- Module 1: Introduction
- Module 2: Secure Software Lifecycle
- Module 3: Requirements & Security
- Module 4: Threat Modeling
- Module 5: Secure Design Principles
- Module 6: Secure Coding Practices
- Module 7: Dependency & Supply Chain Security
- Module 8: Static Analysis (SAST)
- Module 9: Dynamic Analysis (DAST)
- Module 10: Software Composition Analysis (SCA)
- Module 11: Authentication & Authorization
- Module 12: Data Protection & Cryptography
- Module 13: Secure Deployment & CI/CD
- Module 14: Runtime Protection & Observability
- Module 15: Incident Response & Reporting
- Week 1–2: Foundations & Design
- Week 3–4: Implementation & Testing
- Week 5–6: Security Controls & Deployment
- Week 7: Incident Response & Final Review