CSSLP: Secure Software Concepts

This course is included in our On-demand training solution.

Overview

A fundamental understanding of the potential risks, vulnerabilities and exposures throughout the software lifecycle is the basis for ensuring overall software security. In this course, you’ll learn about the core concepts of confidentiality, integrity, authentication, and authorization. You’ll also be introduced to security design principles such as least privilege, separation of duties, fail safe, and economy of mechanism. Finally, this course covers best practices for governance, risk, and compliance throughout the software lifecycle. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Secure Software Lifecycle Professional (CSSLP) exam.

Target Audience

Individuals interested in secure software lifecycle design concepts and methodologies; candidates for the Certified Secure Software Lifecycle Professional (CSSLP) exam

Prerequisites

None

Expected Duration

120 min.

Course Objectives

Course Introduction

Confidentiality

  • recognize the characteristics of confidentiality
  • Integrity

  • identify the characteristics of integrity
  • Availability

  • identify the characteristics of availability
  • Authentication and Authorization Part 1

  • recognize the characteristics of authentication and authorization
  • Authentication and Authorization Part 2

  • recognize the characteristics of authentication and authorization
  • Accounting

  • identify the role of accounting in assuring security
  • Non-Repudiation

  • recognize the characteristics of non-repudiation
  • Least Privilege

  • identify the characteristics of least privilege
  • Separation of Duties

  • recognize the characteristics of separation of duties
  • Defense in Depth

  • recognize the characteristics of defense in depth
  • Fail-Safe

  • recognize the characteristics of fail-safe
  • Economy of Mechanism

  • recognize the characteristics of economy of mechanism
  • Complete Mediation

  • recognize the characteristics of complete mediation
  • Open Design

  • recognize the characteristics of open design
  • Least Common Mechanism

  • recognize the characteristics of least common mechanism
  • Psychological Acceptability

  • recognize the characteristics of psychological acceptability
  • Weakest Link

  • recognize the characteristics of the weakest link
  • Leveraging Existing Components

  • recognize the characteristics of leveraging existing components
  • The Privacy Principle

  • recognize the characteristics of privacy
  • Privacy Considerations

  • distinguish between different privacy considerations
  • Regulations and Compliance

  • recognize characteristics of regulations and compliance
  • Legal

  • distinguish between legal issues to keep in mind during the software lifecycle
  • Standards

  • recognize characteristics of standards
  • Risk Management

  • distinguish between the steps of the general risk management model
  • Waterfall

  • identify secure software concepts in the Waterfall methodology
  • Agile

  • identify secure software concepts in the Agile methodology
  • Exercise: Secure Your Software

    SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?