Cyber Secure Coder (CSC-110)

Security-Focused Programming9 H 57 M

Just you? Training a whole team? There's an ITProTV plan that fits.

Start Training Today
This course has a practice test
  • Security in Software
    • Overview
    • Prior Knowledge and Expectations
    • Gather Software Requirements
    • Assignment: Identity Requirements
    • Activity: Identify Requirements
    • Factors that Undermine Software Security
    • Software Vulnerabilities and Attack Phases
    • Attack Patterns
    • Assignment: Find Vulnerabilities
    • Activity: Find Vulnerabilities
    • Assignment: New Password Requirements
    • Activity: New Password Requirements
    • Assignment: Hashing Passwords
    • Activity: Hashing Passwords
    • Vulnerability Intelligence
    • Assignment: Vulnerability Search
    • Activity: Vulnerability Search
  • Handling Vulnerabilities
    • Bugs in Software
    • External Libraries and Services
    • Handling Errors Securely
    • Human-Related Security
    • Security Requirements and Design
    • Security Through the Software Lifecycle
    • Assignment: Exploring Leftover Artifacts
    • Activity: Exploring Leftover Artifacts
  • Designing for Security
    • Principles of Secure Design
    • Avoid Common Mistakes
    • Assignment: Common Security Design Flaws
    • Activity: Common Security Design Flaws
    • Understand Risk and Threats
    • Risk Response Strategies
    • Exploit Countermeasures
  • Developing Secure Code
    • Guidelines for Secure Coding
    • Buffer Overflows and Prevention
    • Race Conditions
    • Assignment Using Locks Remediate Race Condition
    • Activity Using Locks to Remediate Race Condition
    • OWASP Top Ten Platform Vulnerabilities
    • Web Application Vulnerabilities Deep Dive
    • Mobile Application Vulnerabilities Deep Dive
    • IoT Vulnerabilities Deep Dive
    • Desktop Vulnerabilities Deep Dive
    • Privacy Vulnerability Defects
  • Implementing Common Protections
    • Secure Session Management
    • Users, Protections and Passwords
    • Encryption and Data Protections
    • Error Handling and Protections
  • Testing and Maintaining Software Security
    • Testing Software for Security
    • Monitoring and Logging of Production Applications


4 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description

Cyber Secure Coder will aid in developing an appropriate understanding of secure development practices and how those practices protect against various types of vulnerabilities. You will learn the types of vulnerabilities, the exploits that can occur from those vulnerabilities, and the programming practices that will help prevent exploitation in an application.

Start training today

Just you? Check out our personal plans


$529 per seat/per year


Total seats


$349 per seat/per year


Total seats

Credit card required

This is for your account.
This is for your account.
We will contact you with this phone number about your trial.
We will contact you with this email about your trial.
What is the name of your company?
In which country is your company located?

Step 1 of 2

Get a demo or a start a team trial