Course Overview
Over 80% of security breaches exploit software vulnerabilities, yet most teams address security after the code is written, leaving organizations at risk. The Cyber Secure Coder (CSC) course empowers software developers, testers, and architects to build secure, resilient applications by integrating security into every phase of the software development lifecycle.
The CertNexus Cyber Secure Coder (CSC) program guides you through the entire software development lifecycle, emphasizing a security-by-design approach to reduce the risk of security defects, misconfiguration, and vulnerabilities that can undermine your code. Through hands-on labs and real-world scenarios, you’ll learn to eliminate vulnerabilities, find and correct security defects, and design a secure architecture for both new and deployed software. CSC-210 covers secure coding practices, vulnerability assessment, threat modeling, and strategies for maintaining software security long after deployment.
What Is Included
- Expert-led instruction: Learn from certified instructors with real-world experience in secure software development and vulnerability management.
- 90-day access to class recordings: Rewatch instructor-led CSC sessions at your convenience for up to 90 days after completion.
- Guaranteed-to-run courses: We never cancel a scheduled Cyber Secure Coder course.
- Flexible rescheduling: Reschedule if needed (see conditions).
- Free course retake option: Retake the CSC course at no additional cost (see conditions).
- CertNexus official courseware: Up-to-date materials aligned with the latest Cyber Secure Coder (CSC) exam objectives.
Course Objectives
This course provides the skills and strategies to create secure software and manage risk at every stage. You will learn to:
- Employ secure software development best practices
- Identify security requirements for your projects
- Eliminate vulnerabilities and misconfigurations in code
- Use a security-by-design approach to architect secure systems
- Protect users and sensitive data with common controls
- Apply testing methods to find and fix security defects
- Maintain deployed software to ensure ongoing security
Who Should Attend?
This course is designed for software developers, testers, and architects who design and develop software in various programming languages and platforms, including desktop, web, cloud, and mobile, and who want to improve their ability to deliver software that is of high quality, particularly regarding security and privacy. This course is also designed for students who are seeking the CertNexus Cyber Secure Coder (CSC) Exam CSC-210 certification.
Course Prerequisites
What’s included?
- Authorized Courseware
- Intensive Hands on Skills Development with an Experienced Subject Matter Expert
- Hands-on practice on real Servers and extended lab support 1.800.482.3172
- Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
- Academy Code of Honor: Test Pass Guarantee
- Optional: Package for Hotel Accommodations, Lunch and Transportation
With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.
Methods
- Instructor-Led (the best training format we offer)
- Live Online Classroom – Online Instructor-Led
- Self-Paced Video
Speak to an Admissions Representative for complete details
| Start | Finish | Public Price | Public Enroll | Private Price | Private Enroll |
|---|---|---|---|---|---|
| 12/8/2025 | 12/12/2025 | ||||
| 12/29/2025 | 1/2/2026 | ||||
| 1/19/2026 | 1/23/2026 | ||||
| 2/9/2026 | 2/13/2026 | ||||
| 3/2/2026 | 3/6/2026 | ||||
| 3/23/2026 | 3/27/2026 | ||||
| 4/13/2026 | 4/17/2026 | ||||
| 5/4/2026 | 5/8/2026 | ||||
| 5/25/2026 | 5/29/2026 | ||||
| 6/15/2026 | 6/19/2026 | ||||
| 7/6/2026 | 7/10/2026 | ||||
| 7/27/2026 | 7/31/2026 | ||||
| 8/17/2026 | 8/21/2026 | ||||
| 9/7/2026 | 9/11/2026 | ||||
| 9/28/2026 | 10/2/2026 | ||||
| 10/19/2026 | 10/23/2026 | ||||
| 11/9/2026 | 11/13/2026 | ||||
| 11/30/2026 | 12/4/2026 | ||||
| 12/21/2026 | 12/25/2026 | ||||
| 1/11/2027 | 1/15/2027 |
Agenda
Duration
3 Days
1 – Identify Security Requirements and Expectations
- Security throughout the development process
- Business, compliance, and user requirements
- Identifying factors undermining software security
- Recognizing vulnerabilities and attack patterns
- Gathering vulnerability intelligence
2 – Handling Vulnerabilities
- Addressing software defects and misconfiguration
- Managing risks from third-party code
- Handling human factors and social engineering
- Improving development process security
3 – Designing for Security
- Applying secure design principles (OWASP, defense in depth, least privilege)
- Threat modeling and risk assessment
- Identifying and countering specific threats
4 – Developing Secure Code
- Secure coding best practices and checklists
- Avoiding common programming errors (buffer overflows, input validation, etc.)
- Preventing platform, privacy, and web/mobile vulnerabilities
5 – Implementing Common Protections
- Access control, authentication, and session management
- Protecting data in transit and at rest (encryption, PKI)
- Secure error handling, logging, and output restrictions
- Preventing SQL injection and securing database access
6 – Testing Software Security
- Security testing phases and strategies
- Static and dynamic code analysis
- Automated tools for vulnerability detection
7 – Maintaining Security in Deployed Software
- Monitoring and logging applications
- Ongoing patch management and maintenance
- Secure deprovisioning and uninstallation
