Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
TV & Film
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/72/9c/78/729c78c8-dd4a-83f1-d865-c815a52fcb4a/mza_18143718259370525373.jpg/600x600bb.jpg
CyberCode Academy
CyberCode Academy
62 episodes
17 hours ago
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.
Show more...
Courses
Education,
Technology
RSS
All content for CyberCode Academy is the property of CyberCode Academy and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.
Show more...
Courses
Education,
Technology
https://d3wo5wojvuv7l.cloudfront.net/t_rss_itunes_square_1400/images.spreaker.com/original/1db468735d041d1595e305e898b02715.jpg
Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 4: Integrating Secure Coding, Code Review, and Application Security Testi
CyberCode Academy
10 minutes
6 days ago
Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 4: Integrating Secure Coding, Code Review, and Application Security Testi
In this lesson, you’ll learn about: Secure Build — SDLC Phase 4 1. Overview Secure Build is the practice of applying secure requirements and design principles during the development phase. Its goal is to ensure that applications used by the organization are secure from threats. Key Participants:
  • Software developers
  • Desktop teams
  • Database teams
  • Infrastructure teams
2. Core Development Practices Secure Coding Guidelines
  • Developers follow standardized rules to ensure threat-resistant code.
  • Security libraries in frameworks are used for critical tasks, such as:
    • Input validation
    • Authentication
    • Data access
Secure Code Review
  • Involves manual and automated review of source code to uncover security weaknesses.
  • Essential checks include:
    • Proper logging of security events
    • Authentication bypass prevention
    • Validation of user input
Formal Code Review Steps:
  1. Source Code Access: Obtain access to the codebase.
  2. Vulnerability Review: Identify weaknesses, categorized by risk impact (e.g., financial, reputation).
  3. Reporting: Remove false positives, document issues, and assess risk severity.
  4. Remediation: Track and fix vulnerabilities using bug tracking systems like Jira.
3. Automated Application Security Testing Static Application Security Testing (SAST)
  • White-box testing that scans source code or binaries without execution.
  • Integrates with CI/CD pipelines or developer IDEs for immediate feedback.
  • Supports the “shift left” approach, finding vulnerabilities early in the SDLC.
  • Tools demonstrated: Coverity, LGTM
Interactive Application Security Testing (IAST)
  • Gray-box testing performed while the application is running, often during functional tests.
  • Monitors application activity in real-time and pinpoints exact lines of code needing fixes.
  • Advantages:
    • Eliminates false positives
    • Fits Agile, DevOps, and CI/CD workflows
4. Third-Party Component Security and Code Quality Open Source Analyzers (OSA) / Secure Component Analysis (SCA)
  • Ensure open-source libraries are current and free of known vulnerabilities.
  • Can integrate with SAST and IAST tools.
  • Resources: OWASP Dependency Check (free tool for detecting vulnerable components).
Code Quality Tools
  • Identify poor coding practices, dead code, and potential security issues.
  • Improving code quality correlates with enhanced overall security.
  • Tools mentioned: SpotBugs, SonarQube
5. Summary
  • Secure Build is Phase 4 of the Secure SDLC.
  • Integrates practices including:
    • Following secure coding standards
    • Performing code reviews
    • Applying automated testing (SAST & IAST)
    • Ensuring component security and code quality
  • Goal: Proactively address security during development, rather than remediating later.


You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cybercode_academy
CyberCode Academy
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.