{"id":2255,"date":"2021-09-16T14:15:50","date_gmt":"2021-09-16T12:15:50","guid":{"rendered":"https:\/\/ict-improve.nl\/?post_type=training&#038;p=2255"},"modified":"2026-03-04T10:01:29","modified_gmt":"2026-03-04T09:01:29","slug":"exin-secure-programming-3","status":"publish","type":"training","link":"https:\/\/ict-improve.nl\/en\/training\/secure-software-development-nl\/exin-secure-programming-3\/","title":{"rendered":"Secure Software Development"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Veilige softwareontwikkeling mogelijk maken Veilige softwareontwikkeling gaat niet alleen over het maken van software; het gaat over het verweven van beveiliging in het fundament van je code. Het gaat om het minimaliseren van kwetsbaarheden en het integreren van beveiligingsmaatregelen zoals robust error handling, solide authenticatie en krachtige encryptie. Als vooruitdenkend softwareontwikkelingsteam geloven we in het geven van prioriteit aan veiligheid vanaf het begin, idealiter al tijdens de ontwerpfase van de applicatie zelf. Na deze training zul je: Goed op de hoogte zijn van de principes van veilige softwareontwikkeling De meest voorkomende kwetsbaarheden begrijpen Uitgerust zijn met strategie\u00ebn om deze kwetsbaarheden te voorkomen Inzicht hebben gekregen in de veranderende rol van de Agile ontwikkelaar in tegenstelling tot traditionele omgevingen Samen veilige software maken! In het huidige digitale tijdperk vallen steeds meer organisaties ten prooi aan verschillende vormen van cybercriminaliteit. Zoals het gezegde luidt, \u2018Voorkomen is beter dan genezen\u2019 en onderzoek toont aan dat het ontwikkelen van veilige software vanaf het begin kosteneffectiever is dan het achteraf aanpassen ervan. Deze technische training is ontworpen om je uit te rusten met zowel theoretische kennis als praktische vaardigheden om de dreiging van cybercriminaliteit te bestrijden. Je leert over de kenmerken van betrouwbare software en<\/p>\n","protected":false},"featured_media":0,"parent":1473,"menu_order":20251006,"template":"","meta":{"_acf_changed":true,"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"class_list":["post-2255","training","type-training","status-publish","hentry"],"acf":{"start_date":"20251006","duration":"06, 07 oktober, 2025","price":"\u20ac 1.195 excl BTW","early_bird_price":"","early_bird_tot":null,"location":"Eindhoven","location_type":"Classroom","theme":["Requirements","Security","Software Engineering"],"training_language":"English","session":"yes","startgarantie":true,"nog_enkele_plaatsen_beschikbaar":false,"uitvoeringscode":"52a12a81-6d3e-48da-a9f6-bcf6cc47f8b0"},"_links":{"self":[{"href":"https:\/\/ict-improve.nl\/en\/wp-json\/wp\/v2\/training\/2255","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-improve.nl\/en\/wp-json\/wp\/v2\/training"}],"about":[{"href":"https:\/\/ict-improve.nl\/en\/wp-json\/wp\/v2\/types\/training"}],"version-history":[{"count":0,"href":"https:\/\/ict-improve.nl\/en\/wp-json\/wp\/v2\/training\/2255\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/ict-improve.nl\/en\/wp-json\/wp\/v2\/training\/1473"}],"wp:attachment":[{"href":"https:\/\/ict-improve.nl\/en\/wp-json\/wp\/v2\/media?parent=2255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}