PodParley PodParley
Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 2: Malware, Social Engineering, GRC, and Secure Development Practices

EPISODE · Nov 14, 2025 · 11 MIN

Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 2: Malware, Social Engineering, GRC, and Secure Development Practices

from CyberCode Academy · host CyberCode Academy

In this lesson, you’ll learn about: Security Awareness Training — Secure SDLC Phase 1 1. Security Awareness Training (SAT) FundamentalsSAT is the education process that teaches employees and users about cybersecurity, IT best practices, and regulatory compliance.Human error is the biggest factor in breaches: 95% of breaches are caused by human error.SAT reduces human mistakes, protects sensitive PII, prevents data breaches, and engages developers, network teams, and business users.Topics covered in SAT:Password policy and secure authenticationPII managementPhishing and phone scamsPhysical securityBYOD (Bring Your Own Device) threatsPublic Wi-Fi protectionTraining delivery methods:New employee onboardingOnline self-paced modulesClub-based training portalsInteractive video trainingTraining with certification exams2. Malware & Social Engineering Threats Malware ClassificationsVirus: Infects other files by modifying legitimate hosts (the only malware that infects files).Adware: Exposes users to unwanted or malicious advertising.Rootkit: Grants stealthy, unauthorized access and hides its presence; may require OS reinstallation to remove.Spyware: Logs keystrokes to steal passwords or intellectual property.Ransomware: Encrypts data and demands cryptocurrency payments, usually spread via Trojans.Trojans: Malicious programs disguised as legitimate files or software.RAT (Remote Access Trojan): Allows long-term remote control of systems without the user’s knowledge.Worms: Self-replicating malware that spreads without user action.Keyloggers: Capture keystrokes to steal credentials or financial information.Social Engineering AttacksSocial engineering = manipulating people to obtain confidential information.Attackers target trust because it is easier to exploit than software.5 Common Types:Phishing: Most common attack; uses fraudulent links, urgency, and fake messages.93% of successful breaches start with phishing.Baiting: Offers something attractive (free downloads/USBs) to trick users into installing malware or revealing credentials.Pretexting: Creates a false scenario to build trust and steal information.Distrust Attacks: Creates conflict or threatens exposure to extort money or access.Tailgating/Piggybacking: Attacker physically follows an authorized employee into a restricted area.Defense strategies include:Understanding the difference between phishing and spear phishing.Recognizing that 53% of all attacks are phishing-based.Using 10 email verification steps, including:Check sender display nameLook for spelling errorsBe skeptical of urgency/threatsInspect URLs before clicking3. Governance, Risk, and Compliance (GRC) GRC Components:Governance: Board-level processes to lead the organization and achieve business goals.Risk Management: Predicting, assessing, and managing uncertainty and security risks.Compliance: Ensuring adherence to laws, regulations, and internal policies.Key compliance frameworks:HIPAA — Healthcare data protectionSOX — Corporate financial reporting integrityFISMA — Federal information system standardsPCI-DSS — Secure cardholder data; employees must acknowledge policies in writingISO/IEC 27001 — International information security standardGDPR — EU data privacyCCPA — California privacy law4. Secure Development & Operations Awareness Focused training for developers, security engineers, and network consultants. Core resources include:OWASP Top 10 — Most critical web application security risksSANS CWE Top 25 — Most dangerous software weaknessesOWASP ASVS — Security verification requirements for secure developmentBSIMM — Framework for building and assessing software security programsOWASP Mobile Top 10 — Mobile application security risksAPI and IoT security guidelinesThis training ensures developers write secure code, configure systems safely, and understand modern threats across web, mobile, API, and embedded systems. 5. Continuous Improvement & Organizational RolesSecurity awareness must be continuously updated to address new threats.Security Operations Center (SOC):Monitors systemsDetects and analyzes threatsCoordinates defense and responseInformation Security Communication:Acts as the bridge between business units and IT securityEnsures employees remain informed and educatedYou can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy

NOW PLAYING

Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 2: Malware, Social Engineering, GRC, and Secure Development Practices

0:00 11:58

No transcript for this episode yet

We transcribe on demand. Request one and we'll notify you when it's ready — usually under 10 minutes.

Simple Marketing Academy - by Fox Social Media Jill W. Fox & Tanner J. Fox Welcome to Simple Marketing Academy, where entrepreneurs & small business owners learn how to successfully market their businesses in a simple and inexpensive way, in order to reach more of their ideal customers & increase their sales! South West London Vineyard Church South West London Vineyard South West London Vineyard is a Christian church that meets in Putney. The church started with a small group of people in 1987 who wanted to see how following Jesus could make a difference, not only to their lives, but also to the lives of the people in the city around them.Sundays from 10:30-12pm at Ark, Putney, Academy, Pullman Gardens, London, SW15 3DG. You'd be really welcome. Leading With Purpose Nathan R Mitchell: Increase your self-awareness, lead to your full potential, & achieve more in less time with the Leading with Purpose - Empowering Talk Radio Podcast | Inspired by Tony Robbins, Simon Sinek, Daniel Pink, Seth Godin, Brendon Burchard, Bob INCREASE YOUR SELF-AWARENESS | LEAD TO YOUR POTENTIAL | ACHIEVE MORE IN LESS TIME: Let America's Leading Empowerment Coach, Founder of Clutch Consulting, LPX Academy, and Certified Member of The John Maxwell Team, Nathan R Mitchell, empower you to increase your self-awareness, lead to your full potential, and achieve more in less time. Drawing upon inspiration from Tony Robbins, Simon Sinek, Daniel Pink, Seth Godin, Bob Burg, John Maxwell, Brendon Burchard and others, on each episode of Leading With Purpose – Empowering Talk Radio, Nathan interviews top coaches, speakers, business owners, authors, and other experts to provide leaders and achievers with the information they need to get from where they are now to where they desire to be. Past guests have included Brian Smith - Founder of UGG Shoes, Lisa Nichols of Motivating the Masses, Lee Milteer, Dr. Josh Davis, Ben Gay III, Eric Lofholm, and many others. Beyond The Basics Health Academy Podcast Dr. Meaghan Kirschling Are you looking for practical, holistic, real-life solutions for healthier living? Join Dr. Meaghan Kirschling for real life education as she discusses and explores topics that affect everyday living. Dr. Meaghan brings in expert guests for a lively discussion about nutrition, supplements, holistic health, integrative medicine, and the latest research on a variety of topics. Join the Academy for the University of You!
URL copied to clipboard!