Cert Prep: Cyber Secure Coder (CSC-110)
Offered By: LinkedIn Learning
Course Description
Overview
Learn the skills you need to know to prepare for and tackle the CertNexus Cyber Secure Coder (CSC-110) certification exam.
Syllabus
Introduction
- Overview
- Prior knowledge and expectations
- Gather software requirements
- Challenge: Identity requirements
- Solution: Identify requirements
- Factors that undermine software security
- Software vulnerabilities and attack phases
- Attack patterns
- Challenge: Find vulnerabilities
- Solution: Find vulnerabilities
- Challenge: New password requirements
- Solution: New password requirements
- Challenge: Hashing passwords
- Solution: Hashing passwords
- Vulnerability intelligence
- Challenge: Vulnerability search
- Solution: Vulnerability search
- Bugs in software
- External libraries and services
- Handling errors securely
- Human-related security
- Security requirements and design
- Security through the software lifecycle
- Challenge: Exploring leftover artifacts
- Solution: Exploring leftover artifacts
- Principles of secure design
- Avoid common mistakes
- Challenge: Common security design flaws
- Solution: Common security design flaws
- Understand risk and threats
- Risk response strategies
- Exploit countermeasures
- Guidelines for secure coding
- Buffer overflows and prevention
- Race conditions
- Challenge: Use locks to remediate race condition
- Solution: Use locks to remediate race condition
- OWASP top ten platform vulnerabilities
- Web application vulnerabilities deep dive
- Mobile application vulnerabilities deep dive
- IoT vulnerabilities deep dive
- Desktop vulnerabilities deep dive
- Privacy vulnerability defects
- Secure session management
- Users, protections, and passwords
- Encryption and data protections
- Error handling and protections
- Testing software for security
- Monitoring and logging of production applications
Taught by
ITProTV
Related Courses
Internet History, Technology, and SecurityUniversity of Michigan via Coursera Sicherheit im Internet
openHPI أساسيات التشفير
Rwaq (رواق) Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera Web Application Development: Security
University of New Mexico via Coursera