The challenge: it is difficult to make software secure once is has been programmed
Systems and applications are becoming more and more complex, and more interconnected. This expands the areas in which the systems are susceptible to attacks.Whether it's PC applications, smartphone applications, or devices as part of the Internet of Things, the development of secure software systems will become more and more important for you when looking to increase resistance to attacks. New threats must be handled appropriately at all stages of the development process.
The solution: take into account essential best practices during all stages of software development
The goal of this basic training course is to provide participants with the knowledge and the ability to assess current procedure models, methods and tools that can be used for the systematic development of secure software throughout its entire life cycle. This includes looking at security requirements and learning how to carry out threat analyses. The course also investigates the secure implementation of the software, along with testing of software for security weaknesses.The knowledge obtained from the course is then put to the test in practical workshops. An overview of the research currently done in this field is also provided.