Course: Programmer to Secure Agile Programmer - Part 2: Secure Programmer

$279.00
$337.59 incl. vat

duration: 15 hours |

Language: English (US) |

access duration: 180 days |

Details

This is part 2 of the learning path 'Programmer to Secure Agile Programmer'. Every organisation is eager to optimise its processes and secure itself against ever-growing threats. As a result, there is an increasing demand for Secure Agile Programmers who have the relevant training and experience in Agile methodologies covering not only software development, but also secure programming.

This part of the learning path focuses on security concepts, vulnerabilities, encryption, attacks and resiliency coding for secure programmers. You explore the most common vulnerabilities and software attacks, the basics of cryptographic algorithms, and different concepts for creating resilient software.

You will find several courses that prepare you to become a secure programmer. In addition, there is a livelab available for you to practice. You finish this part of the learning path with an exam.

Result

After completing this part of the learning path, you will be familiar with various concepts for secure programming. In addition, you are ready to start part 3 of this learning path.

Prerequisites

You are familiar with the basic principles of software development. Basic knowledge of Agile is recommended. Knowledge from part 1 of this learning path is assumed.

Target audience

Software Developer, Web Developer

Content

Programmer to Secure Agile Programmer - Part 2: Secure Programmer

15 hours

Secure Programmer: Security Concepts

  • Discover the basics of secure programming, including common

  • security concepts like the CIA triangle, least privileges, and
  • separation of duties. Explore authentication and authorization,
  • including popular models like DAC, MAC, RBAC, and ABAC. Examine how
  • to avoid common programming errors that can undermine security, as
  • well as how to incorporate validation and verification into your
  • programming.

Secure Programmer: Vulnerabilities

  • Explore various software vulnerability topics in this 19-video,

  • which opens with a look at specific security vulnerabilities and
  • how to program counter techniques. Then learners receive three
  • tutorials on the OWASP (Open Web Application Security Project) Top
  • 10 vulnerabilities: SQL injection, broken authentication, and
  • cross-site scripting; broken access control, security
  • misconfiguration, sensitive data exposure, and insufficient attack
  • protection; and cross-site request forgery, using components with
  • known vulnerabilities, and under protected application programming
  • interfaces (APIs). Examine use of threat models including STRIDE
  • (Spoofing, Tampering, Repudiation, Information Disclosure, Denial
  • of Service, and Elevation), PASTA (the Process for Attack
  • Simulation and Threat Analysis), DREAD (Damage, Reproductibility,
  • Exploitability, Affected Users, Discoverability), and SQUARE
  • (Security Quality Requirements Engineering). Use CVE (common
  • vulnerabilities and exposures) vulnerability scoring, and examine
  • Java, Python, C#, and Javascript SQL secure coding examples.
  • Implement Python secure coding to combat SQL vulnerability; C# to
  • combat common code vulnerabilities, and Javascript to combat Cross
  • Site Scripting attacks. Use Common Vulnerability Scoring System
  • (CVSS), and finally, use OWASP Zap and Vega vulnerability scanners
  • to test websites for common vulnerabilities.

Secure Programming: Encryption

  • In this 5-video course, learners discover the basics of

  • cryptographic algorithms. You will receive a general overview of
  • symmetric algorithms such as AES, Blowfish, and Serpent. You will
  • also examine asymmetric algorithms such as RSA (Rivest, Sharmir,
  • and Adelman), Diffie-Hellman, and elliptic-curve cryptography
  • (ECC). More importantly, you will learn when to use which algorithm
  • and what algorithms are better for specific purposes. You will then
  • move on to integrity algorithms, including hashes like SHA (Secure
  • Hash Algorithm 1), MD5 (Message Digest 5), and 6, RIPEMD (Ripe
  • Message Digest), and HAVAL, as well as message authentication codes
  • (MACs) and HMACs (keyed-hash message authentication codes). You
  • will also examine the strengths and weaknesses of these different
  • approaches. The goal is whether one can make intelligent choices
  • about which algorithms to implement for which purpose; whether
  • one's concerns are about confidentiality; if one needs to do key
  • exchange; is message integrity an issue; are you storing passwords?
  • These will each require different algorithms.

Secure Programmer: Attacks

Explore common software attacks and the coding mistakes that make software vulnerable to them. Discover how to code against format string, SQL injection, buffer overflow, cross-site scripting, and password cracking attacks in Java, C#, JavaScript, and Python.

Secure Programmer: Resiliency Coding

Explore resiliency concepts such as stability, recovery, and defensive coding. Discover how to write resilient code in Java, Python, C#, and JavaScript.

Secure Programmer

Perform Secure Programmer tasks such as minimizing SQL injection vulnerability, using OWASP Zap application to test an insecure web application, using Python to encrypt a data set and explore vulnerable code that can cause an overrun of buffer's boundary in Java, Python, C# and Javascript. Then, test your skills by answering assessment questions after preventing cross site scripting vulnerability, using Python to brute force a simple password, and creating resilient code in Python and C#.

Final Exam: Secure Programmer

Final Exam: Secure Programmer will test your knowledge and application of the topics presented throughout the Secure Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer Journey.

Course options

We offer several optional training products to enhance your learning experience. If you are planning to use our training course in preperation for an official exam then whe highly recommend using these optional training products to ensure an optimal learning experience. Sometimes there is only a practice exam or/and practice lab available.

Optional practice exam (trial exam)

To supplement this training course you may add a special practice exam. This practice exam comprises a number of trial exams which are very similar to the real exam, both in terms of form and content. This is the ultimate way to test whether you are ready for the exam. 

Optional practice lab

To supplement this training course you may add a special practice lab. You perform the tasks on real hardware and/or software applicable to your Lab. The labs are fully hosted in our cloud. The only thing you need to use our practice labs is a web browser. In the LiveLab environment you will find exercises which you can start immediatelyThe lab enviromentconsist of complete networks containing for example, clients, servers,etc. This is the ultimate way to gain extensive hands-on experience. 

WHY_ICTTRAININGEN

Via ons opleidingsconcept bespaar je tot 80% op trainingen

Start met leren wanneer je wilt. Je bepaalt zelf het gewenste tempo

Spar met medecursisten en profileer je als autoriteit in je vakgebied.

Ontvang na succesvolle afronding van je cursus het officiële certificaat van deelname van Icttrainingen.nl

Krijg inzicht in uitgebreide voortgangsinformatie van jezelf of je medewerkers

Kennis opdoen met interactieve e-learning en uitgebreide praktijkopdrachten door gecertificeerde docenten

Orderproces

Once we have processed your order and payment, we will give you access to your courses. If you still have any questions about our ordering process, please refer to the button below.

read more about the order process

What is included?

Certificate of participation Yes
Monitor Progress Yes
Mobile ready Yes
Sharing knowledge Unlimited access to our IT professionals community
Study advice Our consultants are here for you to advice about your study career and options
Study materials Certified teachers with in depth knowledge about the subject.
Service World's best service

Platform

Na bestelling van je training krijg je toegang tot ons innovatieve leerplatform. Hier vind je al je gekochte (of gevolgde) trainingen, kan je eventueel cursisten aanmaken en krijg je toegang tot uitgebreide voortgangsinformatie.

Life Long Learning

Follow multiple courses? Read more about our Life Long Learning concept

read more

Contact us

Need training advise? Contact us!


contact