SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
Certified Software Security
Professional
VS-1086
Certified Software Security Professional
www.vskills.in
CCCCertifiedertifiedertifiedertified Software Security ProfessionalSoftware Security ProfessionalSoftware Security ProfessionalSoftware Security Professional
Certification CodeCertification CodeCertification CodeCertification Code VS-1086
Vskills certification for Software Security Professional assesses the candidate for a
company’s secured software development needs. The certification tests the candidates on
various areas in software security which includes knowledge of various types of security
attacks and countermeasures on programming language (C/C++, Java and .Net), web
applications, web services, SOA-based application, and mobile applications and tools used.
Why should one take this certification?Why should one take this certification?Why should one take this certification?Why should one take this certification?
This Course is intended for professionals and graduates wanting to excel in their chosen
areas. It is also well suited for those who are already working and would like to take
certification for further career progression.
Earning Vskills Software Security Professional Certification can help candidate differentiate
in today's competitive job market, broaden their employment opportunities by displaying
their advanced skills, and result in higher earning potential.
Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?
Job seekers looking to find employment in IT or software development department of
various software development companies in public or private sector, students generally
wanting to improve their skill set and make their CV stronger and existing employees
looking for a better role can prove their employers the value of their skills through this
certification
Test DetailsTest DetailsTest DetailsTest Details
• Duration:Duration:Duration:Duration: 60 minutes
• No. of questions:No. of questions:No. of questions:No. of questions: 50
• Maximum marks:Maximum marks:Maximum marks:Maximum marks: 50, Passing marks: 25 (50%)
There is no negative marking in this module.
Fee StructureFee StructureFee StructureFee Structure
Rs. 4,000/- (Includes all taxes)
Companies that hire Vskills CertifiedCompanies that hire Vskills CertifiedCompanies that hire Vskills CertifiedCompanies that hire Vskills Certified Software Security ProfessionalSoftware Security ProfessionalSoftware Security ProfessionalSoftware Security Professional
Software security professionals are in great demand. Companies specializing in
development and testing of software are constantly hiring knowledgeable software security
professionals.
Certified Software Security Professional
www.vskills.in
Table of Contents
1.1.1.1. IntroductionIntroductionIntroductionIntroduction
1.1 Digital assets
1.2 Need for computer security
1.3 Risk and vulnerabilities
2.2.2.2. AttacksAttacksAttacksAttacks,,,, Security andSecurity andSecurity andSecurity and MeasuresMeasuresMeasuresMeasures
2.1 Evolution and attack types
2.2 Attack tools
2.3 Security levels
2.4 Security Standards
3.3.3.3. Secured Software CycleSecured Software CycleSecured Software CycleSecured Software Cycle
3.1 Security Lifecycle
3.2 Security Requirements
3.3 Security use cases and modeling
3.4 Security Design and authentication
3.5 Secured coding techniques and review
3.6 Security testing and remediation
4.4.4.4. C/C+ programmingC/C+ programmingC/C+ programmingC/C+ programming
4.1 UNIX/Linux and C/C++ evolution
4.2 Attack types and countermeasures in C/C++
4.3 UNIX security and privileges
4.4 UNIX network programming
5.5.5.5. WindowsWindowsWindowsWindows programmingprogrammingprogrammingprogramming
5.1 Windows Security
5.2 .Net components and runtime security
5.3 .Net security design
5.4 Identity, principal and permission
5.5 Security techniques (type safety, role based and code access)
5.6 ASP.NET and remoting security
6.6.6.6. Java programmingJava programmingJava programmingJava programming
6.1 Java architecture and platform security
6.2 Cryptography API and secure sockets
6.3 JSSE and Java sandbox
6.4 Applets and swing security
7.7.7.7. SOASOASOASOA----based securitybased securitybased securitybased security
7.1 TCP/IP protocols and socket security
7.2 SOA basics and challenges
Certified Software Security Professional
www.vskills.in
7.3 RPC and RMI security
7.4 DCOM and ActiveX security
8.8.8.8. Web ApplicationsWeb ApplicationsWeb ApplicationsWeb Applications SecuritySecuritySecuritySecurity
8.1 Web security concepts
8.2 Identity management techniques
8.3 PKI and future
8.4 Attack techniques (code injection and parameter passing)
8.5 Emerging attack types and AVDL
9.9.9.9. Securing MobileSecuring MobileSecuring MobileSecuring Mobile
9.1 Mobile computing architecture and networks
9.2 NGN concepts and security
9.3 J2ME, Java card and USIM security
9.4 Securing WAP, mobile agents and mobile networks
9.5 Windows mobile security
10.10.10.10. Advance Java SecurityAdvance Java SecurityAdvance Java SecurityAdvance Java Security
10.1 Servlet Security
10.2 Securing JSP, Java struts, JSF and EJB
11.11.11.11. AdvanceAdvanceAdvanceAdvance Web ServicesWeb ServicesWeb ServicesWeb Services
11.1 Web service security model and standards
11.2 XML attacks and SSL usage
11.3 OFX and IFX
Certified Software Security Professional
www.vskills.in
Course OutlineCourse OutlineCourse OutlineCourse Outline
IntroductionIntroductionIntroductionIntroduction
Understanding the relevance and identification of digital assets
Illustrating the need for computer security in an organization
Describing the concept of risk and vulnerabilities as applied to security paradigm
