Certification
Secure Coding Training
CertNexus Cyber Secure Coder is the premier certification for those who desire to effectively address security issues as in the creation of software. Utilizing two universal languages – Python and Java Script – CertNexus CSC training teaches the key concepts needed and includes hands-on activities to reinforce these practices.
About CSC 210
The CertNexus Cyber Secure Coder™ exam will certify that the successful candidate has the knowledge, skills, and abilities to design and develop a variety of applications for various platforms, analyze security concerns outside of specific languages and platforms, use a number of testing and analysis tools, and mitigate against common threats to data and systems.
Exam
- Exam Code: CSC 210
- Number of Items: 80 questions
- Passing Score: 60%
- Duration: 120 minutes
- Exam Options: In person /virtual at Pearson VUE test centers
- Item Formats: Multiple Choice/Multiple Response
Laboratory
Hands-on activities to demonstrate concepts utilizing two universal languages Python and Java Script. Developers who use alternate languages will be able apply the principles from the activities to any coding languages You will have 180 Days Access to Virtual Lab.
Recommended Experience
This course presents secure programming concepts that apply to many different types of software development projects. Although this course uses Python®, HTML, and JavaScript® to demonstrate various programming concepts, you do not need to have experience in these languages to benefit from this course. However, you should have some programming experience, whether it be developing desktop, mobile, web, or cloud applications.
Course Outline
- Topic A: Identify Security Requirements and Expectations
- Topic B: Identify Factors That Undermine Software Security
- Topic C: Find Vulnerabilities in Your Software
- Topic D: Gather Intelligence on Vulnerabilities and Exploits
- Topic A: Handle Vulnerabilities Due to Software Defects and Misconfiguration
- Topic B: Handle Vulnerabilities Due to Human Factors
- Topic C: Handle Vulnerabilities Due to Process Shortcomings
- Topic A: Apply General Principles for Secure Design
- Topic B: Design Software to Counter Specific Threats
- Topic A: Follow Best Practices for Secure Coding
- Topic B: Prevent Platform Vulnerabilities
- Topic C: Prevent Privacy Vulnerabilities
- Topic A: Limit Access Using Login and User Roles
- Topic B: Protect Data in Transit and At Rest
- Topic C: Implement Error Handling and Logging
- Topic D: Protect Sensitive Data and Functions
- Topic E: Protect Database Access
- Topic A: Perform Security Testing
- Topic B: Analyze Code to find Security Problems
- Topic C: Use Automated Testing Tools to Find Security Problems
- Topic A: Monitor and Log Applications to Support Security
- Topic B: Maintain Security after Deployment
Appendix A: Mapping Course Content to Cyber Secure Coder (Exam CSC-210)