Course: Programmer to Secure Agile Programmer - Part 2: Secure Programmer
duration: 15 hours |
Language: English (US) |
access duration: 180 days |
Details
This is part 2 of the learning path 'Programmer to Secure Agile Programmer'. Every organisation is eager to optimise its processes and secure itself against ever-growing threats. As a result, there is an increasing demand for Secure Agile Programmers who have the relevant training and experience in Agile methodologies covering not only software development, but also secure programming.
This part of the learning path focuses on security concepts, vulnerabilities, encryption, attacks and resiliency coding for secure programmers. You explore the most common vulnerabilities and software attacks, the basics of cryptographic algorithms, and different concepts for creating resilient software.
You will find several courses that prepare you to become a secure programmer. In addition, there is a livelab available for you to practice. You finish this part of the learning path with an exam.
Result
After completing this part of the learning path, you will be familiar with various concepts for secure programming. In addition, you are ready to start part 3 of this learning path.
Prerequisites
You are familiar with the basic principles of software development. Basic knowledge of Agile is recommended. Knowledge from part 1 of this learning path is assumed.
Target audience
Software Developer, Web Developer
Content
Programmer to Secure Agile Programmer - Part 2: Secure Programmer
Secure Programmer: Security Concepts
Discover the basics of secure programming, including common
- security concepts like the CIA triangle, least privileges, and
- separation of duties. Explore authentication and authorization,
- including popular models like DAC, MAC, RBAC, and ABAC. Examine how
- to avoid common programming errors that can undermine security, as
- well as how to incorporate validation and verification into your
- programming.
Secure Programmer: Vulnerabilities
Explore various software vulnerability topics in this 19-video,
- which opens with a look at specific security vulnerabilities and
- how to program counter techniques. Then learners receive three
- tutorials on the OWASP (Open Web Application Security Project) Top
- 10 vulnerabilities: SQL injection, broken authentication, and
- cross-site scripting; broken access control, security
- misconfiguration, sensitive data exposure, and insufficient attack
- protection; and cross-site request forgery, using components with
- known vulnerabilities, and under protected application programming
- interfaces (APIs). Examine use of threat models including STRIDE
- (Spoofing, Tampering, Repudiation, Information Disclosure, Denial
- of Service, and Elevation), PASTA (the Process for Attack
- Simulation and Threat Analysis), DREAD (Damage, Reproductibility,
- Exploitability, Affected Users, Discoverability), and SQUARE
- (Security Quality Requirements Engineering). Use CVE (common
- vulnerabilities and exposures) vulnerability scoring, and examine
- Java, Python, C#, and Javascript SQL secure coding examples.
- Implement Python secure coding to combat SQL vulnerability; C# to
- combat common code vulnerabilities, and Javascript to combat Cross
- Site Scripting attacks. Use Common Vulnerability Scoring System
- (CVSS), and finally, use OWASP Zap and Vega vulnerability scanners
- to test websites for common vulnerabilities.
Secure Programming: Encryption
In this 5-video course, learners discover the basics of
- cryptographic algorithms. You will receive a general overview of
- symmetric algorithms such as AES, Blowfish, and Serpent. You will
- also examine asymmetric algorithms such as RSA (Rivest, Sharmir,
- and Adelman), Diffie-Hellman, and elliptic-curve cryptography
- (ECC). More importantly, you will learn when to use which algorithm
- and what algorithms are better for specific purposes. You will then
- move on to integrity algorithms, including hashes like SHA (Secure
- Hash Algorithm 1), MD5 (Message Digest 5), and 6, RIPEMD (Ripe
- Message Digest), and HAVAL, as well as message authentication codes
- (MACs) and HMACs (keyed-hash message authentication codes). You
- will also examine the strengths and weaknesses of these different
- approaches. The goal is whether one can make intelligent choices
- about which algorithms to implement for which purpose; whether
- one's concerns are about confidentiality; if one needs to do key
- exchange; is message integrity an issue; are you storing passwords?
- These will each require different algorithms.
Secure Programmer: Attacks
Explore common software attacks and the coding mistakes that make software vulnerable to them. Discover how to code against format string, SQL injection, buffer overflow, cross-site scripting, and password cracking attacks in Java, C#, JavaScript, and Python.
Secure Programmer: Resiliency Coding
Explore resiliency concepts such as stability, recovery, and defensive coding. Discover how to write resilient code in Java, Python, C#, and JavaScript.
Secure Programmer
Perform Secure Programmer tasks such as minimizing SQL injection vulnerability, using OWASP Zap application to test an insecure web application, using Python to encrypt a data set and explore vulnerable code that can cause an overrun of buffer's boundary in Java, Python, C# and Javascript. Then, test your skills by answering assessment questions after preventing cross site scripting vulnerability, using Python to brute force a simple password, and creating resilient code in Python and C#.
Final Exam: Secure Programmer
Final Exam: Secure Programmer will test your knowledge and application of the topics presented throughout the Secure Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer Journey.
Course options
We offer several optional training products to enhance your learning experience. If you are planning to use our training course in preperation for an official exam then whe highly recommend using these optional training products to ensure an optimal learning experience. Sometimes there is only a practice exam or/and practice lab available.
Optional practice exam (trial exam)
To supplement this training course you may add a special practice exam. This practice exam comprises a number of trial exams which are very similar to the real exam, both in terms of form and content. This is the ultimate way to test whether you are ready for the exam.
Optional practice lab
To supplement this training course you may add a special practice lab. You perform the tasks on real hardware and/or software applicable to your Lab. The labs are fully hosted in our cloud. The only thing you need to use our practice labs is a web browser. In the LiveLab environment you will find exercises which you can start immediately. The lab enviromentconsist of complete networks containing for example, clients, servers,etc. This is the ultimate way to gain extensive hands-on experience.
Sign In
WHY_ICTTRAININGEN
Via ons opleidingsconcept bespaar je tot 80% op trainingen
Start met leren wanneer je wilt. Je bepaalt zelf het gewenste tempo
Spar met medecursisten en profileer je als autoriteit in je vakgebied.
Ontvang na succesvolle afronding van je cursus het officiële certificaat van deelname van Icttrainingen.nl
Krijg inzicht in uitgebreide voortgangsinformatie van jezelf of je medewerkers
Kennis opdoen met interactieve e-learning en uitgebreide praktijkopdrachten door gecertificeerde docenten
Orderproces
Once we have processed your order and payment, we will give you access to your courses. If you still have any questions about our ordering process, please refer to the button below.
read more about the order process
Een zakelijk account aanmaken
Wanneer u besteld namens uw bedrijf doet u er goed aan om aan zakelijk account bij ons aan te maken. Tijdens het registratieproces kunt u hiervoor kiezen. U heeft vervolgens de mogelijkheden om de bedrijfsgegevens in te voeren, een referentie en een afwijkend factuuradres toe te voegen.
Betaalmogelijkheden
U heeft bij ons diverse betaalmogelijkheden. Bij alle betaalopties ontvangt u sowieso een factuur na de bestelling. Gaat uw werkgever betalen, dan kiest u voor betaling per factuur.
Cursisten aanmaken
Als u een zakelijk account heeft aangemaakt dan heeft u de optie om cursisten/medewerkers aan te maken onder uw account. Als u dus meerdere trainingen koopt, kunt u cursisten aanmaken en deze vervolgens uitdelen aan uw collega’s. De cursisten krijgen een e-mail met inloggegevens wanneer zij worden aangemaakt en wanneer zij een training hebben gekregen.
Voortgangsinformatie
Met een zakelijk account bent u automatisch beheerder van uw organisatie en kunt u naast cursisten ook managers aanmaken. Beheerders en managers kunnen tevens voortgang inzien van alle cursisten binnen uw organisatie.
What is included?
Certificate of participation | Yes |
Monitor Progress | Yes |
Mobile ready | Yes |
Sharing knowledge | Unlimited access to our IT professionals community |
Study advice | Our consultants are here for you to advice about your study career and options |
Study materials | Certified teachers with in depth knowledge about the subject. |
Service | World's best service |
Platform
Na bestelling van je training krijg je toegang tot ons innovatieve leerplatform. Hier vind je al je gekochte (of gevolgde) trainingen, kan je eventueel cursisten aanmaken en krijg je toegang tot uitgebreide voortgangsinformatie.
FAQ
Niet gevonden wat je zocht? Bekijk alle vragen of neem contact op.