Companies Home Search Profile

CISSP Domain 8 - Software Development Security

Focused View

Jeremy Chew

53:56

47 View
  • 1. Introduction.mp4
    01:35
  • 1. Foundations of Software Development Lifecycle (SDLC).mp4
    04:36
  • 2. Advanced Concepts in Software Development Lifecycle (SDLC).mp4
    03:19
  • 3. Mastering the Phases of Software Development Lifecycle (SDLC).mp4
    03:13
  • 4. Synergizing Security & Development A Collaborative Approach.mp4
    04:59
  • 5. Enhancing Security Collaboration & Strategies.mp4
    03:10
  • 1. Exploration of Code Structures, Languages, and Libraries.mp4
    05:52
  • 2. Deep Dive Advanced Tools & Techniques in Software Development.mp4
    03:10
  • 3. Implementing Security in Development Stages & Environments.mp4
    10:34
  • 4. Mastery of Secure Staging & Best Practices.mp4
    03:35
  • 5. Comprehensive Security Assessment & Challenge Scenarios.mp4
    09:53
  • Description


    Mastering CISSP: An In-depth Exploration of Domain 8 - Secure Software Development

    What You'll Learn?


    • The significance of intertwining security throughout the Software Development Life Cycle (SDLC).
    • An understanding of various development methodologies, including Agile, Waterfall, and DevSecOps.
    • The role and importance of maturity models such as the Capability Maturity Model (CMM) and Software Assurance Maturity Model (SAMM).
    • Best practices in operation, maintenance, and change management within software development.
    • Techniques to identify and apply security controls in diverse software development ecosystems.
    • Insights into the security aspects of programming languages, libraries, and toolsets.
    • Effective use of Integrated Development Environments (IDEs) with a focus on security.
    • The importance of Continuous Integration and Continuous Delivery (CI/CD) in ensuring software security.
    • Strategies to assess the security impact of various software types including Commercial-off-the-shelf (COTS), open source, and third-party applications.
    • Secure coding guidelines, practices, and the security of Application Programming Interfaces (APIs).

    Who is this for?


  • Software developers aiming to integrate security into their development processes.
  • IT professionals focusing on enhancing software and application security.
  • Project managers overseeing software development projects.
  • Students and professionals aspiring for a career in cybersecurity.
  • Organizations aiming to reduce vulnerabilities in custom-developed software.
  • What You Need to Know?


  • Basic knowledge of software development processes and methodologies.
  • Internet Access
  • More details


    Description

    Delve into the intricate realm of CISSP with a concentrated focus on Domain 8: Software Development Security. This comprehensive course offers a deep understanding of the software development life cycle and the paramount importance of intertwining security throughout every phase.

    Discover why a mere focus on software functionality is not sufficient and grasp the profound implications of neglecting security in software development. Uncover the pitfalls of retrofitting security measures and gain insights into the proactive strategies that can be employed to ensure both functionality and security are given equal prominence from the inception of a software project.

    Embark on a journey through various development methodologies, ranging from Agile to DevSecOps, and comprehend their security implications. Familiarize yourself with maturity models such as the Capability Maturity Model (CMM) and the Software Assurance Maturity Model (SAMM), and understand their pivotal role in ensuring software quality and security.

    Recognize the significance of introducing systems development controls and their role in mitigating risks posed by custom-developed software. Get acquainted with the diverse tools and ecosystems pivotal to software development, from programming languages and integrated development environments to software configuration management and code repositories.

    Furthermore, enhance your proficiency in assessing the security impact of various software types, including commercial-off-the-shelf (COTS), open source, and third-party software. By the end of this course, you'll be equipped with the knowledge to define and apply secure coding guidelines, ensuring the creation of robust, secure applications in any environment.

    Join us in this extensive exploration and emerge with the expertise to champion software development security in your professional endeavors.

    Who this course is for:

    • Software developers aiming to integrate security into their development processes.
    • IT professionals focusing on enhancing software and application security.
    • Project managers overseeing software development projects.
    • Students and professionals aspiring for a career in cybersecurity.
    • Organizations aiming to reduce vulnerabilities in custom-developed software.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Hello and welcome! I'm Jeremy, a dedicated and passionate Cybersecurity expert, specializing in the CISSP (Certified Information Systems Security Professional) domain. With over a decade of hands-on experience in the field, I've navigated the complex terrains of information security, threat analysis, and cyber defense strategies in various high-stakes environments.My journey in cybersecurity began after completing my degree in Computer Science, where my fascination with digital security mechanisms took root. Since then, I've worked with numerous multinational corporations, government agencies, and tech startups, honing my skills and understanding of real-world cybersecurity challenges and solutions.As a CISSP-certified professional, I've not only mastered the theoretical aspects of cybersecurity but also applied them practically in managing security policies, creating risk management frameworks, and defending against cyber threats. My expertise spans a wide range of areas, including network security, encryption, cloud security, and ethical hacking.But beyond my professional endeavors, I am deeply committed to sharing my knowledge and experience. Teaching is not just a profession for me; it's a passion and a responsibility. I strive to demystify complex cybersecurity concepts, making them accessible and engaging for everyone, whether you're just starting out or looking to deepen your expertise.In my Udemy courses, you'll find a blend of in-depth theory, practical case studies, and real-world problem-solving skills. My aim is not just to prepare you for the CISSP certification but to equip you with the critical thinking and technical skills necessary to excel in the ever-evolving world of cybersecurity.Join me in exploring the fascinating world of cybersecurity. Whether you're aiming to pass your CISSP exam or looking to enhance your knowledge in the field, I'm here to guide you every step of the way. Let's embark on this learning journey together, and unlock your potential to become a cybersecurity leader in today's digital world!
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 11
    • duration 53:56
    • Release Date 2023/12/13