Certified Secure Software Lifecycle Pro (CSSLP) Crash Course
Certified Secure Software Lifecycle Pro (CSSLP) Crash Course, available at $69.99, has an average rating of 4.17, with 123 lectures, 3 quizzes, based on 78 reviews, and has 690 subscribers.
You will learn about Certified Secure Software Lifecycle Pro (CSSLP)Exam Objective Coverage Software Architecture best practices IT Security Best Practices Software Development Lifecycle (SDLC) DevOps best practices Software Testing Techniques Document Security Policies Perform Threat Analysis Create a Threat Tree This course is ideal for individuals who are CSSLP exam candidates interested in passing the exam with targeted content or Software Engineers or Software developers or Software testers or CISSP and IT Security Experts or Software Procurement Analyst or Application Developers or DevOps Engineers or US Government Employees, contractors and consultants that need to meet DoD Directive 8570.1 Baseline Certifications It is particularly useful for CSSLP exam candidates interested in passing the exam with targeted content or Software Engineers or Software developers or Software testers or CISSP and IT Security Experts or Software Procurement Analyst or Application Developers or DevOps Engineers or US Government Employees, contractors and consultants that need to meet DoD Directive 8570.1 Baseline Certifications.
Enroll now: Certified Secure Software Lifecycle Pro (CSSLP) Crash Course
Summary
Title: Certified Secure Software Lifecycle Pro (CSSLP) Crash Course
Price: $69.99
Average Rating: 4.17
Number of Lectures: 123
Number of Quizzes: 3
Number of Published Lectures: 123
Number of Published Quizzes: 3
Number of Curriculum Items: 126
Number of Published Curriculum Objects: 126
Original Price: $54.99
Quality Status: approved
Status: Live
What You Will Learn
- Certified Secure Software Lifecycle Pro (CSSLP)Exam Objective Coverage
- Software Architecture best practices
- IT Security Best Practices
- Software Development Lifecycle (SDLC)
- DevOps best practices
- Software Testing Techniques
- Document Security Policies
- Perform Threat Analysis
- Create a Threat Tree
Who Should Attend
- CSSLP exam candidates interested in passing the exam with targeted content
- Software Engineers
- Software developers
- Software testers
- CISSP and IT Security Experts
- Software Procurement Analyst
- Application Developers
- DevOps Engineers
- US Government Employees, contractors and consultants that need to meet DoD Directive 8570.1 Baseline Certifications
Target Audiences
- CSSLP exam candidates interested in passing the exam with targeted content
- Software Engineers
- Software developers
- Software testers
- CISSP and IT Security Experts
- Software Procurement Analyst
- Application Developers
- DevOps Engineers
- US Government Employees, contractors and consultants that need to meet DoD Directive 8570.1 Baseline Certifications
Please note that the content is broken into TWO Courses. This is Course ONE which is available now on Udemy.
Domain 1-4 is covered in this course….
Content between two courses is over 20 hours.
Earning the globally recognized CSSLP secure software development certification is a proven way to build your career and better incorporate security practices into each phase of the software development lifecycle (SDLC).
CSSLP certification recognizes leading application security skills. It shows employers and peers you have the advanced technical skills and knowledge necessary for authentication, authorization and auditing throughout the SDLC using best practices, policies and procedures established by the cybersecurity experts at (ISC)².
Obtaining your certification will prove your skills, help advance your career, and even gain support from a community of cybersecurity leaders here to help you throughout your professional journey.
The Certified Secure Software Lifecycle Professional (CSSLP) certification is a vendor neutral credential; launched in 2008 by the International Information System Security Certification Consortium, or (ISC)2. This exam is very challenging even to software developers with experience because of the depth of knowledge required to learn in order to pass.
This course has been developed by an industry professional with over twenty years of IT experience. Course contains numerous aids to help the learning process such as demos, discussions, whiteboard designs, test tips, practice reviews and practice questions.
The CSSLP certification validates that the certified professional has the expertise to include the best security practices, auditing, and authorization into each phase of the Software Development Lifecycle (SDLC). SDLC phases include software design, implementation, testing, and deployment.
After earning their CSSLP certification, a software professional will be able to develop a software security program in their organization, reduce production cost, mitigate source code vulnerabilities, and reduce losses because of software breaches.
The CSSLP meets the Level I and II IA System Architecture and Engineering requirements of the DoD mandate 8570.01M. Additionally, the CSSLP certification is accredited for the requirements of ANSI/IEC/ISO Standard-17024.
The CSSLP certification exam is a well written exam evaluating potential candidates across eight different domains. The exam contains 175 question, multiple-choice exam is administered over a 4-hour period at a Pearson Professional Center.
