• Home
  • Certifications
    • Adobe
    • Analytics & Data Management
    • Android
    • Application Development
    • AWS
    • Biocertification
    • CertCop
    • CISCO
    • Cloud Computing & Virtualization
    • CompTIA
    • Cyber & Network Security
    • Database
    • DoD 8140/8570.01
    • EC-Council
    • EMC2
    • Intel
    • ISACA
    • ISC2
    • ITIL
    • Micro Focus
    • Microsoft
    • PECB
    • PMI
    • PostgreSQL
    • Splunk
    • SUSE
    • VMware
    • Wireshark
  • Training Programs
    • Training Catalog
    • ON-Demand Training
    • Govt./DoD 8570.1 Discount Pricing
    • CertPass Offerings
    • Virtuallivetraining 100% Exam Pass Guarantee
    • Virtuallivetraining Promotions
    • Biometrics Webinars
  • Delivery Methods
    • Virtual Live Training
    • On Demand / Self Study
    • Virtual Live Group Training
    • 1-1 mentoring
  • Exam Prep Tools
    • Practice Exam
    • Flash Cards
    • Mock Exam
    • Complete Bundles
    • e-Book
    • Special Price
    • Exam Voucher
  • Services & Solutions
    • CertTemps
    • Corporate Executive Technology Essentials Program
    • Consulting & Technical Support Services
    • Industries
    • Preferred Clients
    • Refer a Friend
    • Training Program Development & Management
  • Resources & Support
    • Scholarship Application Form
    • Host your Course here
    • Exam Prep & Pre-Assessment
    • Special Events & Free Training Offerings
    • Post Training E-mail Support
    • Post Training Evaluation
  • Company
    • Registration Form
    • Become a Virtual Live Training Authorized Training Reseller
    • Locations
    • Shopping Cart
    • Blog
    • Terms and Conditions
    • Testimonial and Clients
    • About Us
    • Why Virtuallivetraining
    Have any question?
    1-630-684-0355
    info@virtuallivetraining.com
    RegisterLogin
    REFER AND EARN        Cart       My orders      
    virtuallivetraining.com
    • Home
    • Certifications
      • Adobe
      • Analytics & Data Management
      • Android
      • Application Development
      • AWS
      • Biocertification
      • CertCop
      • CISCO
      • Cloud Computing & Virtualization
      • CompTIA
      • Cyber & Network Security
      • Database
      • DoD 8140/8570.01
      • EC-Council
      • EMC2
      • Intel
      • ISACA
      • ISC2
      • ITIL
      • Micro Focus
      • Microsoft
      • PECB
      • PMI
      • PostgreSQL
      • Splunk
      • SUSE
      • VMware
      • Wireshark
    • Training Programs
      • Training Catalog
      • ON-Demand Training
      • Govt./DoD 8570.1 Discount Pricing
      • CertPass Offerings
      • Virtuallivetraining 100% Exam Pass Guarantee
      • Virtuallivetraining Promotions
      • Biometrics Webinars
    • Delivery Methods
      • Virtual Live Training
      • On Demand / Self Study
      • Virtual Live Group Training
      • 1-1 mentoring
    • Exam Prep Tools
      • Practice Exam
      • Flash Cards
      • Mock Exam
      • Complete Bundles
      • e-Book
      • Special Price
      • Exam Voucher
    • Services & Solutions
      • CertTemps
      • Corporate Executive Technology Essentials Program
      • Consulting & Technical Support Services
      • Industries
      • Preferred Clients
      • Refer a Friend
      • Training Program Development & Management
    • Resources & Support
      • Scholarship Application Form
      • Host your Course here
      • Exam Prep & Pre-Assessment
      • Special Events & Free Training Offerings
      • Post Training E-mail Support
      • Post Training Evaluation
    • Company
      • Registration Form
      • Become a Virtual Live Training Authorized Training Reseller
      • Locations
      • Shopping Cart
      • Blog
      • Terms and Conditions
      • Testimonial and Clients
      • About Us
      • Why Virtuallivetraining

      ISC2

      • Home
      • All courses
      • ISC2
      • Certified Secure Software Lifecycle Professional

      Certified Secure Software Lifecycle Professional

      Admin bar avatar
      VLT
      ISC2

      On Demand $2,494.00

      Virtual Live







      csslp
      • Overview
      • Curriculum
      • Instructor

      Course Description

      The Certified Secure Software Lifecycle Professional (CSSLP) validates that software professionals have the expertise to incorporate security practices – authentication, authorization, and auditing – into each phase of the software development lifecycle (SDLC), from software design and implementation to testing and deployment.

      The broad spectrum of topics included in the CSSLP Common Body of Knowledge (CBK®) ensures its relevancy across all disciplines in the field of information security. Successful candidates are competent in the following eight domains:

      • Secure Software Concepts
      • Secure Software Requirements
      • Secure Software Architecture and Design
      • Secure Software Implementation
      • Secure Software Testing
      • Secure Software Lifecycle Management
      • Secure Software Deployment, Operations, Maintenance
      • Secure Software Supply Chain

       

      Program Objectives

      After completing this course, the student will be able to:

      • Understand and apply fundamental concepts and methods related to the fields of information technology and security
      • Align overall organizational operational goals with security functions and implementations
      • Understand how to protect assets of the organization as they go through their lifecycle
      • Understand the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability
      • Implement system security through the application of security design principles and application of appropriate security control mitigations for vulnerabilities present in common information system types and architectures
      • Understand the importance of cryptography and the security services it can provide in today’s digital and information age
      • Understand the impact of physical security elements on information system security and apply secure design principles to evaluate or recommend appropriate physical security protections
      • Understand the elements that comprise communication and network security coupled with a thorough description of how the communication and network systems function
      • List the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1-7
      • Identify standard terms for applying physical and logical access controls to environments related to their security practice
      • Appraise various access control models to meet business security requirements
      • Name primary methods for designing and validating test and audit strategies that support business requirements
      • Enhance and optimize an organization’s operational function and capacity by applying and utilizing appropriate security controls and countermeasures
      • Recognize risks to an organization’s operational endeavors and assess specific threats, vulnerabilities, and controls
      • Understand the System Lifecycle (SLC) and the Software Development Lifecycle (SDLC) and how to apply security to it; identify which security control(s) are appropriate for the development environment, and assess the effectiveness of software security

       

      Prerequisites

      • Candidates must have a minimum of four years cumulative, paid, full-time SDLC professional experience in one or more of the eight domains of the CSSLP Common Body of Knowledge (CBK).
      • Earning a four-year college degree or regional equivalent will waive one year of the required experience.
      • Only a one-year experience exemption is granted for education.

      Course Features

      • Lectures 63
      • Quizzes 0
      • Duration 40 hours
      • Skill level Intermediate Level
      • Language English
      • Students 458
      • Certificate No
      • Assessments Yes
      CoursesISC2Certified Secure Software Lifecycle Professional
      • Domain 1: Secure Software Concepts
        2
        • Lecture1.1
          1.1 Core Concepts
        • Lecture1.2
          1.2 Security Design Principles
      • Domain 2: Secure Software Requirements
        7
        • Lecture2.1
          2.1 Define Software Security Requirements
        • Lecture2.2
          2.2 Identify and Analyze Compliance Requirements
        • Lecture2.3
          2.3 Identify and Analyze Data Classification Requirements
        • Lecture2.4
          2.4 Identify and Analyze Privacy Requirements
        • Lecture2.5
          2.5 Develop Misuse and Abuse Cases
        • Lecture2.6
          2.6 Develop Security Requirement Traceability Matrix (STRM)
        • Lecture2.7
          2.7 Ensure Security Requirements Flow Down to Suppliers/Providers
      • Domain 3: Secure Software Architecture and Design
        10
        • Lecture3.1
          3.1 Perform Threat Modeling
        • Lecture3.2
          3.2 Define the Security Architecture
        • Lecture3.3
          3.3 Performing Secure Interface Design
        • Lecture3.4
          3.4 Performing Architectural Risk Assessment
        • Lecture3.5
          3.5 Model (Non-Functional) Security Properties and Constraints
        • Lecture3.6
          3.6 Model and Classify Data
        • Lecture3.7
          3.7 Evaluate and Select Reusable Secure Design
        • Lecture3.8
          3.8 Perform Security Architecture and Design Review
        • Lecture3.9
          3.9 Define Secure Operational Architecture (e.g., deployment topology, operational interfaces)
        • Lecture3.10
          3.10 Use Secure Architecture and Design Principles, Patterns, and Tools
      • Domain 4: Secure Software Implementation
        7
        • Lecture4.1
          4.1 Adhere to Relevant Secure Coding Practices (e.g., standards, guidelines and regulations)
        • Lecture4.2
          4.2 Analyze Code for Security Risks
        • Lecture4.3
          4.3 Implement Security Controls (e.g., watchdogs, File Integrity Monitoring (FIM), anti-malware)
        • Lecture4.4
          4.4 Address Security Risks (e.g. remediation, mitigation, transfer, accept)
        • Lecture4.5
          4.5 Securely Reuse Third-Party Code or Libraries (e.g., Software Composition Analysis (SCA))
        • Lecture4.6
          4.6 Securely Integrate Components
        • Lecture4.7
          4.7 Apply Security During the Build Process
      • Domain 5: Secure Software Testing
        8
        • Lecture5.1
          5.1 Develop Security Test Cases
        • Lecture5.2
          5.2 Develop Security Testing Strategy and Plan
        • Lecture5.3
          5.3 Verify and Validate Documentation (e.g., installation and setup instructions, error messages, user guides, release notes)
        • Lecture5.4
          5.4 Identify Undocumented Functionality
        • Lecture5.5
          5.5 Analyze Security Implications of Test Results (e.g., impact on product management, prioritization, break build criteria)
        • Lecture5.6
          5.6 Classify and Track Security Errors
        • Lecture5.7
          5.7 Secure Test Data
        • Lecture5.8
          5.8 Perform Verification and Validation Testing
      • Domain 6: Secure Software Lifecycle Management
        11
        • Lecture6.1
          6.1 Secure Configuration and Version Control (e.g., hardware, software, documentation, interfaces, patching)
        • Lecture6.2
          6.2 Define Strategy and Roadmap
        • Lecture6.3
          6.3 Manage Security Within a Software Development Methodology
        • Lecture6.4
          6.4 Identify Security Standards and Frameworks
        • Lecture6.5
          6.5 Define and Develop Security Documentation
        • Lecture6.6
          6.6 Develop Security Metrics (e.g., defects per line of code, criticality level, average remediation time, complexity)
        • Lecture6.7
          6.7 Decommission Software
        • Lecture6.8
          6.8 Report Security Status (e.g., reports, dashboards, feedback loops)
        • Lecture6.9
          6.9 Incorporate Integrated Risk Management (IRM)
        • Lecture6.10
          6.10 Promote Security Culture in Software Development
        • Lecture6.11
          6.11 Implement Continuous Improvement (e.g., retrospective, lessons learned)
      • Domain 7: Secure Software Deployment, Operations, Maintenance
        13
        • Lecture7.1
          7.1 Perform Operational Risk Analysis
        • Lecture7.2
          7.2 Release Software Securely
        • Lecture7.3
          7.3 Securely Store and Manage Security Data
        • Lecture7.4
          7.4 Ensure Secure Installation
        • Lecture7.5
          7.5 Perform Post-Deployment Security Testing
        • Lecture7.6
          7.6 Obtain Security Approval to Operate (e.g., risk acceptance, sign-off at appropriate level)
        • Lecture7.7
          7.7 Perform Information Security Continuous Monitoring (ISCM)
        • Lecture7.8
          7.8 Support Incident Response
        • Lecture7.9
          7.9 Perform Patch Management (e.g. secure release, testing)
        • Lecture7.10
          7.10 Perform Vulnerability Management (e.g., scanning, tracking, triaging)
        • Lecture7.11
          7.11 Runtime Protection (e.g., Runtime Application Self-Protection (RASP), Web Application Firewall (WAF), Address Space Layout Randomization (ASLR))
        • Lecture7.12
          7.12 Support Continuity of Operations
        • Lecture7.13
          7.13 Integrate Service Level Objectives (SLO) and Service Level Agreements (SLA) (e.g., maintenance, performance, availability, qualified personnel)
      • Domain 8: Secure Software Supply Chain
        5
        • Lecture8.1
          8.1 Implement Software Supply Chain Risk Management
        • Lecture8.2
          8.2 Analyze Security of Third-Party Software
        • Lecture8.3
          8.3 Verify Pedigree and Provenance
        • Lecture8.4
          8.4 Ensure Supplier Security Requirements in the Acquisition Process
        • Lecture8.5
          8.5 Support contractual requirements (e.g., Intellectual Property (IP) ownership, code escrow, liability, warranty, End-User License Agreement (EULA), Service Level Agreements (SLA))
      Admin bar avatar
      VLT
      • Share:

      You May Like

      CISM Reference materials
      Admin bar avatar
      VLT

      CISM Reference materials

      0
      Free
      Certified Information Security Manager (CISM) Flash Cards
      Admin bar avatar
      VLT

      Certified Information Security Manager (CISM) Flash Cards

      0
      $99.00$25.00
      CISSP e-Slides
      Admin bar avatar
      VLT

      CISSP e-Slides

      0
      $25.00
      CompTIA CASP+ Scenario Based Questions
      Admin bar avatar
      VLT

      CompTIA CASP+ Scenario Based Questions

      13
      $99.00
      CASP+ Reference Materials
      Admin bar avatar
      VLT

      CASP+ Reference Materials

      11
      $25.00

      Leave A Reply Cancel reply

      Your email address will not be published. Required fields are marked *

      All Courses

      • Adobe
      • Analytics & Data Management
      • Android
      • Application Development
      • AWS
      • Biocertification
      • CertCop
      • CISCO
      • Cloud Computing & Virtualization
      • CompTIA
      • Cyber & Network Security
      • Database
      • DoD 8140/8570.01
      • EC-Council
      • EMC2
      • Intel
      • ISACA
      • ISC2
      • ITIL
      • Micro Focus
      • Microsoft
      • PECB
      • PMI
      • PostgreSQL
      • Splunk
      • SUSE
      • VMware
      • Wireshark

      Latest Courses

      CISM Reference materials

      Free
      Certified Information Security Manager (CISM) Flash Cards

      Certified Information Security Manager (CISM) Flash Cards

      $99.00 $25.00
      CISSP e-Slides

      CISSP e-Slides

      $25.00

      logo-eduma-the-best-lms-wordpress-theme

      1-630-684-0355

      info@virtuallivetraining.com

      •  
      •  
      •  
      •  

      Company

      • About Us
      • Locations
      • Contact us
      • Become an Instructor

      Links

      • Course Registration
      • Courses
      • FAQs

      Support

      • Technical support
      • Corporate Group Training
      • Request a call back
      • Discount/Free Course

      Recommend

      • virtuallivetraining
      • Postgresqlcert
      • Certcop
      • Exam IT
      • Saifirst

      Copyright@ 2005-2022 virtuallivetraining [A CertFirst Company]

      • Privacy
      • Terms
      • Sitemap
      • Purchase

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account

      Are you a member? Login now

      Modal title

      Message modal