Course Outline
Introduction to PA software security
• Basic concepts of computer security
• Importance of software security in Public Administration
• Role of AGID guidelines in ensuring software security
AGID guidelines for software security
• Overview of the AGID guidelines
• Fundamental principles for secure software development
• Relevant laws and regulations
Secure software architecture and design
• Principles of secure architecture
• Best practices for secure software design
• Data security and identity management
Secure software development
• Secure software lifecycle
• Secure development methodologies (such as DevSecOps)
• Tools and techniques for writing secure code
Software security testing
• Static and dynamic analysis techniques
• Penetration and vulnerability testing
• Automation of security tests
Software security assessment
• Software security evaluation criteria
• Risk analysis and impact assessment
• Software security auditing and monitoring
Vulnerability and incident management
• Identification and mitigation of vulnerabilities
• Incident planning and response
• Reporting and documentation of security incidents
Regulatory compliance and compliance with AGID guidelines
• Compliance with IT security regulations
• Compliance audits and certifications
• Role of governance in the security of PA software
Focus:
• Secure software development simulations
• Practical exercises on software security assessment
Requirements
- Basic knowledge of computer science and programming principles.
- Familiarity with fundamental cybersecurity concepts.
- Understanding of network protocols and computer system architectures.
- Knowledge of data management principles and privacy protection.
- Hands-on experience in software development or information systems management.
- Ability to use basic computer tools and technologies.
Testimonials (4)
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
Hazem has a very recent experience passing the exam and knows the gotchas and the way how ISC structures their questions.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Certified Information System Security Professional (CISSP) CBK Review
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
I extracted valuable information that I will be able to present in my company as a solution to one of the processes
Paweł - Santander
Course - Public Key Infrastructure
Machine Translated