The CSSLP exam questions are developed from the skills and information contained within the CSSLP CBK with the following tested percentages.
Note Course is broken into TWO Courses due to size of content.
Course One Contains content for these Domains (This Course).
-
Secure Software Concepts – 13%
-
Secure Software Requirements – 14%
-
Secure Software Design – 16% Secure Software Implementation/Programming – 16%
Course Two Contains these Domain Objectives.
-
Secure Software Testing – 14%
-
Secure Lifecycle Management – 10%
-
Software Development, Operations, and Maintenance – 9%
-
Supply Chain and Software Acquisition – 8%
Who would be the target audience?
The audience should be willing to study and review materials to pass the CSSLP Plus and meet the requirements set by ISC2
In order to become a fully certified CSSLP, (ISC)² requires the candidate to have a minimum of four years cumulative paid full-time SDLC experience in one or more of the eight domains of the CSSLP credential. A candidate can substitute one year of experience for a four-year college degree. If a candidate passes the certification exam but does not possess the required years of experience they will become an associate of (ISC)² and have five years to earn the experience. At which time they will become a fully certified CSSLP.
Roles which would benefit from taking the exam.
Software Developers Software Engineers DevOps Engineers Enterprise Architects Application Developers Security Professionals
What you will learn
• Protecting data and business assets and complying with applicable laws and regulations
• Following secure coding standards and how documentation can help in the maintenance and operations of software
• Identifying software vulnerabilities and how to perform testing of units of code
• Managing each phase of the software development life cycle (SDLC)
• Developing security to meet environmental risk and operational challenges
• Supporting incident response, patch and vulnerability management, and continuity of operations
• Supporting the software acquisitions process
• Understanding security related frameworks and best practices
TechCommanders is an online training platform for both aspiring and veteran IT professionals interested in next generation IT Skills.
TechCommanders is led by Joseph Holbrook, a highly sought-after technology industry veteran.
Techcommanders offers blended learning which allows the students to learn on demand but with live training.
Courses offered are used to prepare students to take certification exams in Cloud, DevOps, IT Security and Blockchain.
Techcommanders was established in Jacksonville, Florida in 2020 by Joseph Holbrook, both a US Navy Veteran and a technology industry veteran. Techcommanders, Advancing your NextGen Technology Skills.
Course Curriculum
Chapter 1: Introduction
Lecture 1: Introduction
Lecture 2: Course Requirements
Lecture 3: What is a CSSLP?
Lecture 4: Why a CSSLP Certification Matters
Lecture 5: DoD Approved 8570 Baseline Certifications
Lecture 6: Exam Logistics Overview
Lecture 7: Exam Requirements
Lecture 8: Course Material Download
Chapter 2: Objective Coverage – Secure Software Concepts 13%
Lecture 1: Section Overview
Lecture 2: 1.1 Core Concepts
Lecture 3: Confidentiality, integrity and Availability (CIA)
Lecture 4: Non Repudiation
Lecture 5: AAA
Lecture 6: 1.2 Security Design Principles
Lecture 7: Least Privalage
Lecture 8: Separation of duties
Lecture 9: Defense in Depth
Lecture 10: Whiteboard – Defense in Depth
Lecture 11: Fail Safe
Lecture 12: Economy of Mechanism
Lecture 13: Complete Remediation
Lecture 14: Open Design
Lecture 15: Least Common Mechanism
Lecture 16: Psychological acceptability
Lecture 17: Leveraging existing components
Lecture 18: Eliminate single point of failure
Lecture 19: Hashing Demo
Lecture 20: Test Tips Section 1
Lecture 21: Section 1 Review Questions
Chapter 3: 2. Secure Software Requirements
Lecture 1: Section Overview
Lecture 2: 2.1 Identify Security Requirements
Lecture 3: Functional and Non Functional Requirements
Lecture 4: Terminology To Know Part 1
Lecture 5: Whiteboard
Lecture 6: Terminology to Know Part 2
Lecture 7: Owasp
Lecture 8: Terminology to Know Part 3
Lecture 9: Policy decomposition
Lecture 10: Legal Terminology to Know
Lecture 11: Privacy Requirements
Lecture 12: Control Basics
Lecture 13: 2.2 Interpret Data Classification Requirements
Lecture 14: Data Classification overview- Ownership, Labeling, Data Types, Data Lifecycle
Lecture 15: 2.3 Identify Privacy Requirements
Lecture 16: Data Anonymization
Lecture 17: 2.4 Develop Misuse and Abuse Cases
Lecture 18: Abuse Cases
Lecture 19: 2.5 Include Security in Software Requirement Specifications
Lecