Cyber Secure Coder (CSC™)


3 Days


Delivery Methods
Virtual Instructor Led
Private Group

Course Overview

The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle. This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development.

This course includes an exam voucher.

Course Objectives

  • Employ best practices in software development to develop secure software.
  • Identify the need for security in your software projects.
  • Eliminate vulnerabilities within software.
  • Use a Security by Design approach to design a secure architecture for your software.
  • Implement common protections to protect users and data.
  • Apply various testing methods to find and correct security defects in your software.
  • Maintain deployed software to ensure ongoing security.
  • Who Should Attend?

    This course is designed for software developers, testers, and architects who design and develop software in various programming languages and platforms, including desktop, web, cloud, and mobile, and who want to improve their ability to deliver software that is of high quality, particularly regarding security and privacy. This course is also designed for students who are seeking the CertNexus Cyber Secure Coder (CSC) Exam CSC-210 certification.

    United Training is committed to working as a partner with our clients. Choose United Training and take advantage of the following benefits.

    • Robust Public Enrollment Schedule. Enjoy access to hundreds of Guaranteed to Run dates across a diverse catalog of course titles.
    • Private Group Training. Let our world-class instructors come to you to deliver training at your place of business or we can present to your team online using our Virtual Instructor-Led Training platform.
    • Custom Training Solutions. Our subject matter experts can customize the class to specifically address the unique goals of your team.
    • Free Re-Takes. Most completed United Training courses carry our unbeatable Learning Guarantee. This guarantee allows students to repeat most United Training courses, if they are the same version, FREE OF CHARGE, within six months of completion of the courses. Exceptions: Cisco, Citrix, VMware, Red Hat, and courses provided by affiliated 3rd party training providers.

    Learning Credits: Learning Credits can be purchased well in advance of your training date to avoid having to commit to specific courses or dates. Learning Credits allow you to secure your training budget for an entire year while eliminating the administrative headache of paying for individual classes. They can also be redeemed for a full year from the date of purchase. If you have previously purchased a Learning Credit agreement with United Training, you may use a portion of your agreement to pay for this class.

    Corporate Tech Pass: Our Corporate Tech Pass includes unlimited attendance for a single person, in the following Virtual Instructor Led course types: Microsoft Office, Microsoft Technical, CompTIA, Project Management, SharePoint, ITIL, Certified Ethical Hacker, Certified Hacking Forensics Investigator, Java, Professional Development Courses and more. The full list of eligible course titles can be found at

    If you have questions about Learning Credits or our Corporate Tech Pass, please contact your Account Manager.

    Course Prerequisites

    This course presents secure programming concepts that apply to many different types of software development projects. Although this course uses Python®, HTML, and JavaScript® to demonstrate various programming concepts, you do not need to have experience in these languages to benefit from this course. However, you should have some programming experience, whether it be developing desktop, mobile, web, or cloud applications.


    1 - Identify Security Requirements and Expectations

    • Identify Security Requirements and Expectations
    • Identify Factors That Undermine Software Security
    • Find Vulnerabilities in Your Software
    • Gather Intelligence on Vulnerabilities and Exploits

    2 - Handling Vulnerabilities

    • Handle Vulnerabilities Due to Software Defects and Misconfiguration
    • Handle Vulnerabilities Due to Human Factors
    • Handle Vulnerabilities Due to Process Shortcomings

    3 - Designing for Security

    • Apply General Principles for Secure Design
    • Design Software to Counter Specific Threats

    4 - Developing Secure Code

    • Follow Best Practices for Secure Coding
    • Prevent Platform Vulnerabilities
    • Prevent Privacy Vulnerabilities

    5 - Implementing Common Protections

    • Limit Access Using Login and User Roles
    • Protect Data in Transit and At Rest
    • Implement Error Handling and Logging
    • Protect Sensitive Data and Functions
    • Protect Database Access

    6 - Testing Software Security

    • Perform Security Testing
    • Analyze Code to find Security Problems
    • Use Automated Testing Tools to Find Security Problems

    7 - Maintaining Security in Deployed Software

    • Monitor and Log Applications to Support Security
    • Maintain Security after Deployment

    There are no open enrollment courses currently scheduled.
    Inquire about scheduling this course when it’s best for your team. Learn More about Private Group Training


    Do You Have Additional Questions? Please Contact Us Below.

    contact us contact us 
    Contact Us about Starting Your Business Training Strategy with United Training