Software Security Express Courses

Secure the Software Development Lifecycle + Earn CPE Credits

Learn valuable skills in securing the software development lifecycle with ISC2 Software Security Express Courses, created by industry experts and available on demand. Grow what you know and earn CPE credits with short-format learning designed to fit your busy schedule.


Application Programming Interface (API) Security Best Practices

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

This course walks through best practices for API security, such as using secure protocols, implementing authentication and access controls, monitoring and logging API activity, and keeping software and libraries up to date. In addition, you’ll learn about the OWASP Top 10 for API Security Project, which can be leveraged for identifying and prioritizing API security risks. Other topics include measures for protecting an organization from API breaches and the concept of API technical debt.

Start Course


The Future of API Security

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

In our ever-evolving digital landscape, safeguarding your software against malicious attacks is paramount. This course explains how testing, tools and human ingenuity can work together to safeguard systems and data. By investing in software security, you can build trust with users, ensure compliance with industry standards and stay ahead of potential threats.

Start Course


Software Security: Fixing Forward at Scale in Real Life

DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS

Application programming interfaces (APIs) can be a valuable target for bad actors because they often provide access to sensitive information and systems. Cyber criminals use advanced techniques, such as zero day vulnerabilities and custom malware, to gain access to targeted systems. They also use social engineering tactics, such as phishing emails, to trick employees into providing access to their accounts. The security of APIs depends on how they are designed, implemented and maintained. It is essential to implement secure coding practices, regular security testing and audits and monitoring for suspicious activity. Additionally, organizations must ensure their APIs are compliant with industry standards and regulations.

Start Course


Why ISC2 Express Courses?

  • Stay current and demonstrate knowledge of emerging cybersecurity topics
  • Access quick, on-demand learning that fits your busy schedule
  • Earn CPE credits

With ISC2 Express Courses you get:

  • Self-paced cybersecurity education available on demand 24/7
  • Content created by leading minds in the field
  • Learning activities focused on real-world applications

Dive in and start building your knowledge today.