Course Outline
Introduction to Software Security for Public Administration
• Basic Concepts of Information Security
• Importance of Software Security in Public Administration
• Role of AGID Guidelines in Ensuring Software Security
AGID Guidelines for Software Security
• Overview of AGID Guidelines
• Fundamental Principles for Secure Software Development
• Relevant Regulations and Laws
Secure Software Architecture and Design
• Principles of Secure Architecture
• Best Practices for Secure Software Design
• Data Security and Identity Management
Secure Software Development
• Secure Software Lifecycle
• Secure Development Methodologies (such as DevSecOps)
• Tools and Techniques for Writing Secure Code
Software Security Testing
• Static and Dynamic Analysis Techniques
• Penetration Testing and Vulnerability Assessment
• Automation of Security Testing
Software Security Evaluation
• Criteria for Evaluating Software Security
• Risk Analysis and Impact Assessment
• Security Auditing and Monitoring
Vulnerability Management and Incident Handling
• Identification and Mitigation of Vulnerabilities
• Incident Planning and Response
• Security Incident Reporting and Documentation
Regulatory Compliance and Conformance to AGID Guidelines
• Compliance with Information Security Regulations
• Conformity Audits and Certifications
• Role of Governance in Software Security for Public Administration
Focus:
• Simulations of Secure Software Development
• Practical Exercises on Software Security Evaluation
Requirements
- Basic knowledge of computing and programming principles.
- Familiarity with fundamental concepts of cybersecurity.
- Understanding of network protocols and information system architectures.
- Knowledge of data management principles and privacy protection.
- Practical experience in software development or IT system management.
- Ability to use basic IT tools and technologies.
Testimonials (5)
Multiple examples for each module and great knowledge of the trainer.
Sebastian - BRD
Course - Secure Developer Java (Inc OWASP)
Module3 Applications Attacks and Exploits, XSS, SQL injection Module4 Servers Attacks and Exploits, DOS, BOF
Tshifhiwa - Vodacom
Course - How to Write Secure Code
General course information
Paulo Gouveia - EID
Course - C/C++ Secure Coding
The trainer's subject knowledge was excellent, and the way the sessions were set out so that the audience could follow along with the demonstrations really helped to cement that knowledge, compared to just sitting and listening.
Jack Allan - RSM UK Management Ltd.
Course - Secure Developer .NET (Inc OWASP)
Nothing it was perfect.