cybersecurity for software engineers
This cyber security course will cover the OWASP Top 10 most common vulnerabilities in web applications and will teach you to identify and address them before the hackers do. This cyber security knowledge will give you the edge to land your next high-paying in-demand job.
Ready to reinvent yourself and learn all about cyber security? Please fill out an application so that we can learn more about you and determine if this course is the best fit for you and your goals. As soon as we receive your application, we’ll be in contact. Get started.
Take the next step in your career as a software developer and learn how to build secure applications. This is an essential skill for those seeking senior roles in organizations facing new challenges from sophisticated hackers. In order to avoid being the next big negative story in the news, organizations are rapidly hiring and training engineers who can develop secure code. This course will cover the OWASP top 10 most common vulnerabilities in web applications. We will teach you to identify and address them before the hackers do. This knowledge will give you the edge to land your next high paying, in-demand job.
- Introduction and Threat Modeling
- Protecting Sensitive Data in Transit and at Rest
- Access Control
- Session Management
- Cross-Site Scripting
- Cross-Site Request Forgery
- Injection Issues
- Security Misconfiguration
Hassan has over 15 years of professional experience in cyber security and software development.
He has done application security consulting for companies like Google, Microsoft, Hudson’s Bay Company , 2K Games and Starbucks. His services included threat modeling, code reviews, security penetration testing, remediation, developing security applications and security training.
As a Software Design Engineer Hassan has worked on products like Windows Defender, Microsoft Skype, SolarAnywhere and Isilon. This has given him a breadth of experience in Windows, Cloud, Big Data and Unix Kernel development. He also developed tools like the Anti-XSS library and Static Code Analysis Tool for .NET that were added to Microsoft SDL.
Hassan’s extensive experience in cyber security and product development allows him to work closely with development teams to build secure products. He is also a Certified ScrumMaster, has a certificate in Machine Learning and has deep knowledge of cryptography and blockchain technologies.
|Start Date||Tuition||Enrollment Status||Campus|
2265 116th Ave NE, Ste 200
Bellevue, WA 98004
What are the pre-requisites for course?
This course requires at least a year of programming knowledge. In order to learn the cyber security principles, you should be familiar with the programming layer.
Who should take this course?
The course is designed for those seeking senior roles in organizations facing new challenges from sophisticated hackers. It is also a great course for people who want to pivot from Software engineering roles to specialize in Cyber Security in the application level.
How much time do I need to spend outside of classroom?
It can vary depending on your unique background. However, it usually takes 3-5 hours/week outside of the classroom for homework and study time.
What types of problems we will be solving as part of the course?
The business problems for demo, labs and homework will be taken from a wide variety of industries representing practical problems.
Will I be given a certificate after the completion of the course?
Yes, you will be given a certificate of completion for this course after you pass your final exam.