What Does MVP Stand For? It’s Not What You Think.
October 7, 2024
Article
Recommended experience
Intermediate level
Designed for programmers, software engineers, and IT professionals with a basic understanding of coding and development processes.
Recommended experience
Intermediate level
Designed for programmers, software engineers, and IT professionals with a basic understanding of coding and development processes.
Identify and mitigate common software vulnerabilities across platforms.
Apply secure coding practices to prevent exploits and attacks.
Design software with risk assessment and mitigation strategies in mind.
Test and maintain security in production environments effectively.
Add to your LinkedIn profile
January 2025
6 assignments
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
Dive into the critical world of secure software development with Cyber Secure Coder (CSC-110). This course equips you with the knowledge and skills to identify vulnerabilities, mitigate risks, and build resilient applications. Learn to safeguard against exploits and develop a deep understanding of secure coding practices, ensuring robust software integrity.
Your journey begins with an overview of security in software, delving into how vulnerabilities emerge and how secure requirements can be identified and implemented. Explore key aspects of software security, including vulnerability intelligence, error handling, and hashing techniques. From gathering security requirements to protecting against human-related risks, the course emphasizes practical applications through engaging assignments and activities. The curriculum transitions into advanced topics such as secure design principles, risk management strategies, and countermeasures to common exploits. As you progress, you'll develop proficiency in coding guidelines, preventing buffer overflows, and understanding OWASP's top vulnerabilities across platforms, including web, mobile, IoT, and desktop. Ideal for developers, IT professionals, and security enthusiasts, this intermediate-level course requires basic programming knowledge and an understanding of software development processes. Whether you're refining your coding skills or stepping into cybersecurity, this course provides essential tools to build secure software for today’s digital landscape.
In this module, we will delve into the foundations of software security, exploring key vulnerabilities, attack patterns, and secure coding principles. You will learn how to gather and document security requirements, understand the phases of an attack, and implement secure practices such as password validation and hashing. Hands-on assignments and activities will reinforce your ability to identify and mitigate software vulnerabilities effectively.
17 videos
In this module, we will explore strategies for managing vulnerabilities in software development, focusing on the risks posed by bugs, external libraries, and human error. You will learn secure design principles, lifecycle security practices, and methods for handling errors without compromising security. Through assignments and activities, you’ll investigate leftover deployment artifacts and assess their potential security implications.
8 videos1 assignment
In this module, we will focus on designing software with security at its core. You will explore foundational principles of secure design, identify and correct common flaws, and assess risks and threats during the design phase. Through practical assignments and activities, you’ll analyze security concerns in applications and implement strategies to mitigate risks, including countermeasures against common exploits.
7 videos1 assignment
In this module, we will focus on developing secure code by understanding and addressing common programming vulnerabilities. You will learn how to prevent buffer overflows, race conditions, and platform-specific vulnerabilities across various environments. With a detailed exploration of the OWASP Top Ten, this section provides a comprehensive guide to identifying and remediating risks in web, mobile, IoT, and desktop applications. Practical assignments and activities will strengthen your ability to write robust, secure code.
11 videos1 assignment
In this module, we will explore foundational protections essential for secure application development. You will learn secure session management, strategies for user provisioning and password security, and the effective use of encryption for data protection. Additionally, we will examine best practices for error handling to prevent potential security breaches. These lessons provide the tools to implement robust security measures in any application.
4 videos1 assignment
In this module, we will focus on ensuring long-term software security through rigorous testing and proactive maintenance. You will learn procedures for verifying application security during development and implement monitoring and logging strategies to identify and respond to threats in production. These practices will help maintain a secure and resilient software environment.
2 videos2 assignments
Packt helps tech professionals put software to work by distilling and sharing the working knowledge of their peers. Packt is an established global technical learning content provider, founded in Birmingham, UK, with over twenty years of experience delivering premium, rich content from groundbreaking authors on a wide range of emerging and popular technologies.
Kennesaw State University
Course
Specialization
Microsoft
Course
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Earn a degree from world-class universities - 100% online
Upskill your employees to excel in the digital economy
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is one of a few offered on Coursera that are currently available only to learners who have paid or received financial aid, when available.
You will be eligible for a full refund until two weeks after your payment date, or (for courses that have just launched) until two weeks after the first session of the course begins, whichever is later. You cannot receive a refund once you’ve earned a Course Certificate, even if you complete the course within the two-week refund period. See our full refund policy.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
These cookies enable the website to provide enhanced functionality and personalization. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.