Cloud Developer
Details 47 Courses, 24 Hours, 29 CPE Credits
Core
Designed to provide an understanding of security principles and best practices for developing secure cloud applications with a focus on fundamentals of application security, application security risk management, and common vulnerabilities in an application.
Courses Include
- AWA 101 Fundamentals of Application Security
- AWA 102 Secure Software Concepts
- COD 152 Fundamentals of Secure Cloud Development
- COD 261 Threats to Scripts
- ENG 205 Fundamentals of Threat Modeling
Advanced
Examines security vulnerabilities, threats, and mitigations for AWS, Azure cloud computing services and Web APIs covering key concepts of cryptography and the OWASP Top 10 Threats and Mitigations. Cloud developers are educated about the consequences of the most common and most important application security weaknesses to enable developers to develop secure code and mitigate security vulnerabilities.
Courses Include
- COD 214 Creating Secure Go Applications
- COD 225-230 IoT Specialization Series (6)
- COD 241 Creating Secure Oracle Database Applications
- COD 253 Creating Secure Creating Secure AWS Cloud Applications
- COD 254 Creating Secure Azure Applications
- COD 255 Creating Secure Code – Web API Foundations
- COD 259 Node.js Threats and Vulnerabilities
- COD 267 Securing Python Microservices
- DES 202-205 Fundamentals of Cryptography Series (4)
- DES 214-218 Secure Enterprise Infrastructure Series (4)
- DES 222-231 Applying OWASP 2017 Mitigations Series (10)
Elite
Provides learners with an understanding of secure architecture and design principles while articulating security requirements to be considered during the requirements phase. This path also introduces the learner to threat modeling to help identify security design problems early in the application security design process. Developers will learn to define the attack surface of an application and how to reduce the risk to an application by minimizing the application’s attack surface, and guidelines for secure source code review.
Courses Include
- DES 101 Fundamentals of Secure Architecture
- DES 212 Architecture Risk Analysis and Remediation
- DES 311 Creating Secure Application Architecture
- ENG 191-195 Implementing the MS SDL into your SDLC Series (5)
- ENG 211 How to Create Application Security Design Requirements
- ENG 311 Attack Surface Analysis and Reduction
- ENG 312 How to Perform a Security Code Review
Details 47 Courses, 24 Hours, 29 CPE Credits
Core
Designed to provide an understanding of security principles and best practices for developing secure cloud applications with a focus on fundamentals of application security, application security risk management, and common vulnerabilities in an application.
Courses Include
- AWA 101 Fundamentals of Application Security
- AWA 102 Secure Software Concepts
- COD 152 Fundamentals of Secure Cloud Development
- COD 261 Threats to Scripts
- ENG 205 Fundamentals of Threat Modeling
Advanced
Examines security vulnerabilities, threats, and mitigations for AWS, Azure cloud computing services and Web APIs covering key concepts of cryptography and the OWASP Top 10 Threats and Mitigations. Cloud developers are educated about the consequences of the most common and most important application security weaknesses to enable developers to develop secure code and mitigate security vulnerabilities.
Courses Include
- COD 214 Creating Secure Go Applications
- COD 225-230 IoT Specialization Series (6)
- COD 241 Creating Secure Oracle Database Applications
- COD 253 Creating Secure Creating Secure AWS Cloud Applications
- COD 254 Creating Secure Azure Applications
- COD 255 Creating Secure Code – Web API Foundations
- COD 259 Node.js Threats and Vulnerabilities
- COD 267 Securing Python Microservices
- DES 202-205 Fundamentals of Cryptography Series (4)
- DES 214-218 Secure Enterprise Infrastructure Series (4)
- DES 222-231 Applying OWASP 2017 Mitigations Series (10)
Elite
Provides learners with an understanding of secure architecture and design principles while articulating security requirements to be considered during the requirements phase. This path also introduces the learner to threat modeling to help identify security design problems early in the application security design process. Developers will learn to define the attack surface of an application and how to reduce the risk to an application by minimizing the application’s attack surface, and guidelines for secure source code review.
Courses Include
- DES 101 Fundamentals of Secure Architecture
- DES 212 Architecture Risk Analysis and Remediation
- DES 311 Creating Secure Application Architecture
- ENG 191-195 Implementing the MS SDL into your SDLC Series (5)
- ENG 211 How to Create Application Security Design Requirements
- ENG 311 Attack Surface Analysis and Reduction
- ENG 312 How to Perform a Security Code Review