Вы находитесь на странице: 1из 5

Secure Software Development Life Cycle

Live Online | 30+ Hours | Evening Batch | Online Lab Access | ‘SWADLP’ Exam Attempt

Aligned with Software Security Standards and Best Practices

Secure Software Development Life Cycle or Secure SDLC is a systematic and structured concept
to integrate Security at every phase of Software Development Life Cycle. Ensuring security in a
product from scratch, not only helps in ensuring all compliances and basic security requirements
but can also assist in implementing Security Controls at Low Cost.
Hack2Secure’s LIVE Online Workshop on Secure Software Development Life Cycle provides
required process building concepts and relevant Case Studies to assist in analysing, evaluating,
implementing and ensuring Security requirements across SDLC phases.

Key Take Away Get Aligned


 Security requirements across SDLC phases Get Aligned with Industry Security
 Secure SDLC Compliances and Framework Standards and Best Practices
requirements
 BSIMM7 & OpenSAMM Framework
 Software Security Standards and Assurance
 NIST SP 800-64 Secure SDLC requirements
Methodologies
 PCI DSS, NIST and FIPS recommended
 Information Security Concepts and Secure Software Security practices
Design Principles
 OWASP Web Security Testing Practices
 OWASP Top 10 (2017) Web Security Risk
 OWASP and CERT recommended Secure
 Gathering Software Security Requirements
Coding Practices
 Establishing Security Baseline, Checkpoints  Common Vulnerability Scoring System
and Quality Gates (CVSS)
 Threat Modeling: Process and Use Cases
 Secure Coding Practices and Review How It Helps?
Guidelines
 Web Application Security Testing, Tools,  Early Identification and Mitigation of Secu-
Techniques and Methodologies rity Vulnerabilities
 Building and Evaluating Final Security  Reduced Control Implementation Cost
Review Plan  Awareness on Potential Engineering
 Incident Handling Process Challenges
 Supply Chain Risk Management  Measurable and Comprehensive Software
Security Risk Management
 Security Patch Management
 Security Assurance and Industry Compliant
 Handling 3rd party Library upgrades
Software
 Handling Auditing and VA-PT Process
 Adoption of Security Standards, Best
 Handling Security Defects
Practices and Methodologies

For more details, www.online.hack2secure.com | training@hack2secure.com


Live Online | 30+ Hours | Evening Batch | Online Lab Access | ‘SWADLP’ Exam Attempt

Aligned with Software Security Standards and Best Practices

What You Will Receive Who Should Attend


 Instructor Led Live-Online Sessions  Management Team
 Online Lab Environment o Software Development Managers
o Cloud Based, 45 Days access o Software Program Managers
o Access to each individual o Project Assurance Team
o Team Leads, Senior Consultants
 SWADLP Cert Exam Voucher
o CxO, Directors, VPs
o 1 Attempt, 6 months Validity
o Globally Proctored & Delivered Exam by
 Research & Development Team
o Architects, Developers
Pearson VUE
o Software Testing Team (QA)
 Access to Session Recordings
o Software Analyst, Consultants
o Life Time Access
o Research Engineers
 Email based Technical Support  Product Security Team/Office
o 30 Days of Email based support with Trainer o CISO, Security Managers
 Online Training Completion Certificate o Assurance and Compliance Officer
 Exclusive Discounts on other H2S o Security Consultants
Programs o Auditors, Security Engineers, Testers
and Analyst
 Students, looking to pursue career in
Secure Software Development and
Management
 Anyone, who is interested in exploring
Secure SDLC process and practices

Pre-Requisites
 Awareness on Software/Application
Development Methodologies
 Knowledge of Web Technologies
 Basic Protocol functionality of Protocols
especially HTTP

