null

Building Secure Software

Learn how to design, develop, and deploy secure software

Next Steps:

Overview

Upcoming Course Dates & Locations: View Schedule

Type of Course: Classroom

Insecure software is one of the biggest threats organizations face today. As hackers turn their attention to the software and applications that make up an organization’s IT infrastructure, the best protection is building secure software at the onset.

Building secure software requires careful design, development, and deployment processes, and a fundamental understanding of the security mechanisms and techniques available. By eliminating potential security flaws early in the software development lifecycle, organizations eliminate significant remediation costs and reduce the risk to their critical digital assets.

What You'll Learn

Understand the process and concept of building secure software, including how to define and design secure software solutions (with an emphasis on web applications), select the appropriate techniques and technologies, and understand the underlying mechanisms that can be used as building blocks to successfully create secure software.

Students are presented with an overview of the fundamental concepts, techniques, and mechanisms involved with each stage of the software development lifecycle. Concepts are then reinforced with real-world examples and driven home with hands-on, practical lab exercises.

Why We Teach This Course

Implementing traditional security countermeasures is becoming less effective at protecting organizations’ critical assets. Flaws in poorly developed software are open invitations to malicious intruders who are adept at identifying programming flaws. Developers, project managers, and software architects must learn how to best build security into their software development processes.

Who Teaches this Course

Foundstone software security instructors are software developers who have performed hundreds of software audits and code reviews, and managed software security programs at major financial services companies. They have managed security programs at the Big Four accounting firms, the U.S. Air Force, and on Wall Street, and are frequent authors and public speakers.

Who Should Take this Course

This course is for software professionals who define, design, and architect solutions; managers of software development projects and teams; and auditors of application security.

Continuing Education Credits

This course qualifies for up to 32 hours of continuing professional education credits for Certified Information Systems Security Professional (CISSP)/Systems Security Certified Practitioner (SSCP).