Fundamentals Of Secure Application Development Training

Fundamentals of Secure Application Development Training

The rules of information security aren’t what they used to be. Hackers aren’t kids in basements–they’re state sponsored professionals and organized criminal groups all around the world. They break into systems and steal data any way they can.From proactive requirements to coding and testing, this secure software development training course covers the best practices any software developer needs to avoid opening up their users, customers and organization to attack at the application layer. We teach only constantly updated best practices, and our experts answer your questions live in class. Return to work ready to build higher quality, more robustly protected applications.

80% of Global Fortune 500 organizations are expected to adopt DevOps by 2021 – CA.

ADP, BBC News, ebay, GE, ING, Intuit, PayPal, Splunk, Uber & other MNCs worldwide use DevOps.

Be future ready. Start learning
Structure your learning and get a certificate to prove it.
Start Learning

Fundamentals Of Secure Application Development UpComing Batches

Apr-18 - May-30

Weekend
SOLD OUT

Timings: 07:00 AM To 10:00 AM (IST)

350.00     Enroll Now

Apr-11 - May-23

Weekday
SOLD OUT

Timings: 20:30 PM To 23:30 PM (IST)

350.00     Enroll Now

Apr-20 - Jun-01

Weekend
FILLING FAST

Timings: 07:00 AM To 10:00 AM (IST)

350.00     Enroll Now

Apr-27 - Jun-08

Weekday
FILLING FAST

Timings: 20:30 PM To 23:30 PM (IST)

350.00     Enroll Now

May-04 - Jun-15

Weekend

Timings: 07:00 AM To 10:00 AM (IST)

350.00     Enroll Now

May-11 - Jun-22

Weekday

Timings: 20:30 PM To 23:30 PM (IST)

350.00     Enroll Now
Be future ready. Start learning
Structure your learning and get a certificate to prove it.
Start Learning

Course Curriculum

Fundamentals of Secure Application Development

SELF PACED

The rules of information security aren’t what they used to be. Hackers aren’t kids in basements–they’re state sponsored professionals and organized criminal groups all around the world. They break into systems and steal data any way they can.From proactive requirements to coding and testing, this secure software development training course covers the best practices any software developer needs to avoid opening up their users, customers and organization to attack at the application layer. We teach only constantly updated best practices, and our experts answer your questions live in class. Return to work ready to build higher quality, more robustly protected applications.

  • WEEK 5-6
  • 10 Modules
  • 6 Hours
Self Paced


Topics:
  • Assets, Threats & Vulnerabilities.
  • Security Risk Analysis (Bus & Tech).
  • Secure Dev Processes (MS, BSI…).
  • Defense in Depth.
  • Approach for this Course.


Topics:
  • Assets to be Protected.
  • Threats Expected.
  • Security Imperatives (int&external).
  • Organization's Risk Appetite.
  • Security Terminology.
  • Organizational Security Policy.
  • Security Roles and Responsibilities.
  • Security Training for Roles.
  • Generic Security Goals & Requirements.

Exercise:
  • Our Own Security Context


Topics:
  • Project-Specific Security Terms.
  • Project-Related Assets & Security Goals.
  • Product Architecture Analysis.
  • Use Cases & MisUse/Abuse Cases.
  • Dataflows with Trust Boundaries.
  • Product Security Risk Analysis.
  • Elicit, Categorize and Prioritize SecRqts.
  • Validate Security Requirements.

Exercise:
  • Managing Security Requirements.

High-Level Design.


Topics:
  • Architectural Risk Analysis.
  • Design Requirements.
  • Analyze Attack Surface.
  • Threat Modeling.
  • Trust Boundaries.
  • Eliminate Race Objects.

Detail-Level Design.


Topics:
  • Secure Design Principles.
  • Use of Security Wrappers.
  • Input Validation.
  • Design Pitfalls.
  • Validating Design Security.
  • Pairing Mem Mgmt Functinos.
  • Exclude User Input from Format Strings.
  • Canonicalization.
  • TOCTOU.
  • Close Race Windows.
  • Taint Analysis.

Exercise:
  • A Secure Software Design, Instructor Q & A.



Topics:
  • Developer Guidelines & Checklists.
  • Compiler Security Settings (per).
  • Tools to Use.
  • Coding Standards (Per Language).
  • Common Pitfalls (Per Language).
  • Secure/Safe, Functions/Methods(Encrypted Pointers,Memory Initialization,Function Retrun Checking (e.g. Malloc),Dereferencing Pointers).
  • Integer type Selection(Range Checking,Pre/Post Checking).
  • Synchronization Primatives.
  • Early Verification.
  • Static Analysis (Code Review w/tools).
  • Unit & Dev Team Testing.
  • Risk-Based Security Testing.
  • Taint Analysis.

Exercise:
  • Securing Coding Q & A.



Topics:
  • Assets to be Protected.
  • Threats Expected.
  • Security Imperatives (int&external).
  • Organization's Risk Appetite.
  • Static Analysis.
  • Dynamic Analysis.
  • Risk-Based Security Testing.
  • Fuzz Testing (Whitebox vs Blackbox).
  • Penetration Testing (Whitebox vs Blackbox).
  • Attack Surface Review.
  • Code Audits.
  • Independent Security Review.
Exercise:
  • A Secure Software Release.



Topics:
  • Process Review.
  • Getting Started.
  • Priorities.

Exercise:
  • Your Secure Software Plan.

Program Syllabus

Curriculum

You can also view the program syllabus by downloading this program Curriculum.

Projects

How will I execute the practicals of Kubernetes certification course?

All the Case Studies and Demos will run on Ubuntu 17.10 VMs. The pre-built VMs and their Installation Guide will be present on LMS once you enroll for the course. Kubernetes is an open-source tool therefore anybody can use it for their lab exercises.

What are the system requirements for this course?

Hardware Requirement(s):- Memory – Minimum 16 GB RAM, processor – Intel Core i5 CPU @2.00 GHz or above, Storage – 250 GB HDD/SDD or above, Software Requirement(s):- Operating System – Windows 7 or above, Ubuntu 14 or above, Latest Version of Oracle Virtual Box Installed, Windows PowerShell 4.0 or above (Install Azure Module), Microsoft Azure SDK for .NET v2.9 (prefer latest).

Course Description

Course Certification

OL Tech Edu’s Certificate Holders work at top 500s of companies like

certificate

Course FAQ's

Features

Explore step by step paths to get started on your journey to Jobs of Today and Tomorrow.

Instructor-led Sessions

30 Hours of Online Live Instructor-Led Classes.
Weekend Class : 10 sessions of 3 hours each.

Real Life Case Studies

Real-life Case Studies

Live project based on any of the selected use cases, involving implementation of the various real life solutions / services.

Assignments

Assignments

Each class will be followed by practical assignments.

24 x 7 Expert Support

24 x 7 Expert Support

We have 24x7 online support team to resolve all your technical queries, through ticket based tracking system, for the lifetime.

Certification

Certification

Towards the end of the course, OL Tech Edu certifies you for the course you had enrolled for based on the project you submit.

Enroll, Learn, Grow, Repeat! Get ready to achieve your learning goals with OL Tech Edu View All Courses

© 2015 - 2024 OL Tech Edu. All Rights Reserved.
Designed, Developed & Powered by MNJ SOFTWARE

The website is best experienced on the following version (or higher) of Chrome 31, Firefox 26, Safari 6 and Internet Explorer 9 browsers