AttacksAttacksAttacksAttacks,,,, Security andSecurity andSecurity andSecurity and MeasuresMeasuresMeasuresMeasures
Detailing the evolution and different types of security attacks like spoofing, DoS, etc.
Enlisting the various attack tools like ethereal, tcpdump, etc.
Explaining security at various levels like database, network, computer, etc.
Describing the different security standards and bodies like NIST, OWASP, etc.
Secured Software CycleSecured Software CycleSecured Software CycleSecured Software Cycle
Illustrating the concept of security lifecycle which includes various phases of security
requirements, security use cases and modeling, security design and authentication,
secured coding techniques and review and the concluding phase of lifecycle, security
testing and remediation
C/C+ programmingC/C+ programmingC/C+ programmingC/C+ programming
Describing the evolution of C/C++ and their growth with UNIX or Linux
Understanding the different types of attack and countermeasures in C/C++
Explaining the concept of UNIX security and privileges for maintaining security
Detailing the techniques for security implementation in UNIX network programs
Windows programmingWindows programmingWindows programmingWindows programming
Illustrating the windows security architecture for windows operating system
Describing the various components of .Net technology stack of Microsoft and
implementation of .Net runtime security and the .Net security design
Explaining the concept of identity, principal and permission in .Net
Detailing the various security techniques as type safety, role based, code access, etc.
Understanding the concept of ASP.NET for web application and remoting security
Java programmingJava programmingJava programmingJava programming
Describing the basics of Java architecture and it’s platform security
Illustrating the usage of cryptography API for secured sockets
Explaining JSSE for non-secured sockets and Java sandbox for secured environment
Detailing the various methods for applets and swing security
SOASOASOASOA----based securitybased securitybased securitybased security
Understanding the TCP/IP protocols and socket security associated with them
Describing the basics and security challenges for service oriented architecture
Detailing the security techniques for remote procedure call (RPC), remote method
Invocation (RMI), distributed COM (DCOM) and ActiveX technology
Certified Software Security Professional
www.vskills.in
Web ApplicationsWeb ApplicationsWeb ApplicationsWeb Applications SecuritySecuritySecuritySecurity
Explaining the concepts of web security and various techniques for identity
management for web applications
Understanding basics of public key infrastructure (PKI) and emerging technologies
Describing the various attack techniques like code injection and parameter passing
Detailing the new attack types like JSON pair injection, JS array poisoning, etc. and
the concept of application vulnerability description language (AVDL) for countering
Securing MobileSecuring MobileSecuring MobileSecuring Mobile
Understanding the architecture of mobile computing and concept of mobile networks
Describing the basics of next generation networks (NGN) and security architecture
Illustrating the various security techniques for J2ME, Java card and USIM
Detailing the process to secure WAP, mobile agents and mobile networks
Explaining the implementation of security to windows OS based mobiles
Advance Java SecurityAdvance Java SecurityAdvance Java SecurityAdvance Java Security
Illustrating the different techniques for servlet security
Describing the process to secure JSP, Java struts, JSF and EJB
AdvanceAdvanceAdvanceAdvance Web ServicesWeb ServicesWeb ServicesWeb Services
Understanding the different web service security model like WS-security, P2P
security, etc. and the concept of web service security standards
Explaining the various types of XML attacks and usage of SSL for web services
Describing the financial transaction security as implemented by open financial
exchange (OFX) and interactive financial exchange (IFX)
Certified Software Security Professional
www.vskills.in
Sample QuestionsSample QuestionsSample QuestionsSample Questions
1.1.1.1. TheTheTheThe term AJAX refers toterm AJAX refers toterm AJAX refers toterm AJAX refers to _____________._____________._____________._____________.
A. Asynchronous JavaSwing and XML
B. Asynchronous JavaScript and XML
C. Asynchronous Java and XML
D. None of the above
2222. T. T. T. Thehehehe namenamenamename of an openof an openof an openof an open----source IDsource IDsource IDsource ID isisisis _____________._____________._____________._____________.
A. Ethereal
B. Snort
C. TcpDump
D. None of the above
3333. Usually, TLS provides data communication security over. Usually, TLS provides data communication security over. Usually, TLS provides data communication security over. Usually, TLS provides data communication security over _____________._____________._____________._____________.
A. Remote network
B. Private networks
C. Public networks
D. None of the above
4444.... TheTheTheThe term AES expands toterm AES expands toterm AES expands toterm AES expands to _____________._____________._____________._____________.
A. Advanced encryption specification
B. Advanced encryption standard
C. Advanced encoding standard
D. None of the above
5555. The. The. The. The methodology used by Microsoft for threat modeling ismethodology used by Microsoft for threat modeling ismethodology used by Microsoft for threat modeling ismethodology used by Microsoft for threat modeling is _____________._____________._____________._____________.
A. STRIDE
B. COMPASS
C. RENUN
D. None of the above
Answers: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)
Software Security Certification

