Agile is recommended.

Target audience

Software Developer, Web Developer

Content

Develop yourself from Programmer to Secure Agile Programmer (incl. guidance)

56 hours

Secure Programmer: Intro to Programming Standards

Secure Programmer: Intro to Programming Standards

Secure Programmer: Software Design Techniques

Secure Programmer: Software Design Techniques

Secure Programmer: Software Modeling Techniques

Secure Programmer: Software Modeling Techniques

Secure Programmer: Coding Practices

Secure Programmer: Coding Practices

Secure Programmer: Software Testing

Secure Programmer: Software Testing

Programmer

  • Perform Programmer tasks such as applying pattern based design and applying good coding practices. Then, test your skills by answering assessment questions after applying unit testing, integration testing, regression testing and user acceptance testing.
  • This lab provides access to tools typically used by Programmers, including:
  • �Windows 10
  • �Microsoft Office 2016
  • �Java 8
  • �Eclipse
  • �JMeter
  • �Git and Git Extensions(GUI) + Port opened for Gish
  • �GitHub Desktop
  • This lab is part of the Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer journey.

Final Exam: Programmer

Final Exam: Programmer will test your knowledge and application of the topics presented throughout the Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer Journey.

Secure Programmer: Security Concepts

  • Discover the basics of secure programming, including common

  • security concepts like the CIA triangle, least privileges, and
  • separation of duties. Explore authentication and authorization,
  • including popular models like DAC, MAC, RBAC, and ABAC. Examine how
  • to avoid common programming errors that can undermine security, as
  • well as how to incorporate validation and verification into your
  • programming.

Secure Programmer: Vulnerabilities

  • Explore various software vulnerability topics in this 19-video,

  • which opens with a look at specific security vulnerabilities and
  • how to program counter techniques. Then learners receive three
  • tutorials on the OWASP (Open Web Application Security Project) Top
  • 10 vulnerabilities: SQL injection, broken authentication, and
  • cross-site scripting; broken access control, security
  • misconfiguration, sensitive data exposure, and insufficient attack
  • protection; and cross-site request forgery, using components with
  • known vulnerabilities, and under protected application programming
  • interfaces (APIs). Examine use of threat models including STRIDE
  • (Spoofing, Tampering, Repudiation, Information Disclosure, Denial
  • of Service, and Elevation), PASTA (the Process for Attack
  • Simulation and Threat Analysis), DREAD (Damage, Reproductibility,
  • Exploitability, Affected Users, Discoverability), and SQUARE
  • (Security Quality Requirements Engineering). Use CVE (common
  • vulnerabilities and exposures) vulnerability scoring, and examine
  • Java, Python, C#, and Javascript SQL secure coding examples.
  • Implement Python secure coding to combat SQL vulnerability; C# to
  • combat common code vulnerabilities, and Javascript to combat Cross
  • Site Scripting attacks. Use Common Vulnerability Scoring System
  • (CVSS), and finally, use OWASP Zap and Vega vulnerability scanners
  • to test websites for common vulnerabilities.

Secure Programming: Encryption

  • In this 5-video course, learners discover the basics of

  • cryptographic algorithms. You will receive a general overview of
  • symmetric algorithms such as AES, Blowfish, and Serpent. You will
  • also examine asymmetric algorithms such as RSA (Rivest, Sharmir,
  • and Adelman), Diffie-Hellman, and elliptic-curve cryptography
  • (ECC). More importantly, you will learn when to use which algorithm
  • and what algorithms are better for specific purposes. You will then
  • move on to integrity algorithms, including hashes like SHA (Secure
  • Hash Algorithm 1), MD5 (Message Digest 5), and 6, RIPEMD (Ripe
  • Message Digest), and HAVAL, as well as message authentication codes
  • (MACs) and HMACs (keyed-hash message authentication codes). You
  • will also examine the strengths and weaknesses of these different
  • approaches. The goal is whether one can make intelligent choices
  • about which algorithms to implement for which purpose; whether
  • one's concerns are about confidentiality; if one needs to do key
  • exchange; is message integrity an issue; are you storing passwords?
  • These will each require different algorithms.

Secure Programmer: Attacks

Explore common software attacks and the coding mistakes that make software vulnerable to them. Discover how to code against format string, SQL injection, buffer overflow, cross-site scripting, and password cracking attacks in Java, C#, JavaScript, and Python.

Secure Programmer: Resiliency Coding

Explore resiliency concepts such as stability, recovery, and defensive coding. Discover how to write resilient code in Java, Python, C#, and JavaScript.

Secure Programmer

  • Perform Secure Programmer tasks such as minimizing SQL injection vulnerability, using OWASP Zap application to test an insecure web application, using Python to encrypt a data set and explore vulnerable code that can cause an overrun of buffer's boundary in Java, Python, C# and Javascript. Then, test your skills by answering assessment questions after preventing cross site scripting vulnerability, using Python to brute force a simple password, and creating resilient code in Python and C#.
  • This lab provides access to tools typically used by Secure Programmers, including:
  • �Microsoft Office 2016
  • �Java 8
  • �Eclipse
  • �JMeter
  • �Git and Git Extensions(GUI) + Port opened for Gish
  • �GitHub Desktop
  • This lab is part of the Secure Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer journey.

Final Exam: Secure Programmer

Final Exam: Secure Programmer will test your knowledge and application of the topics presented throughout the Secure Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer Journey.

