<<

COURSE OUTLINE ETHICAL HACKING Certified Secure Coding for Developers (CSCSD)

SPECIALIST-LEVEL COURSE Cost: £1,100.00 + VAT Duration: 2 days

This two-day course is COURSE OVERVIEW for people who want to It is much less expensive to build secure zzYou will learn about the Security understand the technical software than to correct security issues Development Lifecycle (SDL), a after the software has been completed software development process that controls used to prevent or deal with the costs that may be will help you build more secure software vulnerabilities. associated with a security breach. software and address security It focuses on common compliance requirements while Securing critical software resources is reducing development cost. insecure coding practices more important than ever as the focus and examines how these of attackers has steadily moved to the can be addressed to make application layer. KEY BENEFITS With this course, you will: secure applications. Building secure software requires an zzHave access to a purpose built understanding of security principles controlled environment specifically and the goal of software security is to created to demonstrate the main areas maintain the confidentiality, integrity of vulnerability and the key mitigation and availability of information resources strategies in order to enable successful business zzGet the chance to practise techniques operations. to address common insecure coding practices During the course, you will have access zzBuild your skills and confidence in to a specifically created controlled coding secure applications environment to demonstrate the main areas of vulnerability and mitigation WHO SHOULD ATTEND strategies. This course is for people who want to learn secure coding, including: THE SKILLS YOU WILL LEARN zzPenetration testers zzYou will learn about the vulnerabilities zzProfessional software developers that arise from insecure coding and the zzSoftware architects “The course was excellent array of hacking techniques that many zzSoftware security auditors and highly relevant to my attackers use to disrupt the way an zzSecurity managers work as a web developer. application’s programming/business A variety of topics were logic work PREREQUISITES covered and I thought zzYou will find out how to take a Rather than attempt to cover all ‘defence in depth’ approach and languages on one course we focus that a good level of time ensure you consider all the security on the important principles. A basic was dedicated to the most issues that may arise while developing understanding of web application prevalent and serious applications coding is preferable, ideally in Java exploits.” zzYou will gain an understanding of the (as examples and exercises are in Java), CSCSD Delegate most important principles in secure however the course has been developed Falck Safety Services coding and apply your new knowledge to be language agnostic with examples and exercises in Java

To find out if our cyber training is right for you, and to make a booking, contact our education team on 01763 285 285 or email [email protected] COURSE OUTLINE ETHICAL HACKING Certified Secure Coding for Software Developers (CSCSD)

SPECIALIST-LEVEL COURSE Cost: £1,100.00 + VAT Duration: 2 days

WHAT QUALIFICATION SYLLABUS WILL I RECEIVE? 1. Introduction 5. Secure Development Principles Those delegates successfully a. Disclaimer a. Input Validation passing the exam at the end b. Trends & Metrics b. Canonicalisation of the course will be awarded . Lab Environment c. Output Encoding 7Safe’s Certified Secure Coding d. Error Handling for Software Developers 2. Core Security Concepts e. & Authorisation (CSCSD) qualification. a. Confidentiality, Integrity, f. Auditing & Logging Availability g. Session Management b. Authentication and Authorisation h. Secure Communications c. Accounting i. Secure Resource Access d. Non-repudiation j. Secure Storage e. Privacy k. Cryptography f. Data Anonymisation g. User Consent 6. Best Practices h. Disposition i. Test Data Management 7. Conclusion

3. Secure Development Lifecycle a. Waterfall vs Agile b. Microsoft SDLC c. TouchPoints d. CLASP e. Comparison

4. Security Design Principles a. Least Privilege b. Separation of Duties c. Defence in Depth d. Fail Safe e. Economy of Mechanism f. Complete Mediation g. Open Design 7Safe h. Least Common Mechanism Global Innovation i. Psychological Acceptability and Technology Centre Melbourn j. Weakest Link Herts, SG8 6DP k. Leveraging Existing Components United Kingdom tel: +44(0) 1763 285 285 [email protected] www.7safe.com

To find out if our cyber training is right for you, and to make a booking, contact our education team on 01763 285 285 or email [email protected]