Companies Home Search Profile

Master Secure Software Development : Complete CSSLP Guide

Focused View

Basics Strong

7:28:54

0 View
  • 1 -Introduction.mp4
    13:20
  • 2 -About Exam.mp4
    02:15
  • 1 - Domain -1 Content.html
  • 1 -0-Introduction.mp4
    02:34
  • 2 -1-CIA Guideline.mp4
    07:23
  • 3 -3-Authentication.mp4
    10:36
  • 4 -4-Authorization.mp4
    02:29
  • 5 -5-Accountability.mp4
    04:18
  • 6 -6-Non Repudiation.mp4
    01:34
  • 7 -7-Secure Development Lifecycle (SDL).mp4
    03:20
  • 8 -8-SDL Components.mp4
    02:29
  • 9 -Summary and Recap.mp4
    01:04
  • 1 -0-Introduction.mp4
    01:09
  • 2 -1-System Tenets.mp4
    03:17
  • 3 -2-Secure Design Tenets.mp4
    06:01
  • 4 -4-Adversaries.mp4
    05:12
  • 5 -Summary and Recap.mp4
    01:28
  • 6 -3-Security Models.mp4
    07:19
  • 1 - Domain 2 - Content.html
  • 1 -0.Introduction.mp4
    01:14
  • 2 -1. Functional Requirements.mp4
    05:20
  • 4 -3. Summary and Recap.mp4
    02:27
  • 1 -0. Introduction.mp4
    01:37
  • 2 -1. Regulations and Compliance.mp4
    05:02
  • 3 -2. Data Classification.mp4
    06:16
  • 4 -3. Privacy.mp4
    06:57
  • 1 -0.Introduction.mp4
    02:01
  • 2 -2. MisuseAbuse Cases.mp4
    05:07
  • 3 -3. Requirements Traceability Matrix.mp4
    04:32
  • 4 -4. Software Acquisition.mp4
    07:17
  • 5 -5. Summary.mp4
    00:57
  • 1 - Secure Software Architecture and Design.html
  • 1 -Introduction.mp4
    00:40
  • 2 -Perform Threat Modeling.mp4
    21:51
  • 3 -Defining the Security Architecture.mp4
    05:33
  • 4 -Summary and Recap.mp4
    00:29
  • 1 -Performing Architectural Risk Assessment.mp4
    01:52
  • 2 -Model (Nonfunctional) Security Properties and Constraints.mp4
    01:49
  • 3 -Model and Classify Data.mp4
    03:03
  • 4 -Perform Security Architecture and Design Review.mp4
    01:55
  • 4 - Evaluate and Select Reusable Secure Design.html
  • 5 -Define Secure Operational Architecture.mp4
    02:49
  • 6 -Introduction.mp4
    01:21
  • 7 -Use Secure Architecture and Design Principles, Patterns, and Tools.mp4
    02:40
  • 8 -Performing Secure Interface Design.mp4
    02:58
  • 9 -9-Summary.mp4
    00:58
  • 1 - Content.html
  • 1 -0 Intro.mp4
    01:14
  • 2 -1-Declarative vs. Imperative Security.mp4
    03:43
  • 3 -2-Memory Management.mp4
    04:09
  • 4 -3-Error Handling.mp4
    02:29
  • 5 -4-Interface Coding.mp4
    03:32
  • 6 -5-Primary Mitigation.mp4
    04:03
  • 7 -6-Learning from Past Mistakes.mp4
    02:57
  • 8 -7-Secure design principles.mp4
    03:35
  • 9 -8-Interconnectivity.mp4
    04:20
  • 10 -9-Cyrptographics Failures.mp4
    04:56
  • 11 -11-General Programings Failures.mp4
    04:59
  • 11 - 10-Input Validation Failuers.html
  • 12 -12-Technology Solution.mp4
    04:37
  • 13 -Summary and Recap.mp4
    00:56
  • 1 -0-Introduction.mp4
    01:18
  • 2 -1-Code Analysis.mp4
    08:01
  • 3 -2-CodePeer Review.mp4
    03:57
  • 4 -3-Code Review Objectives.mp4
    03:46
  • 5 -4-Additional Sources of Vulnerability Information.mp4
    02:02
  • 6 -5-Top25.mp4
    03:27
  • 7 -6-OWASP Vulnerability.mp4
    01:02
  • 8 -7-Common Vulnerabilities.mp4
    05:07
  • 9 -8-Summary.mp4
    00:46
  • 1 -0-Introduction.mp4
    01:25
  • 2 -1-Security Risks.mp4
    03:58
  • 3 -2-Implement Security Controls.mp4
    04:13
  • 4 -4-Anti-tampering Techniques.mp4
    04:59
  • 4 - 3-Applying Security.html
  • 5 -6-Primary Mitigations.mp4
    03:58
  • 5 - 5-Defensive Coding Techniques.html
  • 6 -7-Secure Integration of Components.mp4
    04:33
  • 7 -8- Summary and Recap.mp4
    01:47
  • 8 - Content.html
  • 1 -Introduction.mp4
    01:18
  • 1 - Content.html
  • 2 -2-Security Test Cases.mp4
    04:28
  • 3 -3-Attack Surface Evaluation.mp4
    04:19
  • 4 -4-Penetration Testing.mp4
    05:04
  • 5 -5-Common Methods.mp4
    08:44
  • 6 -6-Summary and Recap.mp4
    01:23
  • 1 -0-Introduction.mp4
    01:22
  • 2 -2-Develop a Security Testing Strategy and A Plan.mp4
    04:27
  • 3 -3-Functional Security Testing.mp4
    03:11
  • 4 -4-Non Functional Security Testing - p.mp4
    03:11
  • 5 -5-Testing Techniques.mp4
    03:59
  • 6 -6-Environment.mp4
    03:47
  • 7 -7-Standards.mp4
    04:31
  • 8 -8-Crowd Sourcing.mp4
    02:16
  • 9 -9-Summary and Recap.mp4
    01:27
  • 1 -0 - Introduction.mp4
    02:42
  • 1 - Content.html
  • 2 -1 - Secure Configuration and Version Control.mp4
    03:51
  • 3 -2 - Define Strategy and Roadmap.mp4
    04:40
  • 4 -3 - Manage Security Within a Software Development Met.mp4
    04:03
  • 5 -4 Identify Security Standards and Frameworks.mp4
    04:52
  • 6 -5 - Define and Develop Security Documentation.mp4
    03:20
  • 7 -6 - Develop Security Metrics.mp4
    03:58
  • 8 -7 - Decommission Software.mp4
    04:19
  • 9 -8 Report Security Status.mp4
    03:00
  • 10 -9 Summary and recap.mp4
    02:17
  • 1 -0-Introduction.mp4
    00:57
  • 2 -1 - Incorporate Integrated Risk Management.mp4
    05:39
  • 3 -2 - Implement Continuous Improvement.mp4
    03:12
  • 4 -3 Summary and Recap.mp4
    02:40
  • 1 - Content.html
  • 1 -0 - Introduction.mp4
    01:33
  • 2 -2-Perform Operational Risk Analysis.mp4
    04:51
  • 3 -3-Release Software Securely.mp4
    04:18
  • 4 -4-Securely Store and Manage Secur.mp4
    03:55
  • 5 -5-Ensure Secure Installation.mp4
    05:01
  • 6 -6-Perform Post-Deployment Securit.mp4
    03:00
  • 7 -7-Summary.mp4
    02:14
  • 1 -Introduction.mp4
    01:51
  • 2 -OSATO.mp4
    02:27
  • 3 -Perform Information Security Continuous Monitoring.mp4
    04:12
  • 4 -Support Incident Response.mp4
    03:55
  • 5 -Perform Patch Management.mp4
    02:31
  • 6 -Perform Vulnerability Management.mp4
    03:01
  • 7 -Runtime Protection.mp4
    03:10
  • 8 -Support Continuity of Operations.mp4
    04:42
  • 9 -Integrate Service Level Objectives and Service Level Agreements.mp4
    04:32
  • 10 - Summary.html
  • 1 - Content.html
  • 1 -1-Implement Software Supply Chain Risk Management.mp4
    02:51
  • 1 - 0-Introduction.html
  • 2 -2-Analyze Security of Third-Party Software.mp4
    04:09
  • 3 -3-Verify Pedigree and Provenance.mp4
    03:04
  • 4 - 4-Summary and Recap.html
  • 1 -1-Ensure Supplier Security Requirements in the Acquisition Process.mp4
    03:28
  • 1 - 0-Introductoin.html
  • 2 -2-Support Contractual Requirements.mp4
    04:50
  • 3 - 3-Summary.html
  • Description


    CSSLP Certification, includes Practice Questions and Tests, MindMaps, FlashCards & Pdf Notes

    What You'll Learn?


