CSSLP: Domain 1 - Secure Software Concepts

OverviewStepsAuthor
DifficultyAdvanced
AVG Duration3h
Students29
Ratings
5/5
starstarstarstarstar
Content
5

Description

The Certified Secure Software Lifecycle Professional (CSSLP) is a certification created and conferred by the International Information Systems Security Consortium, known as ISC2 for short. Using only the most current sources and information, this learning path will bring insights and knowledge to add to your experience and thus prepare you to successfully take and pass the certification examination. Having the CSSLP credentials signifies that its owner is both skilled and experienced in addressing these complex situations effectively, and thus enabling them to provide much-needed support to their team's efforts.

Intended Audience

This is a unique certification intended for those involved in the software development process, who need to understand how to bring security into the picture, an interesting and important aspect of systems development and operation.

Learning Objectives

In this learning path, we will cover foundational knowledge and ideas about what informs the designing and building of secure software. As a result, by the end of this learning path, you will have an understanding of:

  • The CIA Triad
  • Authorization, Authentication, and Accounting
  • Design Principles
  • Security Models
  • Access Controls
  • Threat/Adversary Analysis
  • Risk management problem space and management flow
  • Definitions, terminology, and types of risks
  • Control Categories and Functions
  • Cost-Benefit Assessment
  • General Risk Assessment Model
  • Overall Control Objectives
  • Security policies, regulations, and compliance
  • The legal and privacy issues that these regulations aim to address
  • A variety of security frameworks and standards
  • Trusted computed principles and how they underpin security frameworks
  • Security implications of acquiring software
  • The secure development lifecycle and the implications it has on your software
  • The various software development methods for keeping your environments secure
  • The software development lifecycle


Agenda

1:1 - Secure software concepts

1:2 - Risk Management

1:3 - Security, policies, and regulations

1:4 - Software Development Methodologies

Feedback

If you have any feedback please contact us at support@cloudacademy.com, thank you!

Certificate

Your certificate for this learning path
lock

Training Content

1
Course - Beginner - 11m
Introduction to the Certified Secure Software Lifecycle Professional (CSSLP)​
Learn the objectives on how to become a Certified Secure Software Lifecycle Professional (CSSLP)​
2
Course - Intermediate - 56m
CSSLP Domain 1:1 General Security Concepts
Understand the requirements assessed within Domain 1:1 of the CSSLP covering general security concepts
3
Course - Intermediate - 40m
CSSLP Domain 1:2 Risk Management
This course explores the topic of risk management and is one of four courses covering Domain 1 of the CSSLP.
4
Course - Intermediate - 51m
CSSLP Domain 1:3 Security Policies and Regulations
This course explores the topic of security policies and regulations and is one of four courses covering Domain 1 of the CSSLP.
5
Course - Intermediate - 32m
CSSLP Domain 1:4 Software Development Methodologies
This course is the fourth installment of four courses covering Domain 1 of the CSSLP, covering the topic of software development methodologies.
About the Author
Students3765
Courses49
Learning paths8

Mr. Leo has been in Information System for 38 years, and an Information Security professional for over 36 years.  He has worked internationally as a Systems Analyst/Engineer, and as a Security and Privacy Consultant.  His past employers include IBM, St. Luke’s Episcopal Hospital, Computer Sciences Corporation, and Rockwell International.  A NASA contractor for 22 years, from 1998 to 2002 he was Director of Security Engineering and Chief Security Architect for Mission Control at the Johnson Space Center.  From 2002 to 2006 Mr. Leo was the Director of Information Systems, and Chief Information Security Officer for the Managed Care Division of the University of Texas Medical Branch in Galveston, Texas.

 

Upon attaining his CISSP license in 1997, Mr. Leo joined ISC2 (a professional role) as Chairman of the Curriculum Development Committee, and served in this role until 2004.   During this time, he formulated and directed the effort that produced what became and remains the standard curriculum used to train CISSP candidates worldwide.  He has maintained his professional standards as a professional educator and has since trained and certified nearly 8500 CISSP candidates since 1998, and nearly 2500 in HIPAA compliance certification since 2004.  Mr. leo is an ISC2 Certified Instructor.