Cyber Secure Coder (CSC-110) Online Course
$8.00
Price: 8.00 USD | Size: 6.68 GB | Duration : 9.57 Hours | 49 Video Lessons | ⭐️⭐️⭐️⭐️⭐️ 4.9
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD
Description
Price: 8.00 USD | Size: 6.68 GB | Duration : 9.57 Hours | 49 Video Lessons | ⭐️⭐️⭐️⭐️⭐️ 4.9
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD
Cyber Secure Coder (CSC-110) Online Course
Getting certified by CertNexus as a Cyber Secure Coder validates your ability to design and manage highly secure professional applications. For all developers, in all programming languages, and on every possible platform, the CSC-110 certification has the power to boost your coding career. In this course from learn the skills you need to know to prepare for and tackle the Cyber Secure Coder (CSC-110) certification exam.
Develop your understanding of how secure coding practices can protect your organization against various types of vulnerabilities. Learn how to identify and minimize software and security vulnerabilities, handle exploits and attacks as they occur, and develop secure code and programming practices that can help prevent exploitation in an application. Along the way, get tips on common protection tools and testing techniques for ongoing maintenance.
Introduction
1. Handling Vulnerabilities
01. Prior knowledge and expectations.mp4
01. Prior knowledge and expectations.srt
02. Gather software requirements.mp4
02. Gather software requirements.srt
03. Challenge- Identity requirements.mp4
03. Challenge- Identity requirements.srt
04. Solution- Identify requirements.mp4
04. Solution- Identify requirements.srt
05. Factors that undermine software security.mp4
05. Factors that undermine software security.srt
06. Software vulnerabilities and attack phases.mp4
06. Software vulnerabilities and attack phases.srt
07. Attack patterns.mp4
07. Attack patterns.srt
08. Challenge- Find vulnerabilities.mp4
08. Challenge- Find vulnerabilities.srt
09. Solution- Find vulnerabilities.mp4
09. Solution- Find vulnerabilities.srt
10. Challenge- New password requirements.mp4
10. Challenge- New password requirements.srt
11. Solution- New password requirements.mp4
11. Solution- New password requirements.srt
12. Challenge- Hashing passwords.mp4
12. Challenge- Hashing passwords.srt
13. Solution- Hashing passwords.mp4
13. Solution- Hashing passwords.srt
14. Vulnerability intelligence.mp4
14. Vulnerability intelligence.srt
15. Challenge- Vulnerability search.mp4
15. Challenge- Vulnerability search.srt
16. Solution- Vulnerability search.mp4
16. Solution- Vulnerability search.srt
2. Designing for Security
01. Bugs in software.mp4
01. Bugs in software.srt
02. External libraries and services.mp4
02. External libraries and services.srt
03. Handling errors securely.mp4
03. Handling errors securely.srt
04. Human-related security.mp4
04. Human-related security.srt
05. Security requirements and design.mp4
05. Security requirements and design.srt
06. Security through the software lifecycle.mp4
06. Security through the software lifecycle.srt
07. Challenge- Exploring leftover artifacts.mp4
07. Challenge- Exploring leftover artifacts.srt
08. Solution- Exploring leftover artifacts.mp4
08. Solution- Exploring leftover artifacts.srt
3. Developing Secure Code
01. Principles of secure design.mp4
01. Principles of secure design.srt
02. Avoid common mistakes.mp4
02. Avoid common mistakes.srt
03. Challenge- Common security design flaws.mp4
03. Challenge- Common security design flaws.srt
04. Solution- Common security design flaws.mp4
04. Solution- Common security design flaws.srt
05. Understand risk and threats.mp4
05. Understand risk and threats.srt
06. Risk response strategies.mp4
06. Risk response strategies.srt
07. Exploit countermeasures.mp4
07. Exploit countermeasures.srt
4. Implementing Common Protections
01. Guidelines for secure coding.mp4
01. Guidelines for secure coding.srt
02. Buffer overflows and prevention.mp4
02. Buffer overflows and prevention.srt
03. Race conditions.mp4
03. Race conditions.srt
04. Challenge- Use locks to remediate race condition.mp4
04. Challenge- Use locks to remediate race condition.srt
05. Solution- Use locks to remediate race condition.mp4
05. Solution- Use locks to remediate race condition.srt
06. OWASP top ten platform vulnerabilities.mp4
06. OWASP top ten platform vulnerabilities.srt
07. Web application vulnerabilities deep dive.mp4
07. Web application vulnerabilities deep dive.srt
08. Mobile application vulnerabilities deep dive.mp4
08. Mobile application vulnerabilities deep dive.srt
09. IoT vulnerabilities deep dive.mp4
09. IoT vulnerabilities deep dive.srt
10. Desktop vulnerabilities deep dive.mp4
10. Desktop vulnerabilities deep dive.srt
11. Privacy vulnerability defects.mp4
11. Privacy vulnerability defects.srt
5. Testing and Maintaining Software Security
01. Secure session management.mp4
01. Secure session management.srt
02. Users protections and passwords.mp4
02. Users protections and passwords.srt
03. Encryption and data protections.mp4
03. Encryption and data protections.srt
04. Error handling and protections.mp4
04. Error handling and protections.srt
Conclusion
01. Testing software for security.mp4
01. Testing software for security.srt
02. Monitoring and logging of production applications.mp4
02. Monitoring and logging of production applications.srt
Conclusion
Only logged in customers who have purchased this product may leave a review.
Reviews
There are no reviews yet.