Developing Secure Applications Course

The way companies build software and technology systems is evolving very rapidly, becoming increasingly automated and integrated.

Companies should consider security a primary concern throughout the development and deployment process.

Our Developing Secure Applications explains the principles behind ensuring secure software development and deployment are taking place.

Start a Free Trial

Chevron Skillcast chevron graphic
Developing Secure Applications

About this Course

This SCORM-compatible course is part of our FCA Compliance Library.

The library is available in the Skillcast Standard plan for larger companies or Skillcast Basic plan for those with under 50 learners.

Learning Objectives

This course will prepare you to:

  • Recognise the importance of developing and deploying software securely
  • Understand the major principles of secure development
  • Identify areas of your development process that could be vulnerable or made more secure
  • Take steps to improve the security of your development process
  • Know what our regulators consider to be key risk areas when developing secure applications
  • Understand the importance of compliance with the Senior Managers and Certification Regime (SM&CR) when developing secure applications

Course Outline

This course consists of 9 sections of content, including a course summary. There is an affirmation to indicate your understanding and compliance with guidelines. At the end of the course, there is an assessment containing multiple-choice questions based on the content.


The evolution of code development

- You decide: Managing software security risks
- Secure development principles

Principle 1: Secure development is everyone's concern

- Integrating security
- Principle 1: Day-to-day activities

Principle 2: Keep your security knowledge sharp

- Principle 2: Day-to-day activities
- Actions: Education and training

Principle 3: Produce clean and maintainable code

- Actions: Writing and checking code
- Actions: Building team culture

Principle 4: Secure your development environment

- Actions

Principle 5: Protect your code repository

- Focus on the repository
- Focus on credentials

Principle 6: Secure the build and deployment pipeline

- Build and deployment infrastructure
- Deployment

Principle 7: Continually test your security

- Creating tests
- Maintaining the testing environment

Principle 8: Plan for security flaws

- Actions




Course Specifications

This course is designed to  for all staff members.



Approximately 45 minutes followed by a 10-question assessment.



Suitable for all staff - examples and interactivities designed for staff at all levels. No previous knowledge or experience is required.



SHARD-compliant, responsive display on all devices, accessibility on screen readers, visual design controlled via client style sheet.



All Windows, Mac OSX, iOS, Android (Flash-free for mobile compatibility). AICC and SCORM 1.2-compliant, suitable for both hosted and deployed SCORM or AICC.



Fully customisable on Skillcast Portal CMS.



Pre-translated versions not available, but all text content can be exported for translation into all languages.



Based on UK legislation, but suitable for global audiences upon the removal of UK-specific references and translation as necessary.

quote mark top quote mark bottom

We, as a firm, are very satisfied with the Skillcast training platform, its course design and its content. The online tools and guidance provided by the platform are super easy, enabling anyone to incorporate their own designed training modules with the help of course editor options.

Trusted Customer, Feefo Review

FCA Course Library

Our FCA Course library of over 60 training modules covers everything from high-level and conduct of business standards to thematic topics, including treating customers fairly.

Start a Free Trial

Chevron Skillcast chevron graphic
FCA Course Library