Developing Secure Applications Course

IIRSM Date Range Logos Aug 23 - Jun 26

In today's fast-paced technological landscape, the significance of a secure development approach cannot be overstated. The process of software and system development is constantly evolving, with increased automation and integration.

Modern developers can now use code to define an entire system architecture and integrate it with tooling that automates both testing and deployment, creating a more streamlined and efficient development process.

Our Developing Secure Applications course will help employees understand the key principles to ensure secure software development and deployment.

Start a Free Trial

Chevron Skillcast chevron graphic
Developing Secure Applications

About this Course

Available as part of our Risk Management Library.

Learning objectives

  • Recognise the importance of developing and deploying software securely
  • Understand the major principles of secure development
  • Identify areas of your development process that could be vulnerable or made more secure
  • Take steps to improve the security of your development process

Course Contents

Welcome

- Learning objective
-How to complete this course

The evolution of code development

- You decide: Managing software security risks
- Secure development principles

Principle 1: Secure development is everyone's concern

- Integrating security
- Principle 1: Day-to-day activities

Principle 2: Keep your security knowledge sharp

- Principle 2: Day-to-day activities
- Actions: Education & training

Principle 3: Produce clean & maintainable code

- Actions: Writing & checking code
- Actions: Building team culture

Principle 4; Secure your development environment

- Actions

Principle 5: Protect your code repository

- Actions: Focus on the repository
- Actions: Focus on credentials

Principle 6: Secure the build & deployment pipeline

- Actions: Build & deployment infrastructure
- Actions: Deployment

Principle 7: Continually test your security

- Actions: Creating tests
- Actions: Maintaining the testing environment

Principle 8: Plan for security flaws

- Actions

Summary

Affirmation

Assessment

Course Specifications

Structure

Structure

Approximately 45-minute long e-learning course followed by a 10-question assessment.

Audience

Audience

Suitable for all staff - examples and interactivities designed for staff at all levels. No previous knowledge or experience is required.

Design

Design

SHARD-compliant, responsive display on all devices, accessibility on screen readers, visual design controlled via a client style sheet.

Compatibility

Compatibility

All Windows, Mac OSX, iOS, Android (Flash-free for mobile compatibility). AICC and SCORM 1.2-compliant, suitable for both hosted and deployed SCORM or AICC.

Tailoring

Tailoring

Fully customisable on Skillcast Portal CMS.

Translation

Translation

Pre-translated versions not available, but all text content can be exported for translation into all languages.

Localisation

Localisation

Based on best-practice risk management frameworks and suitable for global audiences.

Try our courses for free...

Compliance Essentials Library is our best-selling comprehensive corporate training solution.

100+ e-learning and microlearning courses that help companies from SMEs to global corporates achieve compliance success.

Start a Free Trial

Chevron Skillcast chevron graphic
Compliance Essentials