• Online, Instructor-Led
Course Description

Software Security Training course introduces you to a variety of topics in software security, secure software development, and secure coding. Other topics such as secure programming techniques, trusted computing infrastructure, low level software attacks, wen security, risk management techniques, symbolic execution, and cloud/wireless/mobile device security. By the advent of computing systems which are an essential part of our daily lives, one should be able to rely on the integrity of the system and the information should be kept confidential.

Tonex software security training will also help you learn about the software security attacks such as buffer overflow, data-only attacks or non-executable data attacks. Furthermore, understand the importance of web security issues, malicious websites, and denial of service attacks. You also will learn about the main principles for secure design, open design, and risk management policies in software design. Learn to differentiate the reactive and proactive risk management techniques, interpret the statistical control charts in statistical analysis, and symbolic execution in software security. Trainees also will finish this seminar with sufficient knowledge about the penetration testing and its tools, cloud security applications and modules, and methods of data security and privacy.

Learning Objectives

  • Understand fundamental concepts of software security.
  • Identify common vulnerabilities and threats in software applications.
  • Implement secure coding practices to mitigate security risks.
  • Learn techniques for secure data storage and transmission.
  • Explore authentication and authorization mechanisms for secure access.
  • Conduct security assessments and penetration testing.
  • Understand the principles of secure software development lifecycle (SDLC).
  • Explore cryptography and its role in software security.
  • Develop skills in incident response and handling security incidents.
  • Stay updated on emerging trends and best practices in software security.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@hq.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.