Contenu connexe

Tendances

Application_security_Strategic
Application_security_StrategicApplication_security_Strategic
Application_security_Strategic
Ramesh VG
 
Secure development of code
Secure development of codeSecure development of code
Secure development of code
SalomeVictor
 
Python For Droid
Python For DroidPython For Droid
Python For Droid
Rich Helton
 
Framework for Safety Critical System Software
Framework for Safety Critical System SoftwareFramework for Safety Critical System Software
Framework for Safety Critical System Software
ijtsrd
 
Dupressoir
DupressoirDupressoir
Dupressoir
anesah
 
Secure Application Development Training
Secure Application Development TrainingSecure Application Development Training
Secure Application Development Training
pivotalsecurity
 
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
Stephan Chenette
 

Tendances (19)

Op2423922398
Op2423922398Op2423922398
Op2423922398
 
Cyber-Security Certifications
Cyber-Security CertificationsCyber-Security Certifications
Cyber-Security Certifications
 
App Sec Eu08 Sec Frm Not In Code
App Sec Eu08 Sec Frm Not In CodeApp Sec Eu08 Sec Frm Not In Code
App Sec Eu08 Sec Frm Not In Code
 
[ITAS.VN]CxSuite Enterprise Edition
[ITAS.VN]CxSuite Enterprise Edition[ITAS.VN]CxSuite Enterprise Edition
[ITAS.VN]CxSuite Enterprise Edition
 
Android Secure Coding
Android Secure CodingAndroid Secure Coding
Android Secure Coding
 
SVILUPPO WEB E SICUREZZA NEL 2014
SVILUPPO WEB E SICUREZZA NEL 2014SVILUPPO WEB E SICUREZZA NEL 2014
SVILUPPO WEB E SICUREZZA NEL 2014
 
Application_security_Strategic
Application_security_StrategicApplication_security_Strategic
Application_security_Strategic
 
Secure development of code
Secure development of codeSecure development of code
Secure development of code
 
ProGuard vs DexGuard
ProGuard vs DexGuardProGuard vs DexGuard
ProGuard vs DexGuard
 
