Welcome to Expert Training The Online Course Shop!
-68%

Cyber Secure Coder (CSC-110) Online Course

$8.00

Price: 8.00 USD | Size: 6.68 GB | Duration : 9.57  Hours | 49 Video Lessons   |   ⭐️⭐️⭐️⭐️⭐️ 4.9  

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD

SKU: CYB-SCR-CDR-CSC Category:

OR

Add to Wishlist
Add to Wishlist

Description

Price: 8.00 USD | Size: 6.68 GB | Duration : 9.57  Hours | 49 Video Lessons   |   ⭐️⭐️⭐️⭐️⭐️ 4.9  

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD

Cyber Secure Coder (CSC-110) Online Course 

Getting certified by CertNexus as a Cyber Secure Coder validates your ability to design and manage highly secure professional applications. For all developers, in all programming languages, and on every possible platform, the CSC-110 certification has the power to boost your coding career. In this course from  learn the skills you need to know to prepare for and tackle the Cyber Secure Coder (CSC-110) certification exam.

Develop your understanding of how secure coding practices can protect your organization against various types of vulnerabilities. Learn how to identify and minimize software and security vulnerabilities, handle exploits and attacks as they occur, and develop secure code and programming practices that can help prevent exploitation in an application. Along the way, get tips on common protection tools and testing techniques for ongoing maintenance.

Introduction

1. Handling Vulnerabilities

01. Prior knowledge and expectations.mp4

01. Prior knowledge and expectations.srt

02. Gather software requirements.mp4

02. Gather software requirements.srt

03. Challenge- Identity requirements.mp4

03. Challenge- Identity requirements.srt

04. Solution- Identify requirements.mp4

04. Solution- Identify requirements.srt

05. Factors that undermine software security.mp4

05. Factors that undermine software security.srt

06. Software vulnerabilities and attack phases.mp4

06. Software vulnerabilities and attack phases.srt

07. Attack patterns.mp4

07. Attack patterns.srt

08. Challenge- Find vulnerabilities.mp4

08. Challenge- Find vulnerabilities.srt

09. Solution- Find vulnerabilities.mp4

09. Solution- Find vulnerabilities.srt

10. Challenge- New password requirements.mp4

10. Challenge- New password requirements.srt

11. Solution- New password requirements.mp4

11. Solution- New password requirements.srt

12. Challenge- Hashing passwords.mp4

12. Challenge- Hashing passwords.srt

13. Solution- Hashing passwords.mp4

13. Solution- Hashing passwords.srt

14. Vulnerability intelligence.mp4

14. Vulnerability intelligence.srt

15. Challenge- Vulnerability search.mp4

15. Challenge- Vulnerability search.srt

16. Solution- Vulnerability search.mp4

16. Solution- Vulnerability search.srt

 

2. Designing for Security

01. Bugs in software.mp4

01. Bugs in software.srt

02. External libraries and services.mp4

02. External libraries and services.srt

03. Handling errors securely.mp4

03. Handling errors securely.srt

04. Human-related security.mp4

04. Human-related security.srt

05. Security requirements and design.mp4

05. Security requirements and design.srt

06. Security through the software lifecycle.mp4

06. Security through the software lifecycle.srt

07. Challenge- Exploring leftover artifacts.mp4

07. Challenge- Exploring leftover artifacts.srt

08. Solution- Exploring leftover artifacts.mp4

08. Solution- Exploring leftover artifacts.srt

 

 

3. Developing Secure Code

01. Principles of secure design.mp4

01. Principles of secure design.srt

02. Avoid common mistakes.mp4

02. Avoid common mistakes.srt

03. Challenge- Common security design flaws.mp4

03. Challenge- Common security design flaws.srt

04. Solution- Common security design flaws.mp4

04. Solution- Common security design flaws.srt

05. Understand risk and threats.mp4

05. Understand risk and threats.srt

06. Risk response strategies.mp4

06. Risk response strategies.srt

07. Exploit countermeasures.mp4

07. Exploit countermeasures.srt

 

 

4. Implementing Common Protections

01. Guidelines for secure coding.mp4

01. Guidelines for secure coding.srt

02. Buffer overflows and prevention.mp4

02. Buffer overflows and prevention.srt

03. Race conditions.mp4

03. Race conditions.srt

04. Challenge- Use locks to remediate race condition.mp4

04. Challenge- Use locks to remediate race condition.srt

05. Solution- Use locks to remediate race condition.mp4

05. Solution- Use locks to remediate race condition.srt

06. OWASP top ten platform vulnerabilities.mp4

06. OWASP top ten platform vulnerabilities.srt

07. Web application vulnerabilities deep dive.mp4

07. Web application vulnerabilities deep dive.srt

08. Mobile application vulnerabilities deep dive.mp4

08. Mobile application vulnerabilities deep dive.srt

09. IoT vulnerabilities deep dive.mp4

09. IoT vulnerabilities deep dive.srt

10. Desktop vulnerabilities deep dive.mp4

10. Desktop vulnerabilities deep dive.srt

11. Privacy vulnerability defects.mp4

11. Privacy vulnerability defects.srt

 

5. Testing and Maintaining Software Security

01. Secure session management.mp4

01. Secure session management.srt

02. Users protections and passwords.mp4

02. Users protections and passwords.srt

03. Encryption and data protections.mp4

03. Encryption and data protections.srt

04. Error handling and protections.mp4

04. Error handling and protections.srt

 

Conclusion

01. Testing software for security.mp4

01. Testing software for security.srt

02. Monitoring and logging of production applications.mp4

02. Monitoring and logging of production applications.srt

Conclusion

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Quick Navigation
×
×

Cart