Certified Software Security Professional
- Offered byVSkills
Certified Software Security Professional at VSkills Overview
Duration | 12 hours |
Total fee | ₹3,499 |
Mode of learning | Online |
Credential | Certificate |
Certified Software Security Professional at VSkills Highlights
- Earn a certificate of completion from Vskills
- Get Lifelong e-learning access
Certified Software Security Professional at VSkills Course details
- For professionals and graduates wanting to excel in their chosen areas
- For those who are already working and would like to take certification for further career progression
- This certification for Software Security Professional assesses the candidate for a company’s secured software development needs
- The certification tests the candidates on various areas in software security which includes knowledge of various types of security attacks and countermeasures on programming language (C/C++, Java and .Net), web applications, web services, SOA-based application, and mobile applications and tools used
- Earning Vskills Software Security Professional Certification can help candidate differentiate in today's competitive job market, broaden their employment opportunities by displaying their advanced skills, and result in higher earning potential
Certified Software Security Professional at VSkills Curriculum
Security Concepts
Digital Asset
Security Principles
Authentication
Vulnerability
Security Models
Security Models
Trust Models, Trusted Computing and TPM
Access Controls
Security Planning and Policy
Security Planning
Risk Assessment for Security
Security Policies and Guidelines
Security Attacks
Computer Security
Security Attack Classes
System Attacks
Network Attacks
Authentication Attacks
Spoofing Attacks
Social Engineering
Programming Attacks
Memory Corruption
Buffer Overflow
Stack Smashing
Code Injection
Integer Overflows
Heap Corruption
Globbing Hacks
Format String Attack
Cryptography
Cryptography Basics
Evolution and Data Encryption Methods
Symmetric and Asymmetric key Cryptography
Private and Public Key Exchange
Stream and Block Ciphers
Secret Key Cryptography
Message Authentication and Hash Functions
Digital Signatures and Public Key Infrastructure