Python For Droid
Python For DroidPython For Droid
Python For Droid
 
Python Final
Python FinalPython Final
Python Final
 
Safe Code Software Integrity Controls0610
Safe Code Software Integrity Controls0610Safe Code Software Integrity Controls0610
Safe Code Software Integrity Controls0610
 
Framework for Safety Critical System Software
Framework for Safety Critical System SoftwareFramework for Safety Critical System Software
Framework for Safety Critical System Software
 
Dupressoir
DupressoirDupressoir
Dupressoir
 
Secure Application Development Training
Secure Application Development TrainingSecure Application Development Training
Secure Application Development Training
 
Mudassar_Yash Technologies AB_CV
Mudassar_Yash Technologies AB_CVMudassar_Yash Technologies AB_CV
Mudassar_Yash Technologies AB_CV
 
Secure JEE Architecture and Programming 101
Secure JEE Architecture and Programming 101Secure JEE Architecture and Programming 101
Secure JEE Architecture and Programming 101
 
First Steps in Android
First Steps in AndroidFirst Steps in Android
First Steps in Android
 
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
 

En vedette

En vedette (9)

Compensation and benefits manager certification
Compensation and benefits manager certificationCompensation and benefits manager certification
Compensation and benefits manager certification
 
Financial Risk management Certification
Financial Risk management CertificationFinancial Risk management Certification
Financial Risk management Certification
 
Vskills Certified Brand Manager
Vskills Certified Brand ManagerVskills Certified Brand Manager
Vskills Certified Brand Manager
 
SEO Certification
SEO CertificationSEO Certification
SEO Certification
 
fitness instructor certification
fitness instructor certificationfitness instructor certification
fitness instructor certification
 
services marketing manager certification
services marketing manager certificationservices marketing manager certification
services marketing manager certification
 
SVG Certification
SVG CertificationSVG Certification
SVG Certification
 
Selenium Certification
Selenium CertificationSelenium Certification
Selenium Certification
 
gaap accounting standards Certification
gaap accounting standards Certificationgaap accounting standards Certification
gaap accounting standards Certification
 

Similaire à Software Security Certification

Similaire à Software Security Certification (20)

Network Security Certification
Network Security CertificationNetwork Security Certification
Network Security Certification
 
EC-Council secure programmer. net
EC-Council secure programmer. netEC-Council secure programmer. net
EC-Council secure programmer. net
 
EC-Council Secure Programmer Java
EC-Council Secure Programmer JavaEC-Council Secure Programmer Java
EC-Council Secure Programmer Java
 
Security Process in DevSecOps
Security Process in DevSecOpsSecurity Process in DevSecOps
Security Process in DevSecOps
 
Manoj Kumar_CA
Manoj Kumar_CAManoj Kumar_CA
Manoj Kumar_CA
 
Owasp masvs spain 17
Owasp masvs spain 17Owasp masvs spain 17
Owasp masvs spain 17
 
Certifications in IT fields
Certifications in IT fieldsCertifications in IT fields
Certifications in IT fields
 
"Exploring the Diverse World of CCNP Certifications" .pdf
"Exploring the Diverse World of CCNP Certifications"  .pdf"Exploring the Diverse World of CCNP Certifications"  .pdf
"Exploring the Diverse World of CCNP Certifications" .pdf
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
 
Cloud Security Fundamentals Webinar
Cloud Security Fundamentals WebinarCloud Security Fundamentals Webinar
Cloud Security Fundamentals Webinar
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps Journey
 
Pattern For Ws Security
Pattern For Ws SecurityPattern For Ws Security
Pattern For Ws Security
 
Security Architecture Consulting - Hiren Shah
Security Architecture Consulting - Hiren ShahSecurity Architecture Consulting - Hiren Shah
Security Architecture Consulting - Hiren Shah
 
Muthu_Karthick_Sudhan
Muthu_Karthick_SudhanMuthu_Karthick_Sudhan
Muthu_Karthick_Sudhan
 
VSEC Sourcecode Review Service Profile
VSEC Sourcecode Review Service ProfileVSEC Sourcecode Review Service Profile
VSEC Sourcecode Review Service Profile
 
Secure DevOps: A Puma's Tail
Secure DevOps: A Puma's TailSecure DevOps: A Puma's Tail
Secure DevOps: A Puma's Tail
 
Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical Captcha
 
Profile_Ahmad2
Profile_Ahmad2Profile_Ahmad2
Profile_Ahmad2
 
Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação Cibernética
 

Plus de Vskills

Plus de Vskills (20)

Vskills certified administrative support professional sample material
Vskills certified administrative support professional sample materialVskills certified administrative support professional sample material
Vskills certified administrative support professional sample material
 
vskills customer service professional sample material
vskills customer service professional sample materialvskills customer service professional sample material
vskills customer service professional sample material
 
Vskills certified operations manager sample material
Vskills certified operations manager sample materialVskills certified operations manager sample material
Vskills certified operations manager sample material
 
Vskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample materialVskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample material
 
Vskills production and operations management sample material
Vskills production and operations management sample materialVskills production and operations management sample material
Vskills production and operations management sample material
 
vskills leadership skills professional sample material
vskills leadership skills professional sample materialvskills leadership skills professional sample material
vskills leadership skills professional sample material
 
vskills facility management expert sample material
vskills facility management expert sample materialvskills facility management expert sample material
vskills facility management expert sample material
 
Vskills international trade and forex professional sample material
Vskills international trade and forex professional sample materialVskills international trade and forex professional sample material
Vskills international trade and forex professional sample material
 
Vskills production planning and control professional sample material
Vskills production planning and control professional sample materialVskills production planning and control professional sample material
Vskills production planning and control professional sample material
 
Vskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample materialVskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample material
 
Vskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample materialVskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample material
 
certificate in agile project management sample material
certificate in agile project management sample materialcertificate in agile project management sample material
certificate in agile project management sample material
 
Vskills angular js sample material
Vskills angular js sample materialVskills angular js sample material
Vskills angular js sample material
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample material
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample material
 
Vskills financial modelling professional sample material
Vskills financial modelling professional sample materialVskills financial modelling professional sample material
Vskills financial modelling professional sample material
 
Vskills basel iii professional sample material
Vskills basel iii professional sample materialVskills basel iii professional sample material
Vskills basel iii professional sample material
 
Vskills telecom management professional sample material
Vskills telecom management professional sample materialVskills telecom management professional sample material
Vskills telecom management professional sample material
 
Vskills retail management professional sample material
Vskills retail management professional sample materialVskills retail management professional sample material
Vskills retail management professional sample material
 
Vskills contract law analyst sample material
Vskills contract law analyst sample materialVskills contract law analyst sample material
Vskills contract law analyst sample material
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Software Security Certification

