• Online, Self-Paced
Course Description

Most no-code/low-code platforms leverage connections as first-class objects. This means connections between applications, other users, or entire organizations. Applications can also be shared with users who should not have access to their underlying data. This course is designed to educate NICE Workforce's Software Developer, Cyber Defense Infrastructure Support Specialist, Vulnerability Assessment Analyst, and Systems Requirements Planner roles to mitigate the risks associated with LCNC Authorization Misuse.

Learning Objectives

Upon successful completion of this course, learners should have the knowledge and skills to:

  • Understand how to disable or monitor the use of implicitly shared connections
  • Carefully review the scope an application requires and adhere to the principle of least privilege
  • Properly provide access to environments that can contain shared connections
  • Monitor no-code/low-code platforms for over-shared connections
  • Educate business users on the risks of connection sharing and its relation to credential sharing
  • Explicitly refresh OAuth tokens on a regular basis by re-authenticating connections

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Vulnerability Assessment and Management
  • Software Development
  • Systems Requirements Planning

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.