For Secure SDLC Program Enrollment, visit


https://goo.gl/NE2ndw

For more details, www.online.hack2secure.com | training@hack2secure.com


Detailed Curriculum
Aligned with Software Security Standards and Best Practices

Secure SDLC Phase#1: Security Awareness Secure SDLC Phase#4: Secure Implementation
 About Secure SDLC  Application Coding: Common Security Myths
 Process, Requirements & Methodologies  CWE Top 25 Programming Errors
 Secure SDLC in Agile  Implementation Level Controls against
 Information Security Concepts  OWASP Top10 Web Security Risk
 Core Security Concepts  Buffer Overflow
o C.I.A. Triad  Insecure Cryptographic Storage
o A.A.A. Concept  Information Leakage & Improper Error Handling
 Security Design Principles  Defensive Coding Practices
 Threats, Risk & Vulnerabilities  Input Validation, Canonicalization, CAS
 Software Security Standards, Regulations and  Declarative vs Programmatic Security
Compliances  Exception Management
 Secure SDLC Standards & Frameworks  Security Code Review process and Best Practices
 NIST SP 800-64
 BSIMM7 & OpenSAMM Framework Secure SDLC Phase#5: Web Application
 Security Assurance Methodologies Security Testing
 STRIDE, DREAD  Application Security Testing: Tools, Techniques and
 Common Vulnerability Scoring System (CVSS) Methodologies for
 Software Risk Management: Overview  Core Security Concepts
 OWASP Top10 Web Application Security Risk  OWASP Top10 Web Application Security Risk
 Handling Security Defects
Secure SDLC Phase#2: Building Security
Requirements Secure SDLC Phase#6: Security Review &
 Defining Security Quality Gates Response
 Building Security Requirement Checklist  Building Final Security Review Plan
 Core Security Requirements  Handling Auditing and VA-PT Process
o Ensure C.I.A. and A.A.A.  Incident Handling Process
 General Security Requirements  Threats to Supply Chain Software
o Ensure Secure Session, Error and  Software Deployment and Procurement Risk
Configuration Management
 Operational Security Requirements Secure SDLC Phase#7: Securing Maintenance
o Related with Secure Deployment
Environment, Archiving and Anti-Piracy
Cycle
 Other  Security Patch Management
o International Laws, Procurement and  Handling 3rd Party Library Upgrades
Time Sequencing concerns  Application Disposal Policy

Secure SDLC Phase#3: Ensuring Secure Design


 About STRIDE
 Attack Surface Analysis For Secure SDLC Program
 Threat Modeling Enrollment, visit
 Process, Benefits & Use Cases
 Workshop: Design, Define & Analyze Threat
Model
https://goo.gl/NE2ndw

For more details, www.online.hack2secure.com | training@hack2secure.com


Secure Web Application Development Lifecycle Practitioner
Evaluate your Skills in Secure Application Development

Globally Available | Proctored | 150 mins. | 90 MCQ | Passing Grade: 60% | Exam Language: English

Secure Web Application Development Lifecycle Practitioner (SWADLP) Certificate program


evaluates individual's implementation level skills in Security practices required to ensure Secure
Application Development. This program ensures candidate's awareness on Application Security
Challenges, Threats, Standards, Best Practices and assurance methodologies along with hands -
on implementation level knowledge and skill-sets.

SWADLP is based on globally recognized Standards and Industry best practices to ensure
knowledge and Understanding of Secure Application Development requirements. It walks
through phases of Software Development and provide required strategies and processes to
integrate Security at every level.

Benefits Attempt to SWADLP


 Validates your expertise and knowledge in
Exam is included as part
Secure Application Development Process of Secure SDLC LIVE
 Get Global Recognition and Credibility Online Training Program
 Ensures Real Time skills required to handle
Web Application Security Risk
from Hack2Secure
 Demonstrate Knowledge of Industry 1 Attempt | 6 months Voucher Validity
Standards and Best Practices
 Ensures effective skills to measure and Delivered globally at Pearson VUE
implement Security Controls Authorized Test Centres

To Schedule SWADLP Exam


www.pearsonvue.com/hack2secure

For more details, visit www.hack2secure.com/swadlp


www.hack2secure.com | certificate@hack2secure.com
About Hack2Secure
Hack2Secure excels in “Information Security” Domain and offers
customised IT Security programs, including Training, Services and
Solutions. Our programs are designed by industry experts and
tailored as per specific needs. We help students, professionals
and companies with knowledge, tools and guidance required to
be at forefront of a vital and rapidly changing IT industry.

InfoSec Training
Vendor Independent, Customizable, Across Domains
Hack2Secure excels in delivering intensive, immersion security
training sessions designed to master practical steps necessary
for defending systems against the dangerous security threats.
Our wide range of fully customizable training courses allow
individual to master different aspects of Information Security as
per their industry requirement and convenience.
 Delivered Training to more than 15k+ Professionals Globally
 Customizable Security Training Programs, aligned with Business Requirements
InfoSec Certification
 Globally delivered and Proctored Security Certification programs with PearsonVUE
 Vendor Independent Programs based on Industry Security Standards and Practices
End-to-End InfoSec Services
Hack2Secure offers IT Security Professional Services to provide ways to stay ahead of Security
Threats through adaptive and proactive Security methods like
 Secure Software Development Lifecycle
 Secure Application Design & Threat Modeling
 Application Security Testing
 Network/Infrastructure Risk Assessment
 Consulting

Hack2Secure featured as:


hack2secure
25 FASTEST GROWING CYBER SECURITY
COMPANIES IN INDIA
+91 (80) 49 58 32 99 Source: The CEO Magazine, India
+91 (80) 49 58 33 99 10 BEST SECURITY COMPANIES in INDIA: 2017
Source: Silicon Review Magazine, India

EXCELLENCE IN SECURITY TRAINING


PROGRAMMES
Source: GDS Review Magazine

www.hack2secure.com | info@hack2secure.com

Вам также может понравиться