CertNexus Certified Cyber Secure Coder®

(CSC-210.AK1) / ISBN : 978-1-64459-217-5
This course includes
Lessons
TestPrep
Hands-On Labs
AI Tutor (Add-on)
224 Review
Get A Free Trial

About This Course

Gain hands-on experience to pass the CertNexus CSC-210 exam with the CertNexus Certified Cyber Secure Coder® course and lab. The lab is versatile and delivers hands-on experience, replacing expensive physical labs. The cybersecurity course and lab comprehensively cover the CSC-210 exam objectives and provide skills required to design and develop applications for various platforms and analyze security concerns outside of specific languages and platforms.

Skills You’ll Get

The CertNexus Certified Cyber Secure Coder® certification exam is ideal for software developers, testers, and architects responsible for developing highly secure applications for business and organizational use. The certification exam covers the common security application development terminology and concepts along with the job and process responsibilities related to secure application development.

Get the support you need. Enroll in our Instructor-Led Course.

Lessons

8+ Lessons | 56+ Quizzes | 116+ Flashcards | 116+ Glossary of terms

TestPrep

60+ Pre Assessment Questions | 2+ Full Length Tests | 60+ Post Assessment Questions | 120+ Practice Test Questions

Hands-On Labs

23+ LiveLab | 00+ Minutes

1

Introduction

  • Course Description
  • How to Use This Course?
  • Course-Specific Technical Requirements
  • Install the Course Data Files
2

Identifying the Need for Security in Your Software Projects

  • TOPIC A: Identify Security Requirements and Expectations
  • TOPIC B: Identify Factors That Undermine Software Security
  • TOPIC C: Find Vulnerabilities in Your Software
  • TOPIC D: Gather Intelligence on Vulnerabilities and Exploits
3

Handling Vulnerabilities

  • TOPIC A: Handle Vulnerabilities Due to Software Defects and Misconfiguration
  • TOPIC B: Handle Vulnerabilities Due to Human Factors
  • TOPIC C: Handle Vulnerabilities Due to Process Shortcomings
4

Designing for Security

  • TOPIC A: Apply General Principles for Secure Design
  • TOPIC B: Design Software to Counter Specific Threats
5

Developing Secure Code

  • TOPIC A: Follow Best Practices for Secure Coding
  • TOPIC B: Prevent Platform Vulnerabilities
  • TOPIC C: Prevent Privacy Vulnerabilities
6

Implementing Common Protections

  • TOPIC A: Limit Access Using Login and User Roles
  • TOPIC B: Protect Data in Transit and At Rest
  • TOPIC C: Implement Error Handling and Logging
  • TOPIC D: Protect Sensitive Data and Functions
  • TOPIC E: Protect Database Access
7

Testing Software Security

  • TOPIC A: Perform Security Testing
  • TOPIC B: Analyze Code to Find Security Problems
  • TOPIC C: Use Automated Testing Tools to Find Security Problems
8

Maintaining Security in Deployed Software

  • TOPIC A: Monitor and Log Applications to Support Security
  • TOPIC B: Maintain Security After Deployment

1

Identifying the Need for Security in Your Software Projects

  • Identifying Vulnerabilities in an Application
  • Cracking a Password Hash
  • Fixing a Password Hash Vulnerability
2

Handling Vulnerabilities

  • Identifying Vulnerabilities in a Software Project
  • Examining the Project Files
  • Identifying Software Defects and Misconfiguration
  • Managing People Risks
  • Managing Software Development Process Risks
3

Designing for Security

  • Designing for Security
4

Developing Secure Code

  • Performing a Memory-Based Attack
  • Finding Common Web Vulnerabilities
  • Handling Privacy Defects
5

Implementing Common Protections

  • Handling Authentication and Authorization Defects
  • Protecting Data in Transit and at Rest
  • Reviewing Error Handling
  • Improving Error Handling
  • Protecting Sensitive Data and Functions
  • Staging a Persisted XSS Attack on an Administrator Function
  • Protecting Database Access
6

Testing Software Security

  • Performing Manual Inspection and Review
  • Performing Code Analysis
  • Using a Test Suite to Automate Unit Testing
7

Maintaining Security in Deployed Software

  • Monitoring and Logging a Deployed Application

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact us now

There are no formal prerequisites for the certification exam.

No application fee

Multiple Choice/Multiple Response

The exam contains 80 questions.

120 minutes

70%

Any candidates who do not pass a CertNexus certification exam on the first attempt are eligible for one free retake after 30 calendar days from the time they took the initial exam. All CertNexus certification exam vouchers include one free retake. Candidates must purchase another voucher for any subsequent attempts beyond the first free retake.

TBD (Typically 3 years from Launch Date)

Related Courses

All Course
scroll to top