Overview/Description
Poorly written applications can allow an attacker to exploit coding errors and thus interrupt the orderly processes of the application. This course discusses methods to increase the security of application development and thwart attacker attempts to manipulate code. It also covers application and database development models and how choosing the right model supports security. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.
Target Audience
Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers