
- Type Learning
- Level Intermediate
CyberEd Secure Coding Warrior
Issued by
CyberEd.io
Secure coders are responsible for developing and writing secure code in a way that protects against security vulnerabilities like bugs, defects and logic flaws. They take proactive steps to introduce secure coding methodologies before the application or software is introduced into a production environment, often following recommendations from the Open Web Application Security Project (OWASP) Foundation.
- Type Learning
- Level Intermediate
Skills
- Brute Force Attacks
- Data Manipulation
- Development Environment
- Distributed Revision Control
- Functional Requirement
- GitHub
- Git (Version Control System)
- Management
- Open Web Application Security Project (OWASP)
- Password Cracking
- Python (Programming Language)
- Risk Analysis
- Secure Coding
- Security Requirements Analysis
- Software Development
- Systems Development Life Cycle
- Version Control
- Vulnerability
- Web Applications
- Web Application Security
- Workflow Management
Earning Criteria
-
CertNexus Cyber Secure Coder: Cyber Secure Coder will aid in developing an appropriate understanding of secure development practices and how those practices protect against various types of vulnerabilities. You will learn the types of vulnerabilities, the exploits that can occur from those vulnerabilities, and the programming practices that will help prevent exploitation in an application.
-
OWASP Top 10: The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.
-
Intro to Git: Version control is a cryptic yet essential part of a software development team. Git is a distributed version control system that allows collaboration and management of large scale software products (as well as other types of projects). In this series, you will get started with Git. You will be shown how to create a repository, save changes in the repo, link to a remote server (GitHub), and finally a basic collaboration workflow.
-
Python for Security: Python is a great language for learning, writing web applications, and manipulating data. However, Python can be used for security testing as well. In this series, we will explore the use of Python in such concepts as brute force password cracking, making SSH connections programmatically, creating socket connections and port scanner a particular host, banner grabbing from open ports, and more.
-
Secure SDLC: Secure SDLC (SSDLC) integrates security into the process, resulting in the security requirements being gathered alongside functional requirements, risk analysis being undertaken during the design phase, and security testing happening in parallel with development, for example.
-
Secure Coding Principles: This course will aid in developing an appropriate understanding of secure development practices and how those practices protect against various types of vulnerabilities. You will learn the types of vulnerabilities, the exploits that can occur from those vulnerabilities, and the programming practices that will help prevent exploitation in an application.