Companies Home Search Profile

Cert Prep: Cyber Secure Coder (CSC-110)

Focused View

9:57:29

86 View
  • 01.01-overview.mp4
    04:20
  • 02.01-prior_knowledge_and_expectations.mp4
    04:50
  • 02.02-gather_software_requirements.mp4
    13:17
  • 02.03-challenge_identity_requirements.mp4
    02:06
  • 02.04-solution_identify_requirements.mp4
    08:18
  • 02.05-factors_that_undermine_software_security.mp4
    10:39
  • 02.06-software_vulnerabilities_and_attack_phases.mp4
    09:38
  • 02.07-attack_patterns.mp4
    19:18
  • 02.08-challenge_find_vulnerabilities.mp4
    03:08
  • 02.09-solution_find_vulnerabilities.mp4
    10:18
  • 02.10-challenge_new_password_requirements.mp4
    03:12
  • 02.11-solution_new_password_requirements.mp4
    09:22
  • 02.12-challenge_hashing_passwords.mp4
    03:42
  • 02.13-solution_hashing_passwords.mp4
    19:01
  • 02.14-vulnerability_intelligence.mp4
    13:13
  • 02.15-challenge_vulnerability_search.mp4
    04:02
  • 02.16-solution_vulnerability_search.mp4
    15:31
  • 03.01-bugs_in_software.mp4
    14:11
  • 03.02-external_libraries_and_services.mp4
    16:44
  • 03.03-handling_errors_securely.mp4
    17:28
  • 03.04-human-related_security.mp4
    15:39
  • 03.05-security_requirements_and_design.mp4
    10:34
  • 03.06-security_through_the_software_lifecycle.mp4
    17:00
  • 03.07-challenge_exploring_leftover_artifacts.mp4
    02:07
  • 03.08-solution_exploring_leftover_artifacts.mp4
    14:01
  • 04.01-principles_of_secure_design.mp4
    13:26
  • 04.02-avoid_common_mistakes.mp4
    16:06
  • 04.03-challenge_common_security_design_flaws.mp4
    04:25
  • 04.04-solution_common_security_design_flaws.mp4
    16:19
  • 04.05-understand_risk_and_threats.mp4
    13:06
  • 04.06-risk_response_strategies.mp4
    12:30
  • 04.07-exploit_countermeasures.mp4
    13:57
  • 05.01-guidelines_for_secure_coding.mp4
    14:17
  • 05.02-buffer_overflows_and_prevention.mp4
    13:08
  • 05.03-race_conditions.mp4
    10:09
  • 05.04-challenge_use_locks_to_remediate_race_condition.mp4
    05:54
  • 05.05-solution_use_locks_to_remediate_race_condition.mp4
    08:52
  • 05.06-owasp_top_ten_platform_vulnerabilities.mp4
    10:28
  • 05.07-web_application_vulnerabilities_deep_dive.mp4
    16:50
  • 05.08-mobile_application_vulnerabilities_deep_dive.mp4
    16:17
  • 05.09-iot_vulnerabilities_deep_dive.mp4
    19:00
  • 05.10-desktop_vulnerabilities_deep_dive.mp4
    13:37
  • 05.11-privacy_vulnerability_defects.mp4
    20:41
  • 06.01-secure_session_management.mp4
    12:12
  • 06.02-users_protections_and_passwords.mp4
    16:42
  • 06.03-encryption_and_data_protections.mp4
    17:01
  • 06.04-error_handling_and_protections.mp4
    13:30
  • 07.01-testing_software_for_security.mp4
    22:34
  • 07.02-monitoring_and_logging_of_production_applications.mp4
    14:49
  • Description


    Getting certified by CertNexus as a Cyber Secure Coder validates your ability to design and manage highly secure professional applications. For all developers, in all programming languages, and on every possible platform, the CSC-110 certification has the power to boost your coding career. In this course from ITProTV, learn the skills you need to know to prepare for and tackle the Cyber Secure Coder (CSC-110) certification exam.

    Develop your understanding of how secure coding practices can protect your organization against various types of vulnerabilities. Learn how to identify and minimize software and security vulnerabilities, handle exploits and attacks as they occur, and develop secure code and programming practices that can help prevent exploitation in an application. Along the way, get tips on common protection tools and testing techniques for ongoing maintenance.

    Note: This course was created by ITProTV. We are pleased to host this content in our library.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 49
    • duration 9:57:29
    • Release Date 2023/01/31