Grootste online IT opleider

Beste klantenservice

Veel e-learning in prijs verlaagd

Na betaling, direct starten

Ontwikkel je van Programmeur naar Secure Agile Programmeur

€ 825,00
€ 998,25 Incl. BTW

Duur: 24 uur |

Taal: Engels (US) |

Online toegang: 365 dagen |

Gegevens

Ben jij een programmeur / software ontwikkelaar en een nog grotere bijdrage kunnen leveren aan de werkzaamheden binnen jouw organisatie? Dan is dit ontwikkelpad iets voor jou! Elke organisatie wil namelijk zijn processen graag optimaliseren en zich beveiligen tegen steeds groeiende bedreigingen. Als gevolg daarvan is er een toenemende vraag naar Secure Agile Programmeurs die de relevante opleiding en ervaring hebben in Agile methodologieën die niet alleen betrekking hebben op software ontwikkeling, maar ook op veilig programmeren.

Met dit ontwikkelpad doe jij de nodige kennis en vaardigheden op om jezelf tot Secure Agile programmeur te ontwikkelen.

Wanneer je kiest voor dit ontwikkelpad, krijg jij:

  • toegang tot trainingen omtrent de rollen van programmeur, secure programmeur, defensive programmeur en agile secure programmeur. Daarnaast krijg je toegang tot nog veel meer trainingen, proefexamens, bootcamps, e-books enzovoort.
  • begeleiding van ons Learning & Development team, samen met jou stellen we doelen, maken we een planning en monitoren we je voortgang.

In dit ontwikkelpad ontdek je stapsgewijs de rollen van programmeur, secure programmeur, defensive programmeur en agile secure programmeur. Je ontdekt programmeerstandaarden voor veilig programmeren. Daarnaast ga je aan de slag met beveiligingsconcepten, kwetsbaarheden, encryptie, aanvallen en resiliency codering. Vervolgens ligt de focus op defensieve concepten en technieken, cryptografie, code sampling, veilig testen, en geavanceerde defensieve programmeerconcepten. Ten slotte ga je aan de slag met veilige Agile programmeerconcepten, technieken, modellering, en testen.

Resultaat

Na het doorlopen van dit ontwikkelpad heb jij jezelf ontwikkeld tot Secure Agile Programmeur. Je hebt kennis van Agile methodologieën die niet alleen betrekking hebben op software ontwikkeling, maar ook op veilig programmeren.

Voorkennis

Je hebt ten minste basiskennis en ervaring met programmeren. Basis kennis van Agile wordt aangeraden.

Doelgroep

Softwareontwikkelaar, Webontwikkelaar

Inhoud

Ontwikkel je van Programmeur naar Secure Agile Programmeur

24 uur

Secure Programmer: Intro to Programming Standards

Secure Programmer: Intro to Programming Standards

Secure Programmer: Software Design Techniques

Secure Programmer: Software Design Techniques

Secure Programmer: Software Modeling Techniques

Secure Programmer: Software Modeling Techniques

Secure Programmer: Coding Practices

Secure Programmer: Coding Practices

Secure Programmer: Software Testing

Secure Programmer: Software Testing

Programmer

  • Perform Programmer tasks such as applying pattern based design and applying good coding practices. Then, test your skills by answering assessment questions after applying unit testing, integration testing, regression testing and user acceptance testing.
  • This lab provides access to tools typically used by Programmers, including:
  • �Windows 10
  • �Microsoft Office 2016
  • �Java 8
  • �Eclipse
  • �JMeter
  • �Git and Git Extensions(GUI) + Port opened for Gish
  • �GitHub Desktop
  • This lab is part of the Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer journey.

Final Exam: Programmer

Final Exam: Programmer will test your knowledge and application of the topics presented throughout the Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer Journey.

Secure Programmer: Security Concepts

  • Discover the basics of secure programming, including common

  • security concepts like the CIA triangle, least privileges, and
  • separation of duties. Explore authentication and authorization,
  • including popular models like DAC, MAC, RBAC, and ABAC. Examine how
  • to avoid common programming errors that can undermine security, as
  • well as how to incorporate validation and verification into your
  • programming.

