Introduction to the Program

This Postgraduate certificate will teach you how to establish the necessary requirements for the correct operation of an application, in a safe way" 

##IMAGE##

All developers face the challenge of making quality and secure application code, since in today's application ecosystem, any code or system vulnerability will lead to data loss, exposure and theft, as well as other problems caused by cyber-attacks.

It is the developer's obligation to be familiar with the different environments and phases through which their code will pass and to ensure that it works, in any of them, in the most efficient and secure way.

In addition, they have to know the needs and dependencies of their application to function and try to minimize the use of modules and functions, in order to reduce the attack surface. Understanding the methodologies and the type of tests to be performed will decrease, therefore, the time to resolve issues and verify the code.

A fully up-to-date Postgraduate certificate that will allow you to grow as a professional in a field that requires specialists who are fully up to date in all aspects of this unit. 

A high education process created to be affordable and flexible, with the most interesting methodology of online teaching" 

This Postgraduate certificate in Secure Development in Cybersecurity contains the most complete and up-to-date program on the market. The most important features include:

  • The development of case studies presented by cybersecurity experts
  • The graphic, schematic, and practical contents with which they are created, provide scientific and practical information on the disciplines that are essential for professional practice
  • Practical exercises where self-assessment can be used to improve learning
  • Its special emphasis on innovative methodologies in Advanced Practice Nursing
  • Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
  • Content that is accessible from any fixed or portable device with an Internet connection

Acquire the necessary information to create protection systems that guarantee the security of the programs and applications you work with at all times"

The program’s teaching staff includes professionals from the sector who contribute their work experience to this training program, as well as renowned specialists from leading societies and prestigious universities.

The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide immersive specialization programmed to learn in real situations.

This program is designed around Problem-Based Learning, whereby the professional must try to solve the different professional practice situations that arise throughout the program. This will be done with the help of an innovative system of interactive videos made by renowned experts.

Study through a practice-focused Postgraduate certificate to boost your skills to the level of a specialist"

##IMAGE##

You will learn how to generate a clean, easily verifiable and quality code"

Syllabus

In this Postgraduate certificate, a complete learning process is developed that will lead the student to acquire the competencies needed to carry out safe developments in all contexts. To this end, it has been structured with a view to the efficient acquisition of complementary learning, which will promote the acquisition of hands-on content and consolidate what has been studied, providing students with the capacity to intervene as quickly as possible. A high-intensity, high-quality course created to educate the best in the industry. 

##IMAGE##

All aspects that the developer must apply to ensure the cybersecurity of their codes, through a study approach focused on efficiency" 

Module 1. Secure Development  

1.1. Secure Development

1.1.1. Quality, Functionality and Safety
1.1.2. Confidentiality, Integrity and Availability
1.1.3. Software Development Life Cycle

1.2. Requirements Phase

1.2.1. Authentication Control
1.2.2. Role and Privilege Control
1.2.3. Risk-oriented Requirements
1.2.4. Privilege Approval

1.3. Analysis and Design Phases

1.3.1. Component Access and System Administration
1.3.2. Audit Trails
1.3.3. Session Management
1.3.4. Historical data
1.3.5. Proper Error Handling
1.3.6. Separation of Functions

1.4. Implementation and Coding Phase

1.4.1. Ensuring the Development Environment
1.4.2. Preparation of Technical Documentation
1.4.3. Secure Codification
1.4.4. Communications Security

1.5. Good Secure Coding Practices

1.5.1. Input Data Validation
1.5.2. Coding of Output Data
1.5.3. Programming Style
1.5.4. Change Log Management
1.5.5. Cryptographic Practices
1.5.6. Error and Log Management
1.5.7. File Management
1.5.8. Memory Management
1.5.9. Standardization and Reuse of Security Functions

1.6. Server Preparation and Hardening

1.6.1. Management of Users, Groups and Roles on the Server
1.6.2. Software Installation
1.6.3. Server Hardening 
1.6.4. Robust Configuration of the Application Environment

1.7. DB Preparation and Hardening

1.7.1. DB Engine Optimization
1.7.2. Create Your Own User for the Application
1.7.3. Assigning the Required Privileges to the User
1.7.4. Hardening of the BBDD

1.8. Testing Phase

1.8.1. Quality Control in Security Controls
1.8.2. Phased Code Inspection
1.8.3. Checking Configuration Management
1.8.4. Black Box Testing

1.9. Preparing the Transition to Production

1.9.1. Perform Change Control
1.9.2. Carry out Production Changeover Procedure
1.9.3. Perform Rollback Procedure
1.9.4. Pre-production Testing

1.10. Maintenance Phase

1.10.1. Risk-Based Assurance
1.10.2. White Box Security Maintenance Testing
1.10.3. Black box Safety Maintenance Tests

##IMAGE##

A unique specialization program that will allow you to acquire advanced training in this field"

Postgraduate Certificate in Secure Development in Cybersecurity

It is a challenge for developers to create quality and secure application code in today's application ecosystem. In fact, vulnerabilities within the code or system can lead to data loss, exposure and theft, as well as other problems caused by cyber-attacks. It is the IT person's responsibility to understand the different environments and phases that their code will go through and ensure that it works efficiently in each of them. And via this course, you will be able to update yourself with this Postgraduate Certificate in Secure Development in Cybersecurity.

Become an expert in Secure Coding

The Postgraduate Certificate in Secure Development in Cybersecurity goes through the life cycle of Software development over an academic course in which you will analyze the authentication control or the basics of Secure Coding. In fact, you will only need to invest 150 hours to position yourself as a professional in this field without leaving home. This is made possible by dynamic interactive diagrams, detailed videos and self-assessment exercises available to you 24 hours a day.