Alternatives for Cyber Secure Coder (CSC-110)

Unfortunately it is not possible to request a brochure for this training. Here you will find some alternatives for "Cyber Secure Coder (CSC-110)" by Stone River eLearning LLC. We hope we helped you to continue your search for training information.

check_box_outline_blank

EC-Council Computer Hacking Forensics Investigator (CHFI) incl. examen

Logo DutchTrain
|META_INFO|

EC-Council Computer Hacking Forensics Investigator (CHFI) Digital forensic practices stem from forensic science, the science of collecting …

check_box_outline_blank

CompTIA Security+ | CompTIA CySA+ Cyber Security Analyst | CompTIA SecurityX | (e-learning)

Logo DutchTrain
|META_INFO|

CompTIA Security+| CompTIA CySA+ Cyber Security Analyst | CompTIA SecurityX Bundle CompTIA Security+ |CompTIA Security+ is the certificatio…

check_box_outline_blank

CertNexus Cyber Secure Coder (CSC-110) Cert Prep

Logo IT-Learning
|META_INFO|

Getting certified by CertNexus as a Cyber Secure Coder validates your ability to design and manage highly secure professional applications.…

check_box_outline_blank

Developing Secure Software

Logo IT-Learning
|META_INFO|

Software developers know how essential secure coding practices are. Luckily, with today's tools, secure code doesn't take a lot of time or …

check_box_outline_blank

A Standalone Project: Create a Threat Intelligence Analysis by Infosec

Logo IT-Learning
|META_INFO|

Apply your threat intelligence knowledge with this hands-on project designed to map an organization against the cyber threat landscape. Com…

check_box_outline_blank

Cyber Crisis Management with NIST Cybersecurity Framework (CSF) 2.0

Logo IT-Learning
|META_INFO|

Effective cyber crisis management isn’t only focused on incident response. You also need to prepare in anticipation of a crisis. The cour…

check_box_outline_blank

AKYLADE Cyber Risk Management Foundation RMF-001 (A/CRMF) Cert Prep

Logo IT-Learning
|META_INFO|

The AKYLADE Cyber Risk Management Foundation (A/CRMF) certification exam evaluates your understanding of key risk management concepts, incl…

check_box_outline_blank

Building Your First iOS 16 App

Logo IT-Learning
|META_INFO|

Do you have a brand or product that needs its own app on the go? No problem. You can build the app yourself—and you can do it in as littl…

check_box_outline_blank

Building Your First iOS 15 App

Logo IT-Learning
|META_INFO|

Do you have a brand or product that needs its own app on the go? No problem. You can build the app yourself—and you can do it in as littl…

check_box_outline_blank

Internet Safety for Students

Logo IT-Learning
|META_INFO|

Along with being a core part of building digital citizenship, internet safely is an essential skill for students. This course explores how …

check_box_outline_blank

AWS Security Best Practices for Developers

Logo IT-Learning
|META_INFO|

Security matters to everyone, but solid security practices start with the developer of an application. In this developer-centered course, i…

check_box_outline_blank

AWS Security Best Practices for Developers (2018)

Logo IT-Learning
|META_INFO|

Security matters to everyone, but solid security practices start with the developer of an application. In this developer-centered course, i…

check_box_outline_blank

Ethical Hacking: Cryptography

Logo IT-Learning
|META_INFO|

When you’re trying to defend against cyber attacks, you need the latest and most innovative defenses at your command. This course helps y…

check_box_outline_blank

CompTIA Security+ (SY0-601) Cert Prep: 2 Secure Code Design and Implementation

Logo IT-Learning
|META_INFO|

Application vulnerabilities can open the floodgates to all manner of malicious attacks. Cybersecurity professionals must be equipped with a…

check_box_outline_blank

Cyber Emergency Management (CEM) Lead Implementer

Logo ISO in the Sun
|META_INFO|

This five-day course provides an overview to the structure of a Cyber Emergency Management System (CEM) based on ISO/IEC 27001 and associat…