Software Security Express Courses
Secure the Software Development Lifecycle + Earn CPE Credits
Learn valuable skills in securing the software development lifecycle with ISC2 Software Security Express Courses, created by industry experts and available on demand. Grow what you know and earn CPE credits with short-format learning designed to fit your busy schedule.
Application Programming Interface (API) Security Best Practices
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
This course walks through best practices for API security, such as using secure protocols, implementing authentication and access controls, monitoring and logging API activity, and keeping software and libraries up to date. In addition, you’ll learn about the OWASP Top 10 for API Security Project, which can be leveraged for identifying and prioritizing API security risks. Other topics include measures for protecting an organization from API breaches and the concept of API technical debt.
The Future of API Security
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
In our ever-evolving digital landscape, safeguarding your software against malicious attacks is paramount. This course explains how testing, tools and human ingenuity can work together to safeguard systems and data. By investing in software security, you can build trust with users, ensure compliance with industry standards and stay ahead of potential threats.
Software Security: Fixing Forward at Scale in Real Life
DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Application programming interfaces (APIs) can be a valuable target for bad actors because they often provide access to sensitive information and systems. Cyber criminals use advanced techniques, such as zero day vulnerabilities and custom malware, to gain access to targeted systems. They also use social engineering tactics, such as phishing emails, to trick employees into providing access to their accounts. The security of APIs depends on how they are designed, implemented and maintained. It is essential to implement secure coding practices, regular security testing and audits and monitoring for suspicious activity. Additionally, organizations must ensure their APIs are compliant with industry standards and regulations.
Why ISC2 Express Courses?
- Stay current and demonstrate knowledge of emerging cybersecurity topics
- Access quick, on-demand learning that fits your busy schedule
- Earn CPE credits
With ISC2 Express Courses you get:
- Self-paced cybersecurity education available on demand 24/7
- Content created by leading minds in the field
- Learning activities focused on real-world applications
Dive in and start building your knowledge today.