  • 2. Certified Software Security Professional www.vskills.in CCCCertifiedertifiedertifiedertified Software Security ProfessionalSoftware Security ProfessionalSoftware Security ProfessionalSoftware Security Professional Certification CodeCertification CodeCertification CodeCertification Code VS-1086 Vskills certification for Software Security Professional assesses the candidate for a company’s secured software development needs. The certification tests the candidates on various areas in software security which includes knowledge of various types of security attacks and countermeasures on programming language (C/C++, Java and .Net), web applications, web services, SOA-based application, and mobile applications and tools used. Why should one take this certification?Why should one take this certification?Why should one take this certification?Why should one take this certification? This Course is intended for professionals and graduates wanting to excel in their chosen areas. It is also well suited for those who are already working and would like to take certification for further career progression. Earning Vskills Software Security Professional Certification can help candidate differentiate in today's competitive job market, broaden their employment opportunities by displaying their advanced skills, and result in higher earning potential. Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification? Job seekers looking to find employment in IT or software development department of various software development companies in public or private sector, students generally wanting to improve their skill set and make their CV stronger and existing employees looking for a better role can prove their employers the value of their skills through this certification Test DetailsTest DetailsTest DetailsTest Details • Duration:Duration:Duration:Duration: 60 minutes • No. of questions:No. of questions:No. of questions:No. of questions: 50 • Maximum marks:Maximum marks:Maximum marks:Maximum marks: 50, Passing marks: 25 (50%) There is no negative marking in this module. Fee StructureFee StructureFee StructureFee Structure Rs. 4,000/- (Includes all taxes) Companies that hire Vskills CertifiedCompanies that hire Vskills CertifiedCompanies that hire Vskills CertifiedCompanies that hire Vskills Certified Software Security ProfessionalSoftware Security ProfessionalSoftware Security ProfessionalSoftware Security Professional Software security professionals are in great demand. Companies specializing in development and testing of software are constantly hiring knowledgeable software security professionals.
  • 3. Certified Software Security Professional www.vskills.in Table of Contents 1.1.1.1. IntroductionIntroductionIntroductionIntroduction 1.1 Digital assets 1.2 Need for computer security 1.3 Risk and vulnerabilities 2.2.2.2. AttacksAttacksAttacksAttacks,,,, Security andSecurity andSecurity andSecurity and MeasuresMeasuresMeasuresMeasures 2.1 Evolution and attack types 2.2 Attack tools 2.3 Security levels 2.4 Security Standards 3.3.3.3. Secured Software CycleSecured Software CycleSecured Software CycleSecured Software Cycle 3.1 Security Lifecycle 3.2 Security Requirements 3.3 Security use cases and modeling 3.4 Security Design and authentication 3.5 Secured coding techniques and review 3.6 Security testing and remediation 4.4.4.4. C/C+ programmingC/C+ programmingC/C+ programmingC/C+ programming 4.1 UNIX/Linux and C/C++ evolution 4.2 Attack types and countermeasures in C/C++ 4.3 UNIX security and privileges 4.4 UNIX network programming 5.5.5.5. WindowsWindowsWindowsWindows programmingprogrammingprogrammingprogramming 5.1 Windows Security 5.2 .Net components and runtime security 5.3 .Net security design 5.4 Identity, principal and permission 5.5 Security techniques (type safety, role based and code access) 5.6 ASP.NET and remoting security 6.6.6.6. Java programmingJava programmingJava programmingJava programming 6.1 Java architecture and platform security 6.2 Cryptography API and secure sockets 6.3 JSSE and Java sandbox 6.4 Applets and swing security 7.7.7.7. SOASOASOASOA----based securitybased securitybased securitybased security 7.1 TCP/IP protocols and socket security 7.2 SOA basics and challenges
  • 4. Certified Software Security Professional www.vskills.in 7.3 RPC and RMI security 7.4 DCOM and ActiveX security 8.8.8.8. Web ApplicationsWeb ApplicationsWeb ApplicationsWeb Applications SecuritySecuritySecuritySecurity 8.1 Web security concepts 8.2 Identity management techniques 8.3 PKI and future 8.4 Attack techniques (code injection and parameter passing) 8.5 Emerging attack types and AVDL 9.9.9.9. Securing MobileSecuring MobileSecuring MobileSecuring Mobile 9.1 Mobile computing architecture and networks 9.2 NGN concepts and security 9.3 J2ME, Java card and USIM security 9.4 Securing WAP, mobile agents and mobile networks 9.5 Windows mobile security 10.10.10.10. Advance Java SecurityAdvance Java SecurityAdvance Java SecurityAdvance Java Security 10.1 Servlet Security 10.2 Securing JSP, Java struts, JSF and EJB 11.11.11.11. AdvanceAdvanceAdvanceAdvance Web ServicesWeb ServicesWeb ServicesWeb Services 11.1 Web service security model and standards 11.2 XML attacks and SSL usage 11.3 OFX and IFX
