EC-Council Sets New Application Security Training Standards

The world’s leading information security certification body, EC-Council, is set to redefine application security by introducing an all new certification program, Certified Application Security Engineer (CASE), on June 20, 2018. This certification will focus on the security requirements and best practices for software and application developers across all stages of the SDLC (software development life cycle). This is a major step and will come as a relief for software and application development teams that work in this multi-trillion dollar ecosystem.

“Most developers and application engineers do not have appreciation of security, from the point of view of what you need to do to develop applications that are secure,” says Jonathan Zwang, Former Senior Vice President, Global IT Infrastructure, Ralph Lauren, in his interview with EC-Council.
 
The CASE program is unlike other traditional programming training programs on the market, as it focuses on both pre-deployment and post-deployment security techniques and practices. This program encompasses security activities involved in all phases of the Secure-Software Development Life Cycle (S-SDLC) — planning, creating, testing, and deploying an information system.

According to the “Application Security Market 2018 Global Analysis, Growth, Trends and Opportunities Research Report”, the global application security market is expected to grow from USD 21 billion in 2016 to USD 125 billion by 2023 due to the growth and advancement of cyber-attacks across the world.

Application development teams are often under tremendous pressure to deliver applications since most modern organizations chase time-sensitive, rapid fire project timelines. The need for quick turnarounds can mean that security is overlooked in favor of meeting deadlines. This puts end user data and the reputation of the developers at great risk as applications (both web and offline) and software in general have become an inseparable part of daily life amidst the growing digital user-base across the world.

“We are very excited to offer IT professionals in the application industry the ability to reduce vulnerabilities and increase security through the development of a training and certification program that focuses on secure coding and much more,” says Jay Bavisi, President of the EC-Council Group. “With our latest developments, we are certain that application developers will be able to build secure applications that are robust enough to meet the application security challenges of today and tomorrow.”

openPR:

You Might Also Read: 

Security University CyberSecurity Registered Apprenticeship Program:

 

 

« Are US Federal Cyber Workers Good Enough?
Expect A Cyber Attack On The FIFA World Cup In Russia »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Acunetix

Acunetix

Acunetix is a leading web vulnerability scanner, widely acclaimed to include the most advanced SQL injection and XSS black box scanning technology.

QMS International

QMS International

QMS is one of the leading ISO certification bodies in the UK and serves clients worldwide.

Viavi Solutions

Viavi Solutions

Viavi Solutions is a global leader in both network and service enablement and optical security performance products and solutions.

Information & eGovernment Authority (iGA) - Bahrain

Information & eGovernment Authority (iGA) - Bahrain

The Information & eGovernment Authority facilitates many services catering to different parts of the community within the IT sector in Bahrain including information security.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

CIRISK

CIRISK

CIRISK offers a wide range of services from consulting to audit or project management to help you develop your cyber security or information security strategy.

SafeHouse Technologies

SafeHouse Technologies

SafeHouse is a cloud-based, high-end cybersecurity platform that can secure and insure any device that is connected to it.

36 Group

36 Group

36 Group's criminal law team, has the experience and specialist knowledge to conduct effectively trials heavily concerned with the growing phenomenon of Cybercrime.

AlertFusion

AlertFusion

AlertFusion is a platform that makes security operations more effective. It complements existing tools and technologies, unifies operations, enhances process maturity and drives efficiencies.

Quantum Armor

Quantum Armor

Quantum Armor is a next-gen cyber security monitoring platform that allows you to continuously stay aware of your security posture, and proactively spot trends, vulnerabilities and potential attacks.

Tetrate.io

Tetrate.io

Tetrate Service Bridge provides enterprises with a consistent, unified way to connect and secure services across an entire mesh-managed environment.

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

DEKRA

DEKRA

DEKRA’s promise is to ensure the safety of human interaction with technology and the environment.

Dotsquares

Dotsquares

Dotsquares leverage the latest web and mobile technologies to build, grow and support your business.

AI or Not

AI or Not

AI or Not - Leverage AI to combat misinformation and elevate the landscape of compliance solutions.

Hack-X Security

Hack-X Security

Hack-X Security provide IT risk assessment and Digital Security Services. We are a trusted standard for businesses that must protect their data from cyber-attacks.