Go to Course: https://www.coursera.org/learn/packt-secure-software-development-1o6mn
Apply secure coding standards to reduce vulnerabilities at the source-code level.
Conduct comprehensive application security testing and manage post-deployment risks effectively.
Implement auditing, logging, and change management processes to ensure secure software development and maintenance.
Assess the security of third-party, open-source, and cloud-based software to identify and mitigate potential risks.
Secure Software Development Lifecycle and Methodologies
This module focuses on the integration of security into the Software Development Life Cycle (SDLC) and selecting appropriate development methodologies. Learners will explore how to choose secure software development methods, including both process-driven and agile-based approaches. This module will also cover frameworks such as Capability Maturity Model (CMM) and SAMM, and the role of Integrated Product Teams (IPT) in improving the quality and security of software products. By mastering these concepts, learners will be able to implement secure practices throughout the development lifecycle.
Secure Coding, Testing, and Risk ManagementThis module emphasizes secure coding practices, software configuration management, and application security testing within the SDLC. Learners will delve into risk analysis, mitigating programming language risks, and evaluating security in various software environments, including third-party, open-source, and cloud-based software. The module also covers API security, auditing, and logging of software changes. By mastering these areas, learners will be able to develop, deploy, and maintain secure software while managing associated risks.
This comprehensive course on Secure Software Development is designed to help IT professionals integrate security at every stage of the Software Development Life Cycle (SDLC), following the CISSP curriculum. The course starts with an introduction to security considerations in software development and how to choose the appropriate development methodology, including process-driven and agile-based approaches. You’ll explore the use of security controls, risk analysis, and methodologies such as the C