About the training
This module focuses on secure software development practices and how they should be integrated throughout the software development life cycle. The module explores various pitfalls and mitigation techniques for software-based attacks and how to prevent the inclusion of such vulnerabilities in software.
This module focuses on secure software development practices and how they should be integrated throughout the software development life cycle. The module explores various pitfalls and mitigation techniques for software-based attacks and how to prevent the inclusion of such vulnerabilities in software.
What you will learn
LO1 Design a secure software development framework that identifies a company’s security requirements and best practices to prevent and identify software
security vulnerabilities.
LO2 Integrate secure software design best practices as part of the Software Development Life Cycle to mitigate various forms of software-based attacks.
LO3 Appraise traditional and emerging software attack techniques.
LO4 Integrate secure coding practices with a view of avoiding traditional and emerging security pitfalls.
LO5 Appraise the security of modern applications guided by traditional and modern techniques and tooling.
LO1 Design a secure software development framework that identifies a company’s security requirements and best practices to prevent and identify software
security vulnerabilities.
LO2 Integrate secure software design best practices as part of the Software Development Life Cycle to mitigate various forms of software-based attacks.
LO3 Appraise traditional and emerging software attack techniques.
LO4 Integrate secure coding practices with a view of avoiding traditional and emerging security pitfalls.
LO5 Appraise the security of modern applications guided by traditional and modern techniques and tooling.
Training information
This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Anila Mjeda: Anila.mjeda@mtu.ie
This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Anila Mjeda: Anila.mjeda@mtu.ie