Secure Coding Series

RegisterInquiry
Secure Coding Series
Loading...

B3360

Riyadh (Saudi Arabia)

30 Nov 2025 -04 Dec 2025

5200

Overview

Introduction:

Secure coding refers to the structured development of software that resists exploitation, safeguards data integrity, and limits exposure to security threats. It involves integrating protective logic, architectural resilience, and validation layers directly into the codebase. This training program introduces institutional frameworks for secure software development, including governance structures, risk prevention models, and communication safeguards. It provides methods for code assurance, policy alignment, and structured mitigation of vulnerabilities across development phases.

Program Objectives:

By the end of this program, participants will be able to:

  • Identify structural principles of secure software architecture and code design.

  • Evaluate methods for input validation, data control, and vulnerability mitigation.

  • Analyze authentication and authorization structures within code environments.

  • Explore data encryption protocols, secure transmission systems, and access layers.

  • Examine governance procedures, assurance documentation, and compliance alignment.

Targeted Audience:

  • Software developers and programmers with existing coding experience.

  • Systems architects involved in application design.

  • IT security team members overseeing application security.

  • Technical project managers responsible for secure development oversight.

  • Compliance officers coordinating with software security functions.

Program Outline:

Unit 1:

Fundamentals of Secure Software Development:

  • Structural principles of secure software design.

  • Classification of vulnerabilities in application logic.

  • Architecture level security considerations.

  • Secure Software Development Lifecycle (SSDLC) components.

  • Threat modeling frameworks for development environments.

Unit 2:

Input Handling and Data Validation:

  • Risks associated with unvalidated inputs.

  • Structural models for input validation and sanitization.

  • Control mechanisms for serialization and deserialization.

  • Encoding methods for injection prevention.

  • Logging standards and data exposure safeguards.

Unit 3:

Authentication, Authorization, and Session Management:

  • Structures for secure authentication and credential storage.

  • Authorization models and role based access frameworks.

  • Session control configurations and timeout systems.

  • Patterns of access abuse and session compromise risks.

  • Access monitoring and event logging structures.

Unit 4:

Secure Communication and Data Protection:

  • Protocols for secure data transfer and transmission.

  • Encryption layers for data at rest and in transit.

  • Key management roles and distribution systems.

  • Controls for log data and sensitive information storage.

  • Structures for secure API interaction and third party access.

Unit 5:

Governance, Compliance, and Code Assurance:

  • Standards and policies guiding secure software practices.

  • Secure coding checklists and policy alignment.

  • Frameworks for code analysis and vulnerability scanning.

  • Oversight models for open source and third party components.

  • Documentation systems supporting compliance and audit.