CYBR487 — Secure Software Engineering
Secure approaches for designing, building, testing, and maintaining software systems. Includes threat modeling and secure SDLC practices.
Learning Objectives & Matches
Design secure software architectures following security design principles and patterns
Provide customers or installation teams guidelines for implementing secure systems.
Perform security analyses of developed or packaged software components.
Design security solutions to address known device vulnerabilities.
Design and implement Web site security measures, such as firewalls and message encryption.
Implement controls to provide security for operating systems, software, and data.
Design and deploy blockchain design patterns to make transactions secure, transparent, and immutable.
Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.
Verify stability, interoperability, portability, security, or scalability of system architecture.
Design and verify cryptographic protocols to protect private information.
Plan, coordinate, and implement network security measures to protect data, software, and hardware.
Perform threat modeling and security risk assessment for software systems
Develop presentations on threat intelligence.
Identify new threat tactics, techniques, or procedures used by cyber threat actors.
Develop and execute tests that simulate the techniques of known cyber threat actors.
Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.
Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.
Coordinate vulnerability assessments or analysis of information security systems.
Conduct predictive or reactive analyses on security measures to support cyber security initiatives.
Develop or use mathematical models to track changes in biological phenomena, such as the spread of infectious diseases.
Design and implement Web site security measures, such as firewalls and message encryption.
Gather cyber intelligence to identify vulnerabilities.
Implement security testing including SAST, DAST, and penetration testing
Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.
Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.
Test system modifications to prepare for implementation.
Identify security system weaknesses, using penetration tests.
Identify security system weaknesses, using penetration tests.
Develop testing routines and procedures.
Develop infiltration tests that exploit device vulnerabilities.
Oversee performance of risk assessment or execution of system tests to ensure the functioning of data processing activities or security measures.
Test new software packages for use in Web operations or other applications.
Develop and execute tests that simulate the techniques of known cyber threat actors.
Apply secure development lifecycle practices throughout the software development process
Provide customers or installation teams guidelines for implementing secure systems.
Perform security analyses of developed or packaged software components.
Discuss security solutions with information technology teams or management.
Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.
Develop information security standards and best practices.
Design and implement Web site security measures, such as firewalls and message encryption.
Implement Web site security measures, such as firewalls or message encryption.
Develop standards and guidelines for the use and acquisition of software and to protect vulnerable information.
Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.
Identify or implement solutions to information security problems.
Develop security requirements and security user stories for software projects