top of page

Related Courses

Cert Nexus CyberSecure Coder Video Training Course download

Cert Nexus CyberSecure Coder Video Training Course download

 

 

Duration : 12 Hours

Size: 14.1 GB (4 PART DOWNLOAD)

 

PART-01

 

005 - Introduction

006 - Identify Security Requirements and Expectations

007 - Activity - Identifying Security Requirements and Expectations

008 - Identify Factors that Undermine Software Security

009 - Identify Factors that Undermine Software Security, Part 2

010 - Find Vulnerabilities in Your Software

011 - Activity - Identifying Vulnerabilities in an Application

012 - Building and Breaking Passwords

013 - Activity - Adding a Security Feature to Your Code

014 - Activity - Protect Against a Poison Null Byte

015 - Activity - Hashing a Password

016 - Activity - Securing the Password Hash

017 - Activity - Saving Hashes for Future Use

018 - Activity - Validating a Password

019 - Activity - Having Fun With a Modern Hashing Algorithm

020 - Gather Intelligence on Vulnerabilities and Exploits

021 - Handle Vulnerabilities Due to Software Defects and Misconfiguration

022 - Handle Vulnerabilities Due to Software Defects and Misconfiguration, Part 2

023 - Handle Vulnerabilities Due to Software Defects and Misconfiguration, Part 3

024 - Activity Examining the Web App Functionality

025 - Activity Examining the Project Files for Security Concerns

026 - Handle Error Messaging

027 - Activity Identifying Software Defects and Misconfiguration

 

 

PART-02

 

028 - Handle Vulnerabilities Due to Human Factors

029 - Handle Vulnerabilities Due to Human Factors, Part 2

030 - Activity Managing People Risks

031 - Handle Vulnerabilities Due to Process Shortcomings

032 - Handle Vulnerabilities Due to Process Shortcomings, Part 2

033 - Handle Vulnerabilities Due to Process Shortcomings, Part 3

034 - Activity Managing Software Development Process Risks

035 - Apply General Principles for Secure Design

036 - Apply General Principles for Secure Design, Part 2

037 - Use Secure Design Patterns

038 - Activity Avoiding Common Security Design Flaws

039 - Design Software to Counter Specific Threats

040 - Design Software to Counter Specific Threats, Part 2

041 - Activity Identifying Threats and Countermeasures

042 - Follow Best Practices for Secure Coding

043 - Activity Researching Secure Coding Best Practices

044 - Prevent Memory Errors

045 - Prevent Memory Errors, Part 2

046 - Maintain Secure Formatting and Resource Access

 

 

PART-03

 

 

047 - Activity Preventing a Race Condition

048 - Prevent Privacy Vulnerabilities

049 - Activity Handling Privacy Defects

050 - Prevent Platform Vulnerabilities, Part 1

051 - Prevent Platform Vulnerabilities, Part 2

052 - Activity Staging an XSS Attack on the Web App

053 - Prevent Mobile Platform Vulnerabilities

054 - Prevent Mobile Platform Vulnerabilities, Part 2

055 - Prevent IoT Platform Vulnerabilities

056 - Prevent Desktop Platform Vulnerabilities

057 - Limit Access Using Session Control

058 - Limit Access Using Session Control, Part 2

059 - Activity Handling Authentication and Authorization Defects

060 - Limit Access with User Accounts

061 - Protect Data with Cryptography

062 - Activity Having Fun with Symmetric Encryption

063 - Activity Having Fun with Asymmetric Encryption

064 - Extend Cryptosystems with PKI

065 - Extend Cryptosystems with PKI, Part 2

 

 

PART-04

 

066 - Activity Protecting Data in Transit and at Rest

067 - Implement Error Handling and Logging

068 - Activity Reviewing Error Handling

069 - Activity Improving Error Handling

070 - Protect Sensitive Data and Functions, Part 1

071 - Protect Sensitive Data and Functions, Part 2

072 - Preparing Chrome to Tamper with a Website

073 - Activity Tampering with Website Data and Functions

074 - Protect Database Access

075 - Activity SQL Injection

076 - Activity SQL Injection, Part 2

077 - Perform Security Testing

078 - Analyze Code to Find Security Problems

079 - Activity Performing Code Analysis

080 - Use Automated Testing Tools to Find Security Problems

081 - Activity Using a Test Suite to Automate Unit Testing

082 - Monitor and Log Applications to Support Security

083 - Activity Monitoring and Logging a Deployed Application

084 - Maintain Security After Deployment

085 - Activity Analyzing Suspicious Binaries

086 - Course Summary

CSC-210 Lab Setup Guide.docx.pdf

CSC-210 Links.pdf

Lab Troubleshooting.docx.pdf

csclab.zip

Cert Nexus CyberSecure Coder Video Training Course download

SKU: EXT2021-0119
$1.00Price
  • You can Instant Download a PDF file 

    After successful payment , 

    This PDF File Contains Course Download links

    You can Download This Course immediately from click that Links.

bottom of page