Secure Programmer: Vulnerabilities

  • Explore various software vulnerability topics in this 19-video,

  • which opens with a look at specific security vulnerabilities and
  • how to program counter techniques. Then learners receive three
  • tutorials on the OWASP (Open Web Application Security Project) Top
  • 10 vulnerabilities: SQL injection, broken authentication, and
  • cross-site scripting; broken access control, security
  • misconfiguration, sensitive data exposure, and insufficient attack
  • protection; and cross-site request forgery, using components with
  • known vulnerabilities, and under protected application programming
  • interfaces (APIs). Examine use of threat models including STRIDE
  • (Spoofing, Tampering, Repudiation, Information Disclosure, Denial
  • of Service, and Elevation), PASTA (the Process for Attack
  • Simulation and Threat Analysis), DREAD (Damage, Reproductibility,
  • Exploitability, Affected Users, Discoverability), and SQUARE
  • (Security Quality Requirements Engineering). Use CVE (common
  • vulnerabilities and exposures) vulnerability scoring, and examine
  • Java, Python, C#, and Javascript SQL secure coding examples.
  • Implement Python secure coding to combat SQL vulnerability; C# to
  • combat common code vulnerabilities, and Javascript to combat Cross
  • Site Scripting attacks. Use Common Vulnerability Scoring System
  • (CVSS), and finally, use OWASP Zap and Vega vulnerability scanners
  • to test websites for common vulnerabilities.

Secure Programming: Encryption

  • In this 5-video course, learners discover the basics of

  • cryptographic algorithms. You will receive a general overview of
  • symmetric algorithms such as AES, Blowfish, and Serpent. You will
  • also examine asymmetric algorithms such as RSA (Rivest, Sharmir,
  • and Adelman), Diffie-Hellman, and elliptic-curve cryptography
  • (ECC). More importantly, you will learn when to use which algorithm
  • and what algorithms are better for specific purposes. You will then
  • move on to integrity algorithms, including hashes like SHA (Secure
  • Hash Algorithm 1), MD5 (Message Digest 5), and 6, RIPEMD (Ripe
  • Message Digest), and HAVAL, as well as message authentication codes
  • (MACs) and HMACs (keyed-hash message authentication codes). You
  • will also examine the strengths and weaknesses of these different
  • approaches. The goal is whether one can make intelligent choices
  • about which algorithms to implement for which purpose; whether
  • one's concerns are about confidentiality; if one needs to do key
  • exchange; is message integrity an issue; are you storing passwords?
  • These will each require different algorithms.

Secure Programmer: Attacks

Explore common software attacks and the coding mistakes that make software vulnerable to them. Discover how to code against format string, SQL injection, buffer overflow, cross-site scripting, and password cracking attacks in Java, C#, JavaScript, and Python.

Secure Programmer: Resiliency Coding

Explore resiliency concepts such as stability, recovery, and defensive coding. Discover how to write resilient code in Java, Python, C#, and JavaScript.

Secure Programmer

  • Perform Secure Programmer tasks such as minimizing SQL injection vulnerability, using OWASP Zap application to test an insecure web application, using Python to encrypt a data set and explore vulnerable code that can cause an overrun of buffer's boundary in Java, Python, C# and Javascript. Then, test your skills by answering assessment questions after preventing cross site scripting vulnerability, using Python to brute force a simple password, and creating resilient code in Python and C#.
  • This lab provides access to tools typically used by Secure Programmers, including:
  • �Microsoft Office 2016
  • �Java 8
  • �Eclipse
  • �JMeter
  • �Git and Git Extensions(GUI) + Port opened for Gish
  • �GitHub Desktop
  • This lab is part of the Secure Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer journey.

Final Exam: Secure Programmer

Final Exam: Secure Programmer will test your knowledge and application of the topics presented throughout the Secure Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer Journey.

Defensive Programmer: Defensive Concepts

Defensive Programmer: Defensive Concepts

Defensive Programmer: Defensive Techniques

Discover the importance of exception handling, validation, and parameter checking in programming. Explore how to handle exceptions and apply validation in Java, Python, C#, and JavaScript, as well as how to configure component trust and reuse code.

Defensive Programmer: Cryptography

Defensive Programmer: Cryptography

Defensive Programmer: Advanced Concepts

Defensive Programmer: Advanced Concepts

Defensive Programmer: Secure Testing

Explore the basics of secure testing methodologies such as unit, regression, and integration testing. Discover how to work with security metrics and track security bugs.

Defensive Programmer

  • Perform Defensive Programmer tasks such as implementing Java exception handling and JavaScript validiation, and using Python to implement asymetric encryption. Then, test your skills by answering assessment questions after filtering data with Python, performing parameter checking with C#, developing recoverable code in Java and implementing secure testing.
  • This lab provides access to tools typically used by Defensive Programmers, including:
  • �Microsoft Office 2016
  • �Java 8
  • �Eclipse
  • �JMeter
  • �Git and Git Extensions(GUI) + Port opened for Gish
  • �GitHub Desktop
  • This lab is part of the Defensive Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer journey.

Final Exam: Defensive Programmer

Final Exam: Defensive Programmer will test your knowledge and application of the topics presented throughout the Defensive Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer Journey.

Secure Agile Programming: Agile Concepts

  • Explore Agile programming concepts such as iterative software

  • approaches, differences between Agile and Waterfall, and creating a
  • secure Agile culture. Examine Scrum, Lean software, extreme
  • programming, and rapid application development. In addition, best
  • practices for secure Agile development, facilitating a secure
  • organizational culture, and secure methods for Scrum are also
  • covered.

Secure Agile Programming: Agile Techniques

Discover how to gather Agile requirements, implement Agile processes, create a secure Agile software development lifecycle, implement Disciplined Agile Delivery, and apply best practices for secure software development.

Secure Agile Programming: Agile Modeling

Discover how to model software in an Agile environment, including how to apply story-driven modeling. Explore how to use and build secure user stories and examine the Specification by Example methodology.

Secure Agile Programming: Testing

Explore Agile software testing techniques, including Continual Security Testing, testing standards, and verification and validation. Discover how to integrate metrics into Agile programming, configure bug tracking, conduct static code analysis, and implement continuous integration techniques.

Secure Agile Programmer

  • Perform Secure Agile Programmer tasks such as performing manual and tool-based agile testing, implementing continual security testing and performing manual static code analysis. Then, test your skills by answering assessment questions after performing tool-based static code analysis, implementing bug tracking in Bugzilla and JIRA, and implementing continuous integration techniques.
  • This lab provides access to tools typically used by Secure Agile Programmers, including:
  • �Microsoft Office 2016
  • �Java 8
  • �Eclipse
  • �JMeter
  • �Git and Git Extensions(GUI) + Port opened for Gish
  • �GitHub Desktop
  • This lab is part of the Secure Agile Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer journey.

Final Exam: Secure Agile Programmer

Final Exam: Secure Agile Programmer will test your knowledge and application of the topics presented throughout the Secure Agile Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer Journey.

Opties bij cursus

Wij bieden, naast de training, in sommige gevallen ook diverse extra leermiddelen aan. Wanneer u zich gaat voorbereiden op een officieel examen dan raden wij aan om ook de extra leermiddelen te gebruiken die beschikbaar zijn bij deze training. Het kan voorkomen dat bij sommige cursussen alleen een examentraining en/of LiveLab beschikbaar is.

Examentraining (proefexamens)

In aanvulling op deze training kunt u een speciale examentraining aanschaffen. De examentraining bevat verschillende proefexamens die het echte examen dicht benaderen. Zowel qua vorm als qua inhoud. Dit is de ultieme manier om te testen of u klaar bent voor het examen. 

LiveLab

Als extra mogelijkheid bij deze training kunt u een LiveLab toevoegen. U voert de opdrachten uit op de echte hardware en/of software die van toepassing zijn op uw Lab. De LiveLabs worden volledig door ons gehost in de cloud. U heeft zelf dus alleen een browser nodig om gebruik te maken van de LiveLabs. In de LiveLab omgeving vindt u de opdrachten waarmee u direct kunt starten. De labomgevingen bestaan uit complete netwerken met bijvoorbeeld clients, servers, routers etc. Dit is de ultieme manier om uitgebreide praktijkervaring op te doen.

Waarom Icttrainingen.nl?

Via ons opleidingsconcept bespaar je tot 80% op trainingen

Start met leren wanneer je wilt. Je bepaalt zelf het gewenste tempo

Spar met medecursisten en profileer je als autoriteit in je vakgebied.

Ontvang na succesvolle afronding van je cursus het certificaat van deelname van Icttrainingen.nl

Krijg inzicht in uitgebreide voortgangsinformatie van jezelf of je medewerkers

Kennis opdoen met interactieve e-learning en uitgebreide praktijkopdrachten door gecertificeerde docenten

Bestelproces

Zodra wij uw order en betaling hebben verwerkt, zetten wij uw trainingen klaar en kunt u aan de slag. Heeft u toch nog vragen over ons orderproces kunt u onderstaande button raadplegen.

lees meer over het orderproces

Wat is inbegrepen?

Certificaat van deelname ja
Voortgangsbewaking ja
Award Winning E-learning ja
Geschikt voor mobiel ja
Kennis delen Onbeperkte toegang tot onze community met IT professionals
Studieadvies Onze consultants zijn beschikbaar om je te voorzien van studieadvies
Studiemateriaal Gecertificeerde docenten met uitgebreide kennis over de onderwerpen
Service Service via chat, telefoon, e-mail (razendsnel)

Platform

Na bestelling van je training krijg je toegang tot ons innovatieve leerplatform. Hier vind je al je gekochte (of gevolgde) trainingen, kan je eventueel cursisten aanmaken en krijg je toegang tot uitgebreide voortgangsinformatie.

Life Long Learning

Meerdere cursussen volgen? Misschien is ons Life Long Learning concept wel wat voor u

lees meer

Neem contact op

Studieadvies nodig? Neem contact op!


Contact