LIVE Instructor-Led Courses
Dismiss

SECURE BY DESIGN concept training course

Dive into the 'SECURE BY DESIGN' concept and seamlessly integrate it into your existing build process. Learn strategies to reduce software production costs while enhancing security measures. Join us to revolutionize your software development approach today!

JBI training course London UK

"The topics (threat modelling frameworks, zones of trust, annotating your own diagrams, implementing security into Agile practices) were all well-chosen and appropriate. I particular like to learn about the theory of applying security practices into Agile workflow.

The instructor was excellent. Great communicator, warm, affable personality"

GL, Software Engineer, Threat Modelling, February 2021

Public Courses

22/04/24 - 2 days
£1500 +VAT
03/06/24 - 2 days
£1500 +VAT
15/07/24 - 2 days
£1500 +VAT

Customised Courses

* Train a team
* Tailor content
* Flex dates
From £1200 / day
EDF logo Capita logo Sky logo NHS logo RBS logo BBC logo CISCO logo
JBI training course London UK

SECURE BY DESIGN concept Training: 

  • Applying across the build process
  • Principle of Defense-in-Depth
  • Data validation framework
  • Principle of Identity
  • Principle of Least Privilege
  • Secure Configuration criteria
  • Sensitive Data criteria
  • Secure Session framework
  • Cryptography framework
  • Secure Exception handling criteria
  • Auditing framework

Transform your software development approach with SECURE BY DESIGN. Join us to fortify your defenses and streamline production processes. 

 Part I - The SECURE BY DESIGN concept

  • Applying across the build process
  • Principle of Defense-in-Depth
  • Data validation framework
  • Principle of Identity
  • Principle of Least Privilege
  • Secure Configuration criteria

Part II - Enhancing the RTMP

  • Review of RTMP
  • STRIDE
  • breakdown of a general TM (flows, nodes, etc.)
  • RTMP Zones-of-Trust
  • RTMP math rules

Applying the attack Killchain to STRIDE and ATT&CK

  • mapping killchain to STRIDE
  • mapping killchain to nodes and flows

 

Using LINNDUN for privacy

  • Introducing LINNDUN
  • GDPR 6 Principles
  • vs
  • 7 Data Privacy Principles
  • mapping LINNDUN to design using principles

 

 

 

JBI training course London UK

  • For architects, team leads, business leads
  • Software developers
  • Security engineers
  • System architects
  • IT managers
  • Project managers
  • Compliance officers
  • Anyone involved in software development and security assurance


5 star

4.8 out of 5 average

"The topics (threat modelling frameworks, zones of trust, annotating your own diagrams, implementing security into Agile practices) were all well-chosen and appropriate. I particular like to learn about the theory of applying security practices into Agile workflow.

The instructor was excellent. Great communicator, warm, affable personality"

GL, Software Engineer, Threat Modelling, February 2021



“JBI  did a great job of customizing their syllabus to suit our business  needs and also bringing our team up to speed on the current best practices. Our teams varied widely in terms of experience and  the Instructor handled this particularly well - very impressive”

Brian F, Team Lead, RBS, Data Analysis Course, 20 April 2022

 

 

JBI training course London UK

Newsletter

 

Sign up for the JBI Training newsletter to stay updated with world-class technology training opportunities, including Analytics, AI, ML, DevOps, Web, Backend and Security. Our Power BI Training Course is especially popular.  Gain new skills, useful tips, and validate your expertise with an industry-leading organisation, all tailored to your schedule and learning preferences.



In this comprehensive Training course, participants will delve into the core principles of SECURE BY DESIGN and learn how to seamlessly integrate them into their existing build processes. Through interactive sessions and practical exercises, attendees will gain a deep understanding of secure software development practices and strategies to reduce production costs without compromising security.

Participants will explore advanced techniques for enhancing security measures and mitigating risks effectively. Real-world case studies and examples will illustrate successful implementations of SECURE BY DESIGN principles, providing valuable insights into practical application.

By the end of the course, participants will emerge with the knowledge and skills to architect software systems with security at their core, enabling them to build robust and resilient applications in today's ever-evolving threat landscape.

Whether you're a seasoned software developer or a security enthusiast, this course offers invaluable expertise to elevate your software security practices and protect your digital assets effectively.

 

Who is this course designed for?

  • This course is designed for software developers, security engineers, system architects, IT managers, project managers, compliance officers, and anyone involved in software development and security assurance.

What will participants learn during the course?

  • Participants will learn the core principles of SECURE BY DESIGN, strategies to seamlessly integrate them into existing build processes, techniques to reduce production costs, and methods to enhance security measures effectively.

Are there any prerequisites for enrolling in the course?

  • There are no specific prerequisites for this course, although a basic understanding of software development and security concepts is beneficial.

How is the course delivered?

  • The course is delivered through a combination of lectures, discussions, case studies, and hands-on exercises conducted over 2 days.

What resources will participants have access to after completing the course?

  • Participants will have access to course materials, resources for further learning, and ongoing support from the instructor and course community.

How will the course benefit participants in their professional roles?

  • Participants will emerge with the knowledge and skills to architect software systems with security at their core, enabling them to build robust and resilient applications in today's ever-evolving threat landscape.

What is the duration of the course?

  • The course spans 2 days of interactive learning sessions by an expert instructor. 

CONTACT
+44 (0)20 8446 7555

[email protected]

SHARE

 

Copyright © 2023 JBI Training. All Rights Reserved.
JB International Training Ltd  -  Company Registration Number: 08458005
Registered Address: Wohl Enterprise Hub, 2B Redbourne Avenue, London, N3 2BS

Modern Slavery Statement & Corporate Policies | Terms & Conditions | Contact Us

POPULAR

Rust training course                                                                          React training course

Threat modelling training course   Python for data analysts training course

Power BI training course                                   Machine Learning training course

Spring Boot Microservices training course              Terraform training course

Kubernetes training course                                                            C++ training course

Power Automate training course                               Clean Code training course