Course 336: Cyber security considerations for citizen developers


This Cyber Security Considerations for Citizen Developers course covers cyber security as it relates to coding including vulnerabilities, counter measures, and coding principles. The overall goal of the training is to implement cyber security best practices to reduce vulnerabilities associated with data analysis practices. Participants will leave empowered to program and/or code with cyber security in mind.


The objectives of this course are to ensure that upon successful completion, the participant will be able to:

  • describe the current cyber security context as it relates to coding
  • encrypt and digitally sign data
  • recognize common vulnerabilities and counter measures
  • recall secure coding principles
  • describe departmental guidance
  • recall the approach to manage vulnerabilities

Target audience

The target audience is Citizen developers: Data analysts, Statisticians, and any employee who practices citizen development across the Canadian Federal Public Service.


It is recommended to complete the Discover cyber security (DDN235) online course prior to attending this course.

Course outline and module objectives

  • Module 1 – Context of Citizen Development
    • Describe how software development practices have evolved
  • Module 2 – Coding Practices and Cyber Security
    • Categorize external threat actors and their capabilities
    • Describe the IT security risk management activities that pertain to coding
    • Define the concepts of confidentiality, integrity, and availability that pertain to coding
    • Contrast between security and functionality
  • Module 3 – Typical Vulnerabilities in Code
    • Recognize common deficiencies in coding
    • Apply effective mitigations to coding weaknesses
  • Module 4 – Secure Coding Principles
    • Describe the secure coding principles
    • Recall how secure coding principles can prevent a breach
  • Module 5 – Additional Considerations for Secure Coding
    • Describe additional considerations for secure code development
    • Define bug elimination strategies
Report a problem on this page

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Please select all that apply:

Thank you for your help!

You will not receive a reply. For enquiries, please contact us.

Date modified: