Course Outline
Introduction to PA software security
• Basic concepts of computer security
• Importance of software security in Public Administration
• Role of AGID guidelines in ensuring software security
AGID guidelines for software security
• Overview of the AGID guidelines
• Fundamental principles for secure software development
• Relevant laws and regulations
Secure software architecture and design
• Principles of secure architecture
• Best practices for secure software design
• Data security and identity management
Secure software development
• Secure software lifecycle
• Secure development methodologies (such as DevSecOps)
• Tools and techniques for writing secure code
Software security testing
• Static and dynamic analysis techniques
• Penetration and vulnerability testing
• Automation of security tests
Software security assessment
• Software security evaluation criteria
• Risk analysis and impact assessment
• Software security auditing and monitoring
Vulnerability and incident management
• Identification and mitigation of vulnerabilities
• Incident planning and response
• Reporting and documentation of security incidents
Regulatory compliance and compliance with AGID guidelines
• Compliance with IT security regulations
• Compliance audits and certifications
• Role of governance in the security of PA software
Focus:
• Secure software development simulations
• Practical exercises on software security assessment
Requirements
- Basic knowledge of computer science and programming principles.
- Familiarity with fundamental cybersecurity concepts.
- Understanding of network protocols and computer system architectures.
- Knowledge of data management principles and privacy protection.
- Practical experience in software development or information systems management.
- Ability to use basic computer tools and technologies.
Testimonials (5)
Multiple examples for each module and great knowledge of the trainer.
Sebastian - BRD
Course - Secure Developer Java (Inc OWASP)
Module3 Applications Attacks and Exploits, XSS, SQL injection Module4 Servers Attacks and Exploits, DOS, BOF
Tshifhiwa - Vodacom
Course - How to Write Secure Code
General course information
Paulo Gouveia - EID
Course - C/C++ Secure Coding
The trainer's subject knowledge was excellent, and the way the sessions were set out so that the audience could follow along with the demonstrations really helped to cement that knowledge, compared to just sitting and listening.
Jack Allan - RSM UK Management Ltd.
Course - Secure Developer .NET (Inc OWASP)
Nothing it was perfect.