8012  Reviews star_rate star_rate star_rate star_rate star_half

Fundamentals of Secure Application Development

Application developers often aren’t trained in security, yet the vast majority of breaches are related to the application layer. Learn secure development best practices that keep software safe. The...

Read More
$1,295 USD
Course Code SECURE-APP-DEV
Duration 2 days
Available Formats Classroom, Virtual

Application developers often aren’t trained in security, yet the vast majority of breaches are related to the application layer. Learn secure development best practices that keep software safe.

The vast majority of hacks are not due to insecure networks or misconfigured firewalls; they are a result of common software flaws that get coded into applications. Even with good information security policy and staff, the reality is that software developers are often underserved when it comes to security strategy. If their applications get built without attention to good software security practices, the risk gets passed downstream and by the time an incident occurs, it’s too late to be proactive.

From proactive requirements to coding and testing, this information security training course covers the best practices any software developer needs to avoid opening up their users, customers, and organization to attack at the application layer. We teach only constantly updated best practices, and our experts answer your questions live in class. Return to work ready to build higher quality, more robustly protected applications.

Skills Gained

  • Understand assets, threats, vulnerabilities, and risks
  • Gather and understand security requirements
  • Design secure software
  • Write secure code
  • Test your software for security
  • Release & operate secure software

Who Can Benefit

  • Application Development Managers
  • Software Engineers and Developers
  • CISOs, CISAs and Security Professionals
  • Software Testers
  • QA Managers, Directors, and Staff
  • Test Management
  • Business Analysts
  • Project Managers
  • IT Specialists (Security, Capacity Management, Networking…)

Course Details

Course Outline

  • Part 1: Secure Software Development
  • Part 2: The Context for Secure Development
  • Part 3: Security Requirements
  • Part 4: Designing Secure Software
  • Part 5: Writing Secure Code
  • Part 6: Testing for Software Security
  • Part 7: Releasing & Operating Secure Software
  • Part 8: Making Software Development More Secure
|
View Full Schedule