Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
TV & Film
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/72/9c/78/729c78c8-dd4a-83f1-d865-c815a52fcb4a/mza_18143718259370525373.jpg/600x600bb.jpg
CyberCode Academy
CyberCode Academy
62 episodes
21 hours ago
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.
Show more...
Courses
Education,
Technology
RSS
All content for CyberCode Academy is the property of CyberCode Academy and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.
Show more...
Courses
Education,
Technology
https://d3wo5wojvuv7l.cloudfront.net/t_rss_itunes_square_1400/images.spreaker.com/original/fa7bb72f1bc1e1bc2f9bc51fcafd411c.jpg
Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 1: Approaches, Eight Phases, and Risk Management
CyberCode Academy
12 minutes
6 days ago
Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 1: Approaches, Eight Phases, and Risk Management
In this lesson, you’ll learn about: Secure Software Development Life Cycle (Secure SDLC) — Full Overview
  • Definition of Secure SDLC
    • A framework that integrates security into every phase of system development:
      Planning → Design → Build → Validation → Deployment → Maintenance
  • Why Secure SDLC Matters
    • Rising security concerns: DDoS, account takeover, OWASP Top 10
    • Managing business risks such as breach penalties
    • Achieving GRC (Governance, Risk Management, Compliance) with PCI DSS, HIPAA, GDPR/CCPA
    • Enabling the Shift Left strategy to catch gaps early and reduce cost, time, and effort later
Approaches to Secure SDLC
  • Proactive Approach (for new systems)
    • Preventing and protecting against known threats in advance
    • Securing code and configurations early in the development process
  • Reactive Approach (for existing systems)
    • Detecting and stopping threats before exploitation or breach
    • Acting as a corrective control
The Eight Secure SDLC Phases
  1. Awareness Training
    • Regular security training, phishing exercises, and compliance awareness
    • Note: 93% of successful breaches begin with phishing
  2. Secure Requirements
    • Planning phase to define and continuously update security requirements based on functionality and GRC expectations
  3. Secure Design
    • Architectural phase to establish secure requirements
    • Selecting appropriate secure design principles and patterns
  4. Secure Build
    • Implementation phase focused on building secure systems
    • Using standardized, repeatable components
    • Applying Static Application Security Testing (SAST)
  5. Secure Deployment
    • Ensuring security and integrity during the deployment process
    • Emphasizing automation and protecting sensitive data (passwords, tokens)
  6. Secure Validation
    • Validating artifacts through security testing such as:
      Dynamic Application Security Testing (DAST), fuzzing, penetration testing
  7. Secure Response
    • Operations and maintenance
    • Executing the incident response plan
    • Active monitoring and responding to threats to maintain Confidentiality, Integrity, and Availability (CIA)
  8. Collaborative Model
    • An approach used to solve security issues in enterprise or distributed environments
    • Involves collaboration among development, security, QA, and operations
Secure SDLC Snapshot & Performance View
  • Bottom → Top:
    • Shows investment and performance (proactive approach)
  • Top → Bottom:
    • Shows remediation cost (reactive approach)
Risk Management & Threat Analysis Impact Study
  • Threats:
    • Possible dangers (intentional or accidental) like hacking, natural disasters, phishing, password theft, shoulder surfing, and email malware
  • Security Incidents:
    • Events where information assets are accessed, modified, or lost without authorization
  • Vulnerabilities:
    • Weaknesses that threats may exploit
  • Impact:
    • Outcome of threats and incidents
Risk Analysis & Scoring (NIST Representation)
  • Risk = Likelihood × Impact
  • Likelihood depends on:
    • Threats, incident history, ease of discovery, and ease of exploit
  • Impact...
CyberCode Academy
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.