CYBR437 — Secure Coding

3 credits Catalog-Derived

Secure program characteristics and vulnerabilities. Topics include buffer overflows, injection attacks, and secure coding standards in Java, C, and C++.

5
Objectives
39
Matches
39
Reviewed
12
Occupations
Your experience with this course
Top occupation matches for this course
56.3% Software Quality Assurance Analysts 27t
66.2% Penetration Testers 21t
66.6% Information Security Engineers 20t
55.3% Web Administrators 16t
53.0% Computer Systems Engineers/Architec 13t

Learning Objectives & Matches

LO1

Write secure code in multiple programming languages following security best practices

9 O*NET task matches
Batch:
Web Developers 4.6/5
42% ok

Write supporting code for Web applications or Web sites.

Claude Opus 4.6 denied
Data Scientists
39% ok

Write new functions or applications in programming languages to conduct analyses.

Claude Opus 4.6 denied
Web Developers 4.2/5
36% ok

Select programming languages, design tools, or applications.

Claude Opus 4.6 denied
Computer Systems Engineers/Arc 3.7/5
36% ok

Perform security analyses of developed or packaged software components.

Claude Opus 4.6 denied
Mathematicians 2.8/5
35% ok

Design, analyze, and decipher encryption systems designed to transmit military, political, financial, or law-enforcement-related information in code.

Claude Opus 4.6 denied
Biostatisticians 4.3/5
34% ok

Write program code to analyze data with statistical analysis software.

Claude Opus 4.6 denied
Web Developers 4.1/5
33% ok

Evaluate code to ensure that it is valid, is properly structured, meets industry standards, and is compatible with browsers, devices, or operating systems.

Claude Opus 4.6 denied
Information Security Engineers 4.1/5
32% ok

Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.

Claude Opus 4.6 denied
Blockchain Engineers
31% ok

Design and verify cryptographic protocols to protect private information.

Claude Opus 4.6 denied
LO2

Identify and remediate security vulnerabilities including buffer overflows, injection attacks, and authentication flaws

10 O*NET task matches
Batch:
Information Security Engineers 4.3/5
67% ok

Scan networks, using vulnerability assessment tools to identify vulnerabilities.

Claude Opus 4.6 approved at 400
Penetration Testers
66% ok

Gather cyber intelligence to identify vulnerabilities.

Claude Opus 4.6 denied
Blockchain Engineers
66% ok

Implement catastrophic failure handlers to identify security breaches and prevent serious damage.

Claude Opus 4.6 denied
Penetration Testers
65% ok

Prepare and submit reports describing the results of security fixes.

Claude Opus 4.6 approved at 400
Information Security Engineers 4.2/5
64% ok

Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.

Claude Opus 4.6 approved at 400
Information Security Engineers 3.8/5
64% ok

Coordinate vulnerability assessments or analysis of information security systems.

Claude Opus 4.6 approved at 400
Information Security Engineers 4.6/5
64% ok

Identify security system weaknesses, using penetration tests.

Claude Opus 4.6 approved at 400
Penetration Testers
64% ok

Identify security system weaknesses, using penetration tests.

Claude Opus 4.6 approved at 400
Digital Forensics Analysts
63% ok

Identify or develop reverse-engineering tools to improve system capabilities or detect vulnerabilities.

Claude Opus 4.6 denied
Information Security Engineers 3.9/5
62% ok

Identify or implement solutions to information security problems.

Claude Opus 4.6 approved at 400
LO3

Perform security code reviews and static analysis to identify vulnerabilities

10 O*NET task matches
Batch:
Penetration Testers
59% ok

Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.

Claude Opus 4.6 approved at 300
Penetration Testers
59% ok

Design security solutions to address known device vulnerabilities.

Claude Opus 4.6 approved at 300
Information Security Engineers 3.7/5
53% ok

Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.

Claude Opus 4.6 approved at 300
Web Developers 3.7/5
52% ok

Monitor security system performance logs to identify problems and notify security specialists when problems occur.

Claude Opus 4.6 denied
Penetration Testers
52% ok

Develop infiltration tests that exploit device vulnerabilities.

Claude Opus 4.6 approved at 300
Computer Systems Engineers/Arc 3.7/5
52% ok

Perform security analyses of developed or packaged software components.

Claude Opus 4.6 approved at 300
Information Security Engineers 3.7/5
52% ok

Troubleshoot security and network problems.

Claude Opus 4.6 approved at 300
Computer Systems Engineers/Arc 3.9/5
52% ok

Research, test, or verify proper functioning of software patches and fixes.

Claude Opus 4.6 denied
Web Administrators 4.8/5
52% ok

Monitor systems for intrusions or denial of service attacks, and report security breaches to appropriate personnel.

Claude Opus 4.6 denied
Information Security Engineers 4.2/5
51% ok

Develop response and recovery strategies for security breaches.

Claude Opus 4.6 approved at 300
LO4

Implement input validation, output encoding, and proper error handling

0 O*NET task matches
Batch:
No O*NET task matches for this objective.
LO5

Apply secure coding standards including CERT, OWASP, and CWE guidelines

10 O*NET task matches
Batch:
Information Security Engineers 3.9/5
62% ok

Develop information security standards and best practices.

Claude Opus 4.6 approved at 400
Database Administrators 3.4/5
61% ok

Develop standards and guidelines for the use and acquisition of software and to protect vulnerable information.

Claude Opus 4.6 denied
Web Developers 4.1/5
57% ok

Evaluate code to ensure that it is valid, is properly structured, meets industry standards, and is compatible with browsers, devices, or operating systems.

Claude Opus 4.6 denied
Software Quality Assurance Ana 3.7/5
56% ok

Identify program deviance from standards, and suggest modifications to ensure compliance.

Claude Opus 4.6 denied
Database Architects 4.0/5
55% ok

Create and enforce database development standards.

Claude Opus 4.6 denied
Web Administrators 4.5/5
52% ok

Identify, standardize, and communicate levels of access and security.

Claude Opus 4.6 denied
Computer Systems Engineers/Arc 4.2/5
50% ok

Provide customers or installation teams guidelines for implementing secure systems.

Claude Opus 4.6 approved at 300
Information Security Engineers 3.8/5
50% ok

Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.

Claude Opus 4.6 approved at 200
Mathematicians 2.8/5
48% ok

Design, analyze, and decipher encryption systems designed to transmit military, political, financial, or law-enforcement-related information in code.

Claude Opus 4.6 denied
Blockchain Engineers
46% ok

Design and verify cryptographic protocols to protect private information.

Claude Opus 4.6 denied
Source: Derived from EWU catalog · Matches via cosine similarity (all-MiniLM-L6-v2, 384-dim embeddings)