  • 5. Certified Software Security Professional www.vskills.in Course OutlineCourse OutlineCourse OutlineCourse Outline IntroductionIntroductionIntroductionIntroduction Understanding the relevance and identification of digital assets Illustrating the need for computer security in an organization Describing the concept of risk and vulnerabilities as applied to security paradigm AttacksAttacksAttacksAttacks,,,, Security andSecurity andSecurity andSecurity and MeasuresMeasuresMeasuresMeasures Detailing the evolution and different types of security attacks like spoofing, DoS, etc. Enlisting the various attack tools like ethereal, tcpdump, etc. Explaining security at various levels like database, network, computer, etc. Describing the different security standards and bodies like NIST, OWASP, etc. Secured Software CycleSecured Software CycleSecured Software CycleSecured Software Cycle Illustrating the concept of security lifecycle which includes various phases of security requirements, security use cases and modeling, security design and authentication, secured coding techniques and review and the concluding phase of lifecycle, security testing and remediation C/C+ programmingC/C+ programmingC/C+ programmingC/C+ programming Describing the evolution of C/C++ and their growth with UNIX or Linux Understanding the different types of attack and countermeasures in C/C++ Explaining the concept of UNIX security and privileges for maintaining security Detailing the techniques for security implementation in UNIX network programs Windows programmingWindows programmingWindows programmingWindows programming Illustrating the windows security architecture for windows operating system Describing the various components of .Net technology stack of Microsoft and implementation of .Net runtime security and the .Net security design Explaining the concept of identity, principal and permission in .Net Detailing the various security techniques as type safety, role based, code access, etc. Understanding the concept of ASP.NET for web application and remoting security Java programmingJava programmingJava programmingJava programming Describing the basics of Java architecture and it’s platform security Illustrating the usage of cryptography API for secured sockets Explaining JSSE for non-secured sockets and Java sandbox for secured environment Detailing the various methods for applets and swing security SOASOASOASOA----based securitybased securitybased securitybased security Understanding the TCP/IP protocols and socket security associated with them Describing the basics and security challenges for service oriented architecture Detailing the security techniques for remote procedure call (RPC), remote method Invocation (RMI), distributed COM (DCOM) and ActiveX technology
  • 6. Certified Software Security Professional www.vskills.in Web ApplicationsWeb ApplicationsWeb ApplicationsWeb Applications SecuritySecuritySecuritySecurity Explaining the concepts of web security and various techniques for identity management for web applications Understanding basics of public key infrastructure (PKI) and emerging technologies Describing the various attack techniques like code injection and parameter passing Detailing the new attack types like JSON pair injection, JS array poisoning, etc. and the concept of application vulnerability description language (AVDL) for countering Securing MobileSecuring MobileSecuring MobileSecuring Mobile Understanding the architecture of mobile computing and concept of mobile networks Describing the basics of next generation networks (NGN) and security architecture Illustrating the various security techniques for J2ME, Java card and USIM Detailing the process to secure WAP, mobile agents and mobile networks Explaining the implementation of security to windows OS based mobiles Advance Java SecurityAdvance Java SecurityAdvance Java SecurityAdvance Java Security Illustrating the different techniques for servlet security Describing the process to secure JSP, Java struts, JSF and EJB AdvanceAdvanceAdvanceAdvance Web ServicesWeb ServicesWeb ServicesWeb Services Understanding the different web service security model like WS-security, P2P security, etc. and the concept of web service security standards Explaining the various types of XML attacks and usage of SSL for web services Describing the financial transaction security as implemented by open financial exchange (OFX) and interactive financial exchange (IFX)
  • 7. Certified Software Security Professional www.vskills.in Sample QuestionsSample QuestionsSample QuestionsSample Questions 1.1.1.1. TheTheTheThe term AJAX refers toterm AJAX refers toterm AJAX refers toterm AJAX refers to _____________._____________._____________._____________. A. Asynchronous JavaSwing and XML B. Asynchronous JavaScript and XML C. Asynchronous Java and XML D. None of the above 2222. T. T. T. Thehehehe namenamenamename of an openof an openof an openof an open----source IDsource IDsource IDsource ID isisisis _____________._____________._____________._____________. A. Ethereal B. Snort C. TcpDump D. None of the above 3333. Usually, TLS provides data communication security over. Usually, TLS provides data communication security over. Usually, TLS provides data communication security over. Usually, TLS provides data communication security over _____________._____________._____________._____________. A. Remote network B. Private networks C. Public networks D. None of the above 4444.... TheTheTheThe term AES expands toterm AES expands toterm AES expands toterm AES expands to _____________._____________._____________._____________. A. Advanced encryption specification B. Advanced encryption standard C. Advanced encoding standard D. None of the above 5555. The. The. The. The methodology used by Microsoft for threat modeling ismethodology used by Microsoft for threat modeling ismethodology used by Microsoft for threat modeling ismethodology used by Microsoft for threat modeling is _____________._____________._____________._____________. A. STRIDE B. COMPASS C. RENUN D. None of the above Answers: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)