    • Secure Software LifeCycle
    • Secure Software Development, Testing, Deployment etc
    • Prepare for CSSLP
    • CSSLP Readiness

    Who is this for?


  • Software Security professionals
  • Software Architects and Engineers
  • Application Security Specialists
  • Software Project Managers
  • Software Program Managers
  • What You Need to Know?


  • Basics Software Development experience is required
  • More details


    Description

    Welcome to the Certified Secure Software Lifecycle Professional (CSSLP) Course! If you're involved in software development or project management, understanding how to maintain security throughout the software lifecycle is crucial. This course offers comprehensive training to help you build and manage secure software from inception to deployment.

    What is CSSLP? CSSLP stands for Certified Secure Software Lifecycle Professional. It's a certification provided by (ISC)² designed for professionals who integrate security practices into each phase of software development. This certification guides you through writing secure code and managing security risks effectively.

    Why is CSSLP Important?

    • Career Growth and Skills Enhancement: The CSSLP certification arms you with the best practices in secure software development, significantly boosting your skills and making you invaluable in protecting software from threats.

    • Industry Recognition: Being CSSLP certified enhances your professional credibility, allowing you to gain trust and recognition in the industry.

    • Staying Current: The certification keeps you updated with the latest security standards and regulations, essential in the rapidly evolving tech landscape.

    • Building Trust with Clients: With CSSLP, you demonstrate to clients that their software projects are secure and adhere to the highest standards of security practices.

    Who Should Take This Course? This course is tailored for various roles involved in software development and security, including:

    • Software Architects and Engineers

    • Software Developers

    • Application Security Specialists

    • Software Program Managers

    • Quality Assurance Testers

    • Penetration Testers

    • Software Procurement Analysts

    • Project Managers

    • Security Managers

    • IT Directors/Managers

    Course Structure: We’ll cover everything needed to achieve the CSSLP certification, broken down into eight comprehensive domains:

    1. Secure Software Concepts: Learn about confidentiality, integrity, availability, security models, and adversaries in software security.

    2. Secure Software Requirements: Focus on functional and non-functional requirements, including security regulations and compliance.

    3. Secure Software Architecture and Design: Explore security architecture, threat modeling, and best practices in secure design.

    4. Secure Software Implementation: Discuss secure coding practices, error handling, and runtime security.

    5. Secure Software Testing: Develop security testing strategies, including penetration testing, fuzzing, and cryptographic validation.

    6. Secure Software Lifecycle Management: Examine secure configuration, version control, and software risk management.

    7. Secure Software Deployment, Operations, Maintenance: Learn about operational risk analysis, secure release practices, and ongoing security maintenance.

    8. Secure Software Supply Chain: Address software supply chain risks and supplier security requirements.

    Maximize Your Learning Experience:

    • Access Rich Course Content: Engage with detailed lessons, guides, and real-world examples provided throughout the course.

    • Interactive Learning Tools: Utilize sample questions, practice exams, mind maps, and review sessions to reinforce learning.

    • Community Interaction: Join our discussion forums to collaborate with peers and resolve queries through community support.

    • Continuous Review: Benefit from additional resources, appendix sections, and regular concept reviews to deepen your understanding.

    Guarantee: This course comes with a 30-day money-back guarantee, ensuring that your investment is completely risk-free.

    Start your journey to becoming a CSSLP-certified professional today and open doors to new opportunities and enhanced security expertise in your career!

    Welcome aboard, and let’s embark on this educational journey together!

    Who this course is for:

    • Software Security professionals
    • Software Architects and Engineers
    • Application Security Specialists
    • Software Project Managers
    • Software Program Managers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Basics Strong
    Basics Strong
    Instructor's Courses
    Hi,We are a team of technocrats from IITs who work for solving problems through technology. We work on mission critical projects in AI, Machine Learning, BlockChain as domain and Java, Python, JavaScript and a lot of tools and technologies in technology space.We all as a group love to code and Program.We believe in strong foundation that's why we create courses which helps us students and professionals to build their Basics. Strong foundation and basics of programming concepts can lead to solve any technical problem and to excel in the career. That's why we as a team  thinks everyday how to make the complicated concepts easy to learn. All our courses are practical and with hands-on examples and comprehensive working files. All Our videos are created after a  comprehensive  research and reviews.Happy Learning! and All The Best for a Great Foundation!
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 121
    • duration 7:28:54
    • Release Date 2024/12/21