Explore KSACs by Pathway
Explore Knowledge, Skills, Abilities, and Credentials (KSACs) by IT Pathway.
11. Secure Software
Label | KSAC Description | Bloom's Taxonomy Level | Cross-Cutting | |
---|---|---|---|---|
a | Choose the appropriate data structure for modeling a given problem. | skill | 3 | Software Development 3f |
b | Implement a divide-and-conquer algorithm for solving a problem. | skill | 3 | Software Development 5g |
c | Implement a coherent abstract data type, with loose coupling between components and behaviors. | skill | 3 | Software Development 5i |
d | Identify common coding errors that lead to insecure programs (e.g., buffer overflows, memory leaks, malicious code). | knowledge | 3 | Software Development 10a |
e | Apply the principles of least privilege, defensive programming, and fail-safe defaults. | ability | 3 | Software Development 10d |
f | Write code with logging capabilities. | skill | 2 | Software Development 10f |
g | Integrate security in all phases of the software development life cycle (SecDevOps). | ability | 3 | |
h | Understand web applicatin issues using OWASP | knowledge | 2 | |
i | Understand basics of securing web apps - SQL Injection and other input validation. | knowledge | 2 | Software Development 10h |
Credentials
Entry
- Security+
- Network+
- Cloud+
- CEH
- GSEC
- CAP
Mid-level
- CCNA
- CYSA+
Advanced
- CASP
- CISSP
- CISA
- CISM
- CRISC
- CCSP