Cisco-opplæring

Insoft Services er en av få opplæringsleverandører i EMEAR som tilbyr hele spekteret av Cisco-sertifisering og spesialisert teknologiopplæring.

Les mer

Cisco Sertifisering

Opplev en blandet læringstilnærming som kombinerer det beste av instruktørledet opplæring og e-læring i eget tempo for å hjelpe deg med å forberede deg til sertifiseringseksamen.

Les mer

Cisco Learning Credits

Cisco Learning Credits (CLC) er forhåndsbetalte opplæringskuponger innløst direkte med Cisco som gjør planleggingen for suksessen din enklere når du kjøper Cisco-produkter og -tjenester.

Les mer

Etterutdanning

Cisco Continuing Education Program tilbyr alle aktive sertifiseringsinnehavere fleksible alternativer for å resertifisere ved å fullføre en rekke kvalifiserte opplæringselementer.

Les mer

Cisco Digital Learning

Sertifiserte ansatte er verdsatte eiendeler. Utforsk Ciscos offisielle digitale læringsbibliotek for å utdanne deg gjennom innspilte økter.

Les mer

Cisco Business Enablement

Cisco Business Enablement Partner Program fokuserer på å skjerpe forretningsferdighetene til Cisco Channel Partners og kunder.

Les mer

Cisco opplæringskatalog

Les mer

Fortinet Sertifisering

Fortinet Network Security Expert (NSE)-programmet er et opplærings- og sertifiseringsprogram på åtte nivåer for å lære ingeniører om nettverkssikkerheten for Fortinet FW-ferdigheter og -erfaring.

Tekniske kurs

Fortinet-opplæring

Insoft er anerkjent som Fortinet Autorisert Opplæringssenter på utvalgte steder i EMEA.

Les mer

Fortinet opplæringskatalog

Utforsk et bredt utvalg av Fortinet Schedule på tvers av forskjellige land så vel som online kurs.

Les mer

ATC-status

Sjekk atc-statusen vår på tvers av utvalgte land i Europa.

Les mer

Pakker for Fortinet-tjenester

Insoft Services har utviklet en spesifikk løsning for å effektivisere og forenkle prosessen med å installere eller migrere til Fortinet-produkter.

Les mer

Microsoft-opplæring

Insoft Services gir Microsoft opplæring i EMEAR. Vi tilbyr Microsofts tekniske opplærings- og sertifiseringskurs som ledes av instruktører i verdensklasse.

Tekniske kurs

Extreme-opplæring

Lær eksepsjonell kunnskap og ferdigheter i ekstreme nettverk.

Les mer

Teknisk sertifisering

Vi tilbyr omfattende læreplan over tekniske kompetanseferdigheter om sertifiseringsprestasjonen.

Les mer

Extreme opplæringskatalog

Tekniske kurs

ATP-akkreditering

Som autorisert opplæringspartner (ATP) sørger Insoft Services for at du får de høyeste utdanningsstandardene som er tilgjengelige.

Les mer

Løsninger og tjenester

Vi tilbyr innovativ og avansert støtte for design, implementering og optimalisering av IT-løsninger. Vår kundebase inkluderer noen av de største Telcos globalt.

Les mer

Globalt anerkjent team av sertifiserte eksperter hjelper deg med å gjøre en jevnere overgang med våre forhåndsdefinerte konsulent-, installasjons- og migrasjonspakker for et bredt spekter av Fortinet-produkter.

Om oss

Insoft Tilbyr autoriserte opplærings- og konsulenttjenester for utvalgte IP-leverandører. Finn ut hvordan vi revolusjonerer bransjen.

Les mer
  • +47 23 96 21 03
  • Cyber Secure Coder

    Duration
    3 Dager
    Delivery
    (Online Og På stedet)
    Price
    Pris på forespørsel

    The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle.

     

    This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development.

    In this course, you will employ best practices in software development to develop secure software.

    You will:

    • Identify the need for security in your software projects.
    • Eliminate vulnerabilities within software.
    • Use a Security by Design approach to design a secure architecture for your software.
    • Implement common protections to protect users and data.
    • Apply various testing methods to find and correct security defects in your software.
    • Maintain deployed software to ensure ongoing security.

    Lesson 1: Identifying the Need for Security in Your Software Projects

    • Topic A: Identify Security Requirements and Expectations
    • Topic B: Identify Factors That Undermine Software Security
    • Topic C: Find Vulnerabilities in Your Software
    • Topic D: Gather Intelligence on Vulnerabilities and Exploits

    Lesson 2: Handling Vulnerabilities

    • Topic A: Handle Vulnerabilities Due to Software Defects and Misconfiguration
    • Topic B: Handle Vulnerabilities Due to Human Factors
    • Topic C: Handle Vulnerabilities Due to Process Shortcomings

    Lesson 3: Designing for Security

    • Topic A: Apply General Principles for Secure Design
    • Topic B: Design Software to Counter Specific Threats

    Lesson 4: Developing Secure Code

    • Topic A: Follow Best Practices for Secure Coding
    • Topic B: Prevent Platform Vulnerabilities
    • Topic C: Prevent Privacy Vulnerabilities

    Lesson 5: Implementing Common Protections

    • Topic A: Limit Access Using Login and User Roles
    • Topic B: Protect Data in Transit and At Rest
    • Topic C: Implement Error Handling and Logging
    • Topic D: Protect Sensitive Data and Functions
    • Topic E: Protect Database Access

    Lesson 6: Testing Software Security

    • Topic A: Perform Security Testing
    • Topic B: Analyze Code to find Security Problems
    • Topic C: Use Automated Testing Tools to Find Security Problems

    Lesson 7: Maintaining Security in Deployed Software

    • Topic A: Monitor and Log Applications to Support Security
    • Topic B: Maintain Security after Deployment

     

    Appendix A: Mapping Course Content to Cyber Secure Coder (Exam CSC-210)

    This course is designed for software developers, testers, and architects who design and develop software in various programming languages and platforms, including desktop, web, cloud, and mobile, and who want to improve their ability to deliver software that is of high quality, particularly regarding security and privacy.

     

    This course is also designed for students who are seeking the CertNexus Cyber Secure Coder (CSC) Exam CSC-210 certification.

    This course presents secure programming concepts that apply to many different types of software development projects. Although this course uses Python®, HTML, and JavaScript® to demonstrate various programming concepts, you do not need to have experience in these languages to benefit from this course. However, you should have some programming experience, whether it be developing desktop, mobile, web, or cloud applications. Logical Operations provides a variety of courses covering software development that you might use to prepare for this course:

    • Python® Programming: Introduction
    • Python® Programming: Advanced
    • HTML5: Content Authoring with New and Advanced Features
    • SQL Querying: Fundamentals (Second Edition)

    The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle.

     

    This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development.

    In this course, you will employ best practices in software development to develop secure software.

    You will:

    • Identify the need for security in your software projects.
    • Eliminate vulnerabilities within software.
    • Use a Security by Design approach to design a secure architecture for your software.
    • Implement common protections to protect users and data.
    • Apply various testing methods to find and correct security defects in your software.
    • Maintain deployed software to ensure ongoing security.

    Lesson 1: Identifying the Need for Security in Your Software Projects

    • Topic A: Identify Security Requirements and Expectations
    • Topic B: Identify Factors That Undermine Software Security
    • Topic C: Find Vulnerabilities in Your Software
    • Topic D: Gather Intelligence on Vulnerabilities and Exploits

    Lesson 2: Handling Vulnerabilities

    • Topic A: Handle Vulnerabilities Due to Software Defects and Misconfiguration
    • Topic B: Handle Vulnerabilities Due to Human Factors
    • Topic C: Handle Vulnerabilities Due to Process Shortcomings

    Lesson 3: Designing for Security

    • Topic A: Apply General Principles for Secure Design
    • Topic B: Design Software to Counter Specific Threats

    Lesson 4: Developing Secure Code

    • Topic A: Follow Best Practices for Secure Coding
    • Topic B: Prevent Platform Vulnerabilities
    • Topic C: Prevent Privacy Vulnerabilities

    Lesson 5: Implementing Common Protections

    • Topic A: Limit Access Using Login and User Roles
    • Topic B: Protect Data in Transit and At Rest
    • Topic C: Implement Error Handling and Logging
    • Topic D: Protect Sensitive Data and Functions
    • Topic E: Protect Database Access

    Lesson 6: Testing Software Security

    • Topic A: Perform Security Testing
    • Topic B: Analyze Code to find Security Problems
    • Topic C: Use Automated Testing Tools to Find Security Problems

    Lesson 7: Maintaining Security in Deployed Software

    • Topic A: Monitor and Log Applications to Support Security
    • Topic B: Maintain Security after Deployment

     

    Appendix A: Mapping Course Content to Cyber Secure Coder (Exam CSC-210)

    This course is designed for software developers, testers, and architects who design and develop software in various programming languages and platforms, including desktop, web, cloud, and mobile, and who want to improve their ability to deliver software that is of high quality, particularly regarding security and privacy.

     

    This course is also designed for students who are seeking the CertNexus Cyber Secure Coder (CSC) Exam CSC-210 certification.

    This course presents secure programming concepts that apply to many different types of software development projects. Although this course uses Python®, HTML, and JavaScript® to demonstrate various programming concepts, you do not need to have experience in these languages to benefit from this course. However, you should have some programming experience, whether it be developing desktop, mobile, web, or cloud applications. Logical Operations provides a variety of courses covering software development that you might use to prepare for this course:

    • Python® Programming: Introduction
    • Python® Programming: Advanced
    • HTML5: Content Authoring with New and Advanced Features
    • SQL Querying: Fundamentals (Second Edition)

      Datoer
      Date on Request

    Follow Up Courses

    Filtrer
    • 5 Dager
      Date on Request
      Price on Request
      Book Now
    • 1 Dag
      Date on Request
      Price on Request
      Book Now
    • 5 Dager
      Date on Request
      Price on Request
      Book Now
    • 1 Dag
      Date on Request
      Price on Request
      Book Now
    • 3 Dager
      Date on Request
      Price on Request
      Book Now
    • 3 Dager
      Date on Request
      Price on Request
      Book Now
    • 1 Dag
      Date on Request
      Price on Request
      Book Now
    • 1 Dag
      Date on Request
      Price on Request
      Book Now
    • 1 Dag
      Date on Request
      Price on Request
      Book Now
    • 3 Dager
      Date on Request
      Price on Request
      Book Now

    Know someone who´d be interested in this course?
    Let them know...

    Use the hashtag #InsoftLearning to talk about this course and find students like you on social media.