Undergraduate Certificate in Secure Software Development Basics
-- ViewingNowThe Undergraduate Certificate in Secure Software Development Basics is a crucial course for those interested in creating safe and reliable software. In today's digital age, the demand for secure software developers is at an all-time high, with a <a href="https://www.
7,696+
Students enrolled
GBP £ 140
GBP £ 202
Save 44% with our special offer
ě´ ęłźě ě ëí´
100% ě¨ëźě¸
ě´ëěë íěľ
ęłľě ę°ëĽí ě¸ěŚě
LinkedIn íëĄíě ěśę°
ěëŁęšě§ 2ę°ě
죟 2-3ěę°
ě¸ě ë ěě
ë기 ę¸°ę° ěě
ęłźě ě¸ëśěŹí
⢠Secure Software Development Principles: This unit covers the fundamental principles of secure software development, including threat modeling, secure design patterns, and secure coding practices.
⢠Secure Coding Practices: This unit dives deeper into secure coding practices, covering common vulnerabilities such as SQL injection and cross-site scripting (XSS), and how to avoid them. It also covers best practices for input validation, output encoding, and error handling.
⢠Cryptography Basics: This unit covers the basics of cryptography, including symmetric and asymmetric encryption, hashing, and digital signatures. It also covers how to securely store and transmit sensitive data.
⢠Security Testing: This unit covers the basics of security testing, including how to perform static and dynamic application security testing (SAST and DAST), and how to interpret and act on the results.
⢠Access Control and Authentication: This unit covers the basics of access control and authentication, including authentication mechanisms such as multi-factor authentication (MFA), and authorization models such as role-based access control (RBAC).
⢠Secure Software Development Life Cycle (SDLC): This unit covers the secure software development life cycle (SDLC), including how to integrate security into each phase of the development process, from requirements gathering to deployment and maintenance. It also covers the importance of continuous integration and continuous delivery (CI/CD) in secure software development.
⢠Security Compliance and Standards: This unit covers the most common security compliance and standards, such as PCI-DSS, HIPAA, and GDPR, and how to ensure that your software development practices meet these requirements.
⢠Incident Response Planning: This unit covers the basics of incident response planning, including how to prepare for and respond to security incidents, and how to conduct a post-incident review to identify and address root causes.
⢠Cloud Security Considerations: This unit covers the unique security considerations for cloud-based applications, including how to securely configure
ę˛˝ë Ľ 경ëĄ
ě í ěęą´
- 죟ě ě ëí 기본 ě´í´
- ěě´ ě¸ě´ ëĽěë
- ěť´í¨í° ë° ě¸í°ëˇ ě ꡟ
- 기본 ěť´í¨í° 기ě
- ęłźě ěëŁě ëí íě
ěŹě ęłľě ěę˛Šě´ íěíě§ ěěľëë¤. ě ꡟěąě ěí´ ě¤ęłë ęłźě .
ęłźě ěí
ě´ ęłźě ě ę˛˝ë Ľ ę°ë°ě ěí ě¤ěŠě ě¸ ě§ěęłź 기ě ě ě ęłľíŠëë¤. ꡸ę˛ě:
- ě¸ě ë°ě 기ę´ě ěí´ ě¸ěŚëě§ ěě
- ęśíě´ ěë 기ę´ě ěí´ ęˇě ëě§ ěě
- ęłľě ě겊ě ëł´ěě
ęłźě ě ěąęłľě ěźëĄ ěëŁí늴 ěëŁ ě¸ěŚě뼟 ë°ę˛ ëŠëë¤.
ě ěŹëë¤ě´ ę˛˝ë Ľě ěí´ ě°ëŚŹëĽź ě ííëę°
댏롰 ëĄëŠ ě¤...
ě죟 돝ë ě§ëʏ
ě˝ě¤ ěę°ëŁ
- 죟 3-4ěę°
- 쥰기 ě¸ěŚě ë°°ěĄ
- ę°ë°Ší ëąëĄ - ě¸ě ë ě§ ěě
- 죟 2-3ěę°
- ě 기 ě¸ěŚě ë°°ěĄ
- ę°ë°Ší ëąëĄ - ě¸ě ë ě§ ěě
- ě 체 ě˝ě¤ ě ꡟ
- ëě§í¸ ě¸ěŚě
- ě˝ě¤ ěëŁ
ęłźě ě ëł´ ë°ę¸°
íěŹëĄ ě§ëś
ě´ ęłźě ě ëšěŠě ě§ëśí기 ěí´ íěŹëĽź ěí ě˛ęľŹě뼟 ěě˛íě¸ě.
ě˛ęľŹěëĄ ę˛°ě ę˛˝ë Ľ ě¸ěŚě íë