Overview

This course helps professionals in the industry build their credentials to advance within their organization, allowing them to learn valuable managerial skills as well as how to apply the best practices to keep organizations systems running well.

Course Content

CSSLP Module 01

11:47
Part 1 - Core Security Requirements
11:54
Part 2 - Tenets of Secure Architecture and Design
06:11
Part 3 - Trusted Computing Requirements of System Architecture
15:33
Part 4 - Security Models and Access Control Models
07:38
Part 5 - Adversaries and Review
07:16
Part 6 - Risk Intro
06:25
Part 7 - Risk Assessment
08:38
Part 8 - Risk Analysis
09:58
Part 9 - Risk Mitigation and Review

CSSLP Module 02

06:34
Part 1 - Security Requirements Intro
06:13
Part 2 - SMART Requirements
11:50
Part 3 - Core Security Requirements
05:41
Part 4 - General Operational and Additional Requirements
08:47
Part 5 - Gathering Requirements

CSSLP Module 03

06:43
Part 1 - Intro to Design and Reducing the Attack Surface
06:07
Part 2 - Threat Modeling
10:45
Part 3 - Risks and Controls
07:08
Part 4 - Development Methodologies
16:47
Part 5 - Common Architectures
13:14
Part 6 - Secure Technologies

CSSLP Module 04

01:48
Part 1 - Intro to Secure Coding
08:41
Part 2 - Computer Architecture CPU
07:22
Part 3 - Memory
06:16
Part 4 - Why is Software Unsecure
15:24
Part 5 - OWASP 1 through 5
10:10
Part 6 - OWASP 6 through 10
11:36
Part 7 - Defensive Coding

CSSLP Module 05

03:16
Part 1 - Quality Assurance
04:21
Part 2 - Testing Artifacts
03:08
Part 3 - Functional Testing
05:46
Part 4 - Non Functional Testing
07:59
Part 5 - Vulnerability Scans and Penetration Testing
05:01
Part 6 - Impact Assessment and Corrective Actions

CSSLP Module 06

06:46
Part 1 - Software Acceptance Intro
04:04
Part 2 - Verification Validation Certification and Accreditation

CSSLP Module 07

15:55
Part 1 - Introduction to Secure Installation and Deployment
15:50
Part 2 - Operation Security Controls
05:19
Part 3 - Access Control Types
09:05
Part 4 - Monitoring and Auditing
08:21
Part 5 - Incident Response
07:25
Part 6 - Change Management
06:07
Part 7 - Software and System Disposal and Conclusion

Course Description

The CSSLP by ISC2 has quickly emerged as a significant certification for management that deals with application and software development. This certification teaches a managerial skill set that helps a leader to build a software development team that runs on proven best practices, consistently. The CSSLP online training course will help you and leaders in your organization: - Create competent teams that develop with security best practices - Reduce delivery delays and production costs - Improve credibility and reduce long term loss from potential breaches### About the Certified Secure Software Lifecycle Professional (CSSLP) Training Course

Certified Secure Software Lifecycle Professional (CSSLP) is a field that deals with software development. Cybrary's Certified Secure Software Lifecycle Professional (CSSLP) training course helps professionals in the industry build their credentials to advance within their organization, allowing them to learn valuable managerial skills as well as how to apply the best practices to keep systems within their organization running smoothly and efficiently. Key topics covered in a Certified Secure Software Lifecycle Professional (CSSLP) Training Course include:- Secure Software Concepts

  • Security Software Requirements
  • Secure Software Design
  • Secure Software Implementation/Coding
  • Secure Software Testing
  • Software Acceptance
  • Software Deployment, Operations, Maintenance and Disposal
  • Supply Chain and Software Acquisition