• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
FacebookTwitterLinkedInInstagramYoutube
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Publications
  • /Tech News
  • /Build Your Career
  • Home
  • / ...
  • /Tech News
  • /Build Your Career

Software Security for the People: Free and Open Resources for Software Security Training

By IEEE Computer Society Team on
May 16, 2022

software securitysoftware securityThe rising demand for security traverses all sectors of the software industry—and expands to include end-users, government organizations, academia, and so on. Recent statistics show that besides a rise in cybercrime targeting networks and systems, over 30% of companies detected attempts to exploit vulnerabilities found in software. This underscores the need to train developers with the skills to design, write, test, and assess code to make software resistant to being exploited.


Want More Tech News? Subscribe to ComputingEdge Newsletter Today!


The Need for Training


With over 4 million software engineers in the US and a compound annual growth rate of 4%, software is available in abundance. But an understanding of the vulnerabilities and potential for exploitation has not increased commensurately. When addressing cybersecurity strategies and policies, most organizations focus on their networks and hardware, and inadequate attention is given to the role of software security in a company’s cybersecurity posture.

The Resources and Methods

The key to providing comprehensive training is to formulate a curriculum with the right approach, components, and delivery.

  • Approach. The approach should include putting materials together that can reach the broadest audience. It should be based on spanning the technical depth and breadth of the industry, as well as crossing cultural and linguistic boundaries.
  • Components. In harmony with the development of the approach, components such as visual aids, multi-language closed captioning of video lectures, resources for the instructors, and interactive exercises must be included. There also needs to be an effective means for periodic evaluation and assessment of trainees.
  • Delivery. Methods of delivery need to reflect the needs of the widest audience possible, so there would need to be provisions for classroom learning to focus on students, as well as professional training courses for your existing workforce, motivational lectures for workshops, and supplemental video lectures to support your instructors.

To get an overview of the current software security curriculum ecosystem, download and read the complete article, “Software Security for the People: Free and Open Resources for Software Security Training” by Elisa R. Heymann and Barton P. Miller, first appearing in the IEEE Security & Privacy Magazine in March-April 2022.

LATEST NEWS
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Autonomous Observability: AI Agents That Debug AI
Autonomous Observability: AI Agents That Debug AI
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter
Read Next

From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities

IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT

Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)

Autonomous Observability: AI Agents That Debug AI

Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference

Copilot Ergonomics: UI Patterns that Reduce Cognitive Load

The Myth of AI Neutrality in Search Algorithms

Gen AI and LLMs: Rebuilding Trust in a Synthetic Information Age