Login     Signup
   info@zetlantechnologies.com        +91-8680961847

  /   CertNexus Certification   /   Cyber Secure Coder

Cyber Secure Coder

CertNexus Cyber Secure Coder™ (CSC) is the comprehensive certification for validating secure coding practices – for all developers, in all programming languages, on all platforms. CertNexus CSC certification has been DoDD 8140 approved for use.



Cyber Secure Coder

CertNexus Cyber Secure Coder™ (CSC) is the comprehensive certification for validating secure coding practices – for all developers, in all programming languages, on all platforms. CertNexus CSC certification has been DoDD 8140 approved for use.

Secure Coder Jobs



  • Lead Developer
  • Jr. Programmer
  • Application Tester/QA Tester
  • Software Designer/Architect





CSC Exam Details

The CertNexus Cyber Secure Coder™ exam will certify that the successful candidate has the knowledge, skills, and abilities to design and develop a variety of applications for various platforms, analyze security concerns outside of specific languages and platforms, use a number of testing and analysis tools, and mitigate against common threats to data and systems.



TARGET CANDIDATE

Software developers, testers, and architects who develop in multiple programming languages for any type of platform who desire or are required to develop highly protected applications for business and organizational use.

EXAM CODES

CSC-210


LAUNCH DATE

March 2020


SUNSET DATE

TBD


EXAM DURATION

120 minutes (including 5 minutes for Candidate Agreement and 5 minutes for Pearson VUE tutorial)

PASSING SCORE

60%


NUMBER OF ITEMS

80


ITEM FORMATS

Multiple Choice/Multiple Response


EXAM OPTIONS

In person at Pearson VUE test centers or online via Pearson OnVUE online proctoring







Why Get Cybersecurity Coding Certified?

Developers are tasked with ensuring that the software that they create includes coding that results in protected applications. Specialists holding the Cyber Secure Coder certification have proven that they can follow safe practices throughout the creative process.

PROVE YOUR SKILLS

Validate that you can identify security vulnerabilities and remediate them throughout all of the phases of software development, from conception through to final product.

LEAD SECURITY KNOWLEDGEABLE CODING EXPERTS

Requiring that team members and applicants hold the Cyber Secure Coder certification ensures that they apply an approach that eliminates vulnerabilities and maintains secure software from initial design through to and after implementation.






Secure Coding Training


CertNexus Cyber Secure Coder is the premier certification for those who desire to effectively address security issues as in the creation of software. Utilizing two universal languages – Python and Java Script – CertNexus CSC training teaches the key concepts needed and includes hands-on activities to reinforce these practices.







Course Details

1. Common Secure Application Development Terminology

  • Understand basic security principles
    • Encryption
    • Division of resources/categorization of components
    • The CIA Triad
    • AAA
    • Least privilege
    • Least common mechanism
    • Defense in Depth
    • Fail safe
    • Weakest link
    • Separation of duties
    • Monitoring
  • Identify common hacking terminology and concepts
    • Black hat, gray hat, white hat
    • Builders and breakers
    • Social engineering
    • Vulnerability
    • Exploits and attacks

  • Explain the software development lifecycle
    • SDLC phases
    • Secure SDLC
  • Understand the role of the designer/architect in creating secure applications
    • Design deliverables
    • Whiteboarding
    • Compliance assurance and adherence to organizational requirements
  • Explain the role of the developer in creating secure applications
    • Development deliverables
    • Debugging tools
    • Use of standard libraries and APIs
  • Understand the role of the code reviewer in creating secure applications
    • Review deliverables
    • Static analysis tools
    • Dynamic code analysis tools
  • Understand the role of the application tester in creating secure applications
    • Testing deliverables
    • Penetration testing

  • Interpret use and abuse cases
    • Design intentions
    • Attacks
  • Understand architecture and design industry best practices
    • Modular design
    • Design methodologies
    • Software design patterns
    • Security design patterns
    • Requiring strong passwords
    • Identity management process
    • Design of monitoring/logging system
  • Identify common regulations that relate to secure software development
    • HIPAA
    • PCI DSS
    • ISO 27001
    • SOX
    • Country-specific privacy laws
  • Explain the importance of organizational requirements to the development of secure software applications
    • Internal organizational processes
    • Internal organizational policies

  • Classify common threats and vulnerabilities in terms of their impact on applications
    • OWASP Top 10
    • CWE/SANS Top 25
    • Attack vectors
    • Assets
    • Risks
    • Threat types
    • Countermeasures
    • Impacts
    • Probability
  • Compare and contrast common risk assessment and management best practices
    • Quantitative risk assessment
    • Qualitative risk assessment
    • Policy adjustments/updates
    • Architectural review

  • Implement input validation
    • Input vulnerabilities
    • Input validation techniques
  • Restrict the output of sensitive data
    • Output vulnerability
    • Output security techniques
  • Implement cryptography
    • Crypto libraries
    • Key management
    • Algorithm implementation
    • Secure storage of data
  • Implement authentication and access control
    • Password verification
    • Roles, permissions, groups
    • Implementation of secure session management
    • Account lockouts
    • Password recovery
  • Implement error handling and logging
    • Error message logging
    • Security exception logging
    • Log centralization
  • Implement communication security
    • SSL/TLS
    • Encrypted tunnels
    • Mobile app considerations
    • IoT app considerations
    • Security of web services
  • Implement application security parameters and configure security settings
    • Parameterizing security properties and settings
    • Configuration file protection
    • Default passwords on third-party applications
  • Implement secure database access
    • Elimination of string concatenation for database queries
    • Database connection access control


Fees Structure : 22500 INR / 270 USD
Total No of Class : 58 Video Class
Class Duration : 70:30 Working Hours
Download Feature : Download Avalable
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Brochure       Buy Now       Sample Demo

Fees Structure : 30500 INR / 365 USD
Class Duration : 60 Days
Class Recording : Live Class Recording available
Class Time : Monday to Firday 1.5 hours per day / Weekend 3 Hours per day
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Download Brochure       Pay Online