Defensive Programmer: Defensive Concepts

Defensive Programmer: Defensive Concepts

Defensive Programmer: Defensive Techniques

Discover the importance of exception handling, validation, and parameter checking in programming. Explore how to handle exceptions and apply validation in Java, Python, C#, and JavaScript, as well as how to configure component trust and reuse code.

Defensive Programmer: Cryptography

Defensive Programmer: Cryptography

Defensive Programmer: Advanced Concepts

Defensive Programmer: Advanced Concepts

Defensive Programmer: Secure Testing

Explore the basics of secure testing methodologies such as unit, regression, and integration testing. Discover how to work with security metrics and track security bugs.

Defensive Programmer

  • Perform Defensive Programmer tasks such as implementing Java exception handling and JavaScript validiation, and using Python to implement asymetric encryption. Then, test your skills by answering assessment questions after filtering data with Python, performing parameter checking with C#, developing recoverable code in Java and implementing secure testing.
  • This lab provides access to tools typically used by Defensive Programmers, including:
  • �Microsoft Office 2016
  • �Java 8
  • �Eclipse
  • �JMeter
  • �Git and Git Extensions(GUI) + Port opened for Gish
  • �GitHub Desktop
  • This lab is part of the Defensive Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer journey.

Final Exam: Defensive Programmer

Final Exam: Defensive Programmer will test your knowledge and application of the topics presented throughout the Defensive Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer Journey.

Secure Agile Programming: Agile Concepts

  • Explore Agile programming concepts such as iterative software

  • approaches, differences between Agile and Waterfall, and creating a
  • secure Agile culture. Examine Scrum, Lean software, extreme
  • programming, and rapid application development. In addition, best
  • practices for secure Agile development, facilitating a secure
  • organizational culture, and secure methods for Scrum are also
  • covered.

Secure Agile Programming: Agile Techniques

Discover how to gather Agile requirements, implement Agile processes, create a secure Agile software development lifecycle, implement Disciplined Agile Delivery, and apply best practices for secure software development.

Secure Agile Programming: Agile Modeling

Discover how to model software in an Agile environment, including how to apply story-driven modeling. Explore how to use and build secure user stories and examine the Specification by Example methodology.

Secure Agile Programming: Testing

Explore Agile software testing techniques, including Continual Security Testing, testing standards, and verification and validation. Discover how to integrate metrics into Agile programming, configure bug tracking, conduct static code analysis, and implement continuous integration techniques.

Secure Agile Programmer

  • Perform Secure Agile Programmer tasks such as performing manual and tool-based agile testing, implementing continual security testing and performing manual static code analysis. Then, test your skills by answering assessment questions after performing tool-based static code analysis, implementing bug tracking in Bugzilla and JIRA, and implementing continuous integration techniques.
  • This lab provides access to tools typically used by Secure Agile Programmers, including:
  • �Microsoft Office 2016
  • �Java 8
  • �Eclipse
  • �JMeter
  • �Git and Git Extensions(GUI) + Port opened for Gish
  • �GitHub Desktop
  • This lab is part of the Secure Agile Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer journey.

Final Exam: Secure Agile Programmer

Final Exam: Secure Agile Programmer will test your knowledge and application of the topics presented throughout the Secure Agile Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer Journey.

Course options

We offer several optional training products to enhance your learning experience. If you are planning to use our training course in preperation for an official exam then whe highly recommend using these optional training products to ensure an optimal learning experience. Sometimes there is only a practice exam or/and practice lab available.

Optional practice exam (trial exam)

To supplement this training course you may add a special practice exam. This practice exam comprises a number of trial exams which are very similar to the real exam, both in terms of form and content. This is the ultimate way to test whether you are ready for the exam. 

Optional practice lab

To supplement this training course you may add a special practice lab. You perform the tasks on real hardware and/or software applicable to your Lab. The labs are fully hosted in our cloud. The only thing you need to use our practice labs is a web browser. In the LiveLab environment you will find exercises which you can start immediatelyThe lab enviromentconsist of complete networks containing for example, clients, servers,etc. This is the ultimate way to gain extensive hands-on experience. 

WHY_ICTTRAININGEN

Via ons opleidingsconcept bespaar je tot 80% op trainingen

Start met leren wanneer je wilt. Je bepaalt zelf het gewenste tempo

Spar met medecursisten en profileer je als autoriteit in je vakgebied.

Ontvang na succesvolle afronding van je cursus het officiële certificaat van deelname van Icttrainingen.nl

Krijg inzicht in uitgebreide voortgangsinformatie van jezelf of je medewerkers

Kennis opdoen met interactieve e-learning en uitgebreide praktijkopdrachten door gecertificeerde docenten

Orderproces

Once we have processed your order and payment, we will give you access to your courses. If you still have any questions about our ordering process, please refer to the button below.

read more about the order process

What is included?

Certificate of participation Yes
Monitor Progress Yes
Award Winning E-learning Yes
Mobile ready Yes
Sharing knowledge Unlimited access to our IT professionals community
Study advice Our consultants are here for you to advice about your study career and options
Study materials Certified teachers with in depth knowledge about the subject.
Service World's best service

Platform

Na bestelling van je training krijg je toegang tot ons innovatieve leerplatform. Hier vind je al je gekochte (of gevolgde) trainingen, kan je eventueel cursisten aanmaken en krijg je toegang tot uitgebreide voortgangsinformatie.

Life Long Learning

Follow multiple courses? Read more about our Life Long Learning concept

read more

Contact us

Need training advise? Contact us!


contact