Cyber Secure Coder

CertNexus Cyber Secure Coder™ (CSC) is the comprehensive certification for validating secure coding practices – for all developers, in all programming languages, on all platforms.

  • Duration: 3 days
  • Level: Intermediate

Why Get Cyber Secure Coding Certified?

Developers are tasked with ensuring that the software that they create includes coding that results in protected applications.
Specialists holding the Cyber Secure Coder certification have proven that they can follow safe practices throughout the creative process.

PROVE YOUR SKILLS

Validate that you can identify security vulnerabilities and remediate them throughout all of the phases of software development, from conception through to final product.

LEAD SECURITY KNOWLEDGEABLE CODING EXPERTS

Requiring that team members and applicants hold the Cyber Secure Coder certification ensures that they apply an approach that eliminates vulnerabilities and maintains secure software from initial design through to and after implementation

Benefits of Strong Cybersecurity in Coding

Building strong cybersecurity practices throughout the entire coding process has many benefits. Waiting until the final testing phase to find and remediate issues can be costly and lead to missed deadlines as well as a bad reputation.
Building protective measures into the entire development process avoids these pitfalls while also addressing privacy issues.

Get This course at N250,000
LIVE Instructor
June 29th - July 1st, 2023. 9:00am - 5:00pm
Registration Form

This course includes:

  • 3-day instructor-led training
  • Courseware
  • Exam Voucher
  • Laboratory
...Train developers at least annually in up-to-date , secure coding techniques, including how to avoid common coding vulnerabilities. - PCI DSS Requirement

Audience

CSC is designed for software development professionals who are required to design and develop highly secure applications, using any programming language or platform, for business use.
CSC also maps to the NICE Cybersecurity Workforce Framework job roles: Software Developer (SP-DEV-001) and Secure Software Assessor (SP-DEV-002).

Certification

The Value of Certification

Secure Coding Training

CertNexus Cyber Secure Coder is the premier certification for those who desire to effectively address security issues as in the creation of software. Utilizing two universal languages – Python and Java Script – CertNexus CSC training teaches the key concepts needed and includes hands-on activities to reinforce these practices.

About CSC 210

The CertNexus Cyber Secure Coder™ exam will certify that the successful candidate has the knowledge, skills, and abilities to design and develop a variety of applications for various platforms, analyze security concerns outside of specific languages and platforms, use a number of testing and analysis tools, and mitigate against common threats to data and systems.

Exam

  • Exam Code: CSC 210
  • Number of Items: 80 questions
  • Passing Score: 60%
  • Duration: 120 minutes
  • Exam Options: In person /virtual at Pearson VUE test centers
  • Item Formats: Multiple Choice/Multiple Response

Laboratory

Hands-on activities to demonstrate concepts utilizing two universal languages Python and Java Script. Developers who use alternate languages will be able apply the principles from the activities to any coding languages You will have 180 Days Access to Virtual Lab.

Recommended Experience

This course presents secure programming concepts that apply to many different types of software development projects. Although this course uses Python®, HTML, and JavaScript® to demonstrate various programming concepts, you do not need to have experience in these languages to benefit from this course. However, you should have some programming experience, whether it be developing desktop, mobile, web, or cloud applications.

Course Outline

  • Topic A: Identify Security Requirements and Expectations
  • Topic B: Identify Factors That Undermine Software Security
  • Topic C: Find Vulnerabilities in Your Software
  • Topic D: Gather Intelligence on Vulnerabilities and Exploits

  • Topic A: Handle Vulnerabilities Due to Software Defects and Misconfiguration
  • Topic B: Handle Vulnerabilities Due to Human Factors
  • Topic C: Handle Vulnerabilities Due to Process Shortcomings

  • Topic A: Apply General Principles for Secure Design
  • Topic B: Design Software to Counter Specific Threats

  • Topic A: Follow Best Practices for Secure Coding
  • Topic B: Prevent Platform Vulnerabilities
  • Topic C: Prevent Privacy Vulnerabilities

  • Topic A: Limit Access Using Login and User Roles
  • Topic B: Protect Data in Transit and At Rest
  • Topic C: Implement Error Handling and Logging
  • Topic D: Protect Sensitive Data and Functions
  • Topic E: Protect Database Access

  • Topic A: Perform Security Testing
  • Topic B: Analyze Code to find Security Problems
  • Topic C: Use Automated Testing Tools to Find Security Problems

  • Topic A: Monitor and Log Applications to Support Security
  • Topic B: Maintain Security after Deployment

Appendix A: Mapping Course Content to Cyber Secure Coder (Exam CSC-210)

Contact

5, Ogunsiji Close, By Adeboye Solanke Avenue, Off Allen Avenue, Ikeja (101233), Lagos, Nigeria