learning path

CSSLP: Domain 1 - Secure Software Concepts

Up to 5h 35m
Enhance your skill setDevelop essential skills for thriving in real-world scenarios.
Stay focused, stay committedBoost your learning journey by enrolling: stay focused, consistent and achieve your goals with ease.
Earn a certificate of completionShow your skills and build your credibility when you include them in your resume and LinkedIn profile.

The Certified Secure Software Lifecycle Professional (CSSLP) is a certification created and conferred by the International Information Systems Security Consortium, known as ISC2 for short. Using only the most current sources and information, this course will bring insights and knowledge to add to your experience and thus prepare you to successfully take and pass the certification examination. Having the CSSLP credentials signifies that its owner is both skilled and experienced in addressing these complex situations effectively, and thus enabling them to provide much-needed support to their team's efforts.

Intended Audience

This is a unique certification intended for those involved in the software development process, who need to understand how to bring security into the picture, an interesting and important aspect of systems development and operation.

Learning Objectives

In this course, we will cover foundational knowledge and ideas about what informs the designing and building of secure software. As a result, by the end of this course, you will have an understanding of:

  • The CIA Triad
  • Authorization, Authentication, and Accounting
  • Design Principles
  • Security Models
  • Access Controls
  • Threat/Adversary Analysis
  • Risk management problem space and management flow
  • Definitions, terminology, and types of risks
  • Control Categories and Functions
  • Cost-Benefit Assessment
  • General Risk Assessment Model
  • Overall Control Objectives
  • Security policies, regulations, and compliance
  • The legal and privacy issues that these regulations aim to address
  • A variety of security frameworks and standards
  • Trusted computed principles and how they underpin security frameworks
  • Security implications of acquiring software
  • The secure development lifecycle and the implications it has on your software
  • The various software development methods for keeping your environments secure
  • The software development lifecycle


1:1 - Secure software concepts

1:2 - Risk Management

1:3 - Security, policies, and regulations

1:4 - Software Development Methodologies


If you have any feedback please contact us at support@cloudacademy.com, thank you!

Your certificate for this learning path

About the Author

Learning paths

Mr. Leo has been in Information System for 38 years, and an Information Security professional for over 36 years.  He has worked internationally as a Systems Analyst/Engineer, and as a Security and Privacy Consultant.  His past employers include IBM, St. Luke’s Episcopal Hospital, Computer Sciences Corporation, and Rockwell International.  A NASA contractor for 22 years, from 1998 to 2002 he was Director of Security Engineering and Chief Security Architect for Mission Control at the Johnson Space Center.  From 2002 to 2006 Mr. Leo was the Director of Information Systems, and Chief Information Security Officer for the Managed Care Division of the University of Texas Medical Branch in Galveston, Texas.


Upon attaining his CISSP license in 1997, Mr. Leo joined ISC2 (a professional role) as Chairman of the Curriculum Development Committee, and served in this role until 2004.   During this time, he formulated and directed the effort that produced what became and remains the standard curriculum used to train CISSP candidates worldwide.  He has maintained his professional standards as a professional educator and has since trained and certified nearly 8500 CISSP candidates since 1998, and nearly 2500 in HIPAA compliance certification since 2004.  Mr. leo is an ISC2 Certified Instructor.

Covered Topics