Ontwikkel je van Programmeur naar Secure Agile Programmeur (incl. begeleiding)
Software Development
56 uur
Engels (US)

Ontwikkel je van Programmeur naar Secure Agile Programmeur (incl. begeleiding)

Snel navigeren naar:

  • Informatie
  • Inhoud
  • Kenmerken
  • Meer informatie
  • Reviews
  • FAQ

Productinformatie

Ben jij een programmeur / software ontwikkelaar en een nog grotere bijdrage kunnen leveren aan de werkzaamheden binnen jouw organisatie? Dan is dit ontwikkelpad iets voor jou! Elke organisatie wil namelijk zijn processen graag optimaliseren en zich beveiligen tegen steeds groeiende bedreigingen. Als gevolg daarvan is er een toenemende vraag naar Secure Agile Programmeurs die de relevante opleiding en ervaring hebben in Agile methodologieën die niet alleen betrekking hebben op software ontwikkeling, maar ook op veilig programmeren.

Met dit ontwikkelpad doe jij de nodige kennis en vaardigheden op om jezelf tot Secure Agile programmeur te ontwikkelen.

Wanneer je kiest voor dit ontwikkelpad, krijg jij:

  • toegang tot trainingen omtrent de rollen van programmeur, secure programmeur, defensive programmeur en agile secure programmeur. Daarnaast krijg je toegang tot nog veel meer trainingen, proefexamens, bootcamps, e-books enzovoort.
  • begeleiding van ons Learning & Development team, samen met jou stellen we doelen, maken we een planning en monitoren we je voortgang.

In dit ontwikkelpad ontdek je stapsgewijs de rollen van programmeur, secure programmeur, defensive programmeur en agile secure programmeur. Je ontdekt programmeerstandaarden voor veilig programmeren. Daarnaast ga je aan de slag met beveiligingsconcepten, kwetsbaarheden, encryptie, aanvallen en resiliency codering. Vervolgens ligt de focus op defensieve concepten en technieken, cryptografie, code sampling, veilig testen, en geavanceerde defensieve programmeerconcepten. Ten slotte ga je aan de slag met veilige Agile programmeerconcepten, technieken, modellering, en testen.

Inhoud van de training

Ontwikkel je van Programmeur naar Secure Agile Programmeur (incl. begeleiding)

56 uur

Secure Programmer: Intro to Programming Standards

Secure Programmer: Intro to Programming Standards

Secure Programmer: Software Design Techniques

Secure Programmer: Software Design Techniques

Secure Programmer: Software Modeling Techniques

Secure Programmer: Software Modeling Techniques

Secure Programmer: Coding Practices

Secure Programmer: Coding Practices

Secure Programmer: Software Testing

Secure Programmer: Software Testing

Programmer

  • Perform Programmer tasks such as applying pattern based design and applying good coding practices. Then, test your skills by answering assessment questions after applying unit testing, integration testing, regression testing and user acceptance testing.
  • This lab provides access to tools typically used by Programmers, including:
  • �Windows 10
  • �Microsoft Office 2016
  • �Java 8
  • �Eclipse
  • �JMeter
  • �Git and Git Extensions(GUI) + Port opened for Gish
  • �GitHub Desktop
  • This lab is part of the Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer journey.

Final Exam: Programmer

Final Exam: Programmer will test your knowledge and application of the topics presented throughout the Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer Journey.

Secure Programmer: Security Concepts

  • Discover the basics of secure programming, including common

  • security concepts like the CIA triangle, least privileges, and
  • separation of duties. Explore authentication and authorization,
  • including popular models like DAC, MAC, RBAC, and ABAC. Examine how
  • to avoid common programming errors that can undermine security, as
  • well as how to incorporate validation and verification into your
  • programming.

Secure Programmer: Vulnerabilities

  • Explore various software vulnerability topics in this 19-video,

  • which opens with a look at specific security vulnerabilities and
  • how to program counter techniques. Then learners receive three
  • tutorials on the OWASP (Open Web Application Security Project) Top
  • 10 vulnerabilities: SQL injection, broken authentication, and
  • cross-site scripting; broken access control, security
  • misconfiguration, sensitive data exposure, and insufficient attack
  • protection; and cross-site request forgery, using components with
  • known vulnerabilities, and under protected application programming
  • interfaces (APIs). Examine use of threat models including STRIDE
  • (Spoofing, Tampering, Repudiation, Information Disclosure, Denial
  • of Service, and Elevation), PASTA (the Process for Attack
  • Simulation and Threat Analysis), DREAD (Damage, Reproductibility,
  • Exploitability, Affected Users, Discoverability), and SQUARE
  • (Security Quality Requirements Engineering). Use CVE (common
  • vulnerabilities and exposures) vulnerability scoring, and examine
  • Java, Python, C#, and Javascript SQL secure coding examples.
  • Implement Python secure coding to combat SQL vulnerability; C# to
  • combat common code vulnerabilities, and Javascript to combat Cross
  • Site Scripting attacks. Use Common Vulnerability Scoring System
  • (CVSS), and finally, use OWASP Zap and Vega vulnerability scanners
  • to test websites for common vulnerabilities.

Secure Programming: Encryption

  • In this 5-video course, learners discover the basics of

  • cryptographic algorithms. You will receive a general overview of
  • symmetric algorithms such as AES, Blowfish, and Serpent. You will
  • also examine asymmetric algorithms such as RSA (Rivest, Sharmir,
  • and Adelman), Diffie-Hellman, and elliptic-curve cryptography
  • (ECC). More importantly, you will learn when to use which algorithm
  • and what algorithms are better for specific purposes. You will then
  • move on to integrity algorithms, including hashes like SHA (Secure
  • Hash Algorithm 1), MD5 (Message Digest 5), and 6, RIPEMD (Ripe
  • Message Digest), and HAVAL, as well as message authentication codes
  • (MACs) and HMACs (keyed-hash message authentication codes). You
  • will also examine the strengths and weaknesses of these different
  • approaches. The goal is whether one can make intelligent choices
  • about which algorithms to implement for which purpose; whether
  • one's concerns are about confidentiality; if one needs to do key
  • exchange; is message integrity an issue; are you storing passwords?
  • These will each require different algorithms.

Secure Programmer: Attacks

Explore common software attacks and the coding mistakes that make software vulnerable to them. Discover how to code against format string, SQL injection, buffer overflow, cross-site scripting, and password cracking attacks in Java, C#, JavaScript, and Python.

Secure Programmer: Resiliency Coding

Explore resiliency concepts such as stability, recovery, and defensive coding. Discover how to write resilient code in Java, Python, C#, and JavaScript.

Secure Programmer

  • Perform Secure Programmer tasks such as minimizing SQL injection vulnerability, using OWASP Zap application to test an insecure web application, using Python to encrypt a data set and explore vulnerable code that can cause an overrun of buffer's boundary in Java, Python, C# and Javascript. Then, test your skills by answering assessment questions after preventing cross site scripting vulnerability, using Python to brute force a simple password, and creating resilient code in Python and C#.
  • This lab provides access to tools typically used by Secure Programmers, including:
  • �Microsoft Office 2016
  • �Java 8
  • �Eclipse
  • �JMeter
  • �Git and Git Extensions(GUI) + Port opened for Gish
  • �GitHub Desktop
  • This lab is part of the Secure Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer journey.

Final Exam: Secure Programmer

Final Exam: Secure Programmer will test your knowledge and application of the topics presented throughout the Secure Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer Journey.

Defensive Programmer: Defensive Concepts

Defensive Programmer: Defensive Concepts

Defensive Programmer: Defensive Techniques

Discover the importance of exception handling, validation, and parameter checking in programming. Explore how to handle exceptions and apply validation in Java, Python, C#, and JavaScript, as well as how to configure component trust and reuse code.

Defensive Programmer: Cryptography

Defensive Programmer: Cryptography

Defensive Programmer: Advanced Concepts

Defensive Programmer: Advanced Concepts

Defensive Programmer: Secure Testing

Explore the basics of secure testing methodologies such as unit, regression, and integration testing. Discover how to work with security metrics and track security bugs.

Defensive Programmer

  • Perform Defensive Programmer tasks such as implementing Java exception handling and JavaScript validiation, and using Python to implement asymetric encryption. Then, test your skills by answering assessment questions after filtering data with Python, performing parameter checking with C#, developing recoverable code in Java and implementing secure testing.
  • This lab provides access to tools typically used by Defensive Programmers, including:
  • �Microsoft Office 2016
  • �Java 8
  • �Eclipse
  • �JMeter
  • �Git and Git Extensions(GUI) + Port opened for Gish
  • �GitHub Desktop
  • This lab is part of the Defensive Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer journey.

Final Exam: Defensive Programmer

Final Exam: Defensive Programmer will test your knowledge and application of the topics presented throughout the Defensive Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer Journey.

Secure Agile Programming: Agile Concepts

  • Explore Agile programming concepts such as iterative software

  • approaches, differences between Agile and Waterfall, and creating a
  • secure Agile culture. Examine Scrum, Lean software, extreme
  • programming, and rapid application development. In addition, best
  • practices for secure Agile development, facilitating a secure
  • organizational culture, and secure methods for Scrum are also
  • covered.

Secure Agile Programming: Agile Techniques

Discover how to gather Agile requirements, implement Agile processes, create a secure Agile software development lifecycle, implement Disciplined Agile Delivery, and apply best practices for secure software development.

Secure Agile Programming: Agile Modeling

Discover how to model software in an Agile environment, including how to apply story-driven modeling. Explore how to use and build secure user stories and examine the Specification by Example methodology.

Secure Agile Programming: Testing

Explore Agile software testing techniques, including Continual Security Testing, testing standards, and verification and validation. Discover how to integrate metrics into Agile programming, configure bug tracking, conduct static code analysis, and implement continuous integration techniques.

Secure Agile Programmer

  • Perform Secure Agile Programmer tasks such as performing manual and tool-based agile testing, implementing continual security testing and performing manual static code analysis. Then, test your skills by answering assessment questions after performing tool-based static code analysis, implementing bug tracking in Bugzilla and JIRA, and implementing continuous integration techniques.
  • This lab provides access to tools typically used by Secure Agile Programmers, including:
  • �Microsoft Office 2016
  • �Java 8
  • �Eclipse
  • �JMeter
  • �Git and Git Extensions(GUI) + Port opened for Gish
  • �GitHub Desktop
  • This lab is part of the Secure Agile Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer journey.

Final Exam: Secure Agile Programmer

Final Exam: Secure Agile Programmer will test your knowledge and application of the topics presented throughout the Secure Agile Programmer track of the Skillsoft Aspire Programmer to Secure Agile Programmer Journey.

Kenmerken

Docent inbegrepen
Bereidt voor op officieel examen
Engels (US)
56 uur
Software Development
365 dagen online toegang
HBO

Meer informatie

Doelgroep Softwareontwikkelaar, Webontwikkelaar
Voorkennis

Je hebt ten minste basiskennis en ervaring met programmeren. Basis kennis van Agile wordt aangeraden.

Resultaat

Na het doorlopen van dit ontwikkelpad heb jij jezelf ontwikkeld tot Secure Agile Programmeur. Je hebt kennis van Agile methodologieën die niet alleen betrekking hebben op software ontwikkeling, maar ook op veilig programmeren.

Positieve reacties van cursisten

Training: Leidinggeven aan de AI transformatie

Nuttige training. Het bestelproces verliep vlot, ik kon direct beginnen.

- Mike van Manen

Onbeperkt Leren Abonnement

Onbeperkt Leren aangeschaft omdat je veel waar voor je geld krijgt. Ik gebruik het nog maar kort, maar eerste indruk is goed.

- Floor van Dijk

Training: Leidinggeven aan de AI transformatie

Al jaren is icttrainingen.nl onze trouwe partner op het gebied van kennisontwikkeling voor onze IT-ers. Wij zijn blij dat wij door het platform van icttrainingen.nl maatwerk en een groot aanbod aan opleidingen kunnen bieden aan ons personeel.

- Loranne, Teamlead bij Inwork

Hoe gaat het te werk?

1

Training bestellen

Nadat je de training hebt besteld krijg je bevestiging per e-mail.

2

Toegang leerplatform

In de e-mail staat een link waarmee je toegang krijgt tot ons leerplatform.

3

Direct beginnen

Je kunt direct van start. Studeer vanaf nu waar en wanneer jij wilt.

4

Training afronden

Rond de training succesvol af en ontvang van ons een certificaat!

Veelgestelde vragen

Veelgestelde vragen

Op welke manieren kan ik betalen?

Je kunt bij ons betalen met iDEAL, PayPal, Creditcard, Bancontact en op factuur. Betaal je op factuur, dan kun je met de training starten zodra de betaling binnen is.

Hoe lang heb ik toegang tot de training?

Dit verschilt per training, maar meestal 180 dagen. Je kunt dit vinden onder het kopje ‘Kenmerken’.

Waar kan ik terecht als ik vragen heb?

Je kunt onze Learning & Development collega’s tijdens kantoortijden altijd bereiken via support@icttrainingen.nl of telefonisch via 026-8402941.

Background Frame
Background Frame

Onbeperkt leren

Met ons Unlimited concept kun je onbeperkt gebruikmaken van de trainingen op de website voor een vast bedrag per maand.

Bekijk de voordelen

Heb je nog twijfels?

Of gewoon een vraag over de training? Blijf er vooral niet mee zitten. We helpen je graag verder. Daar zijn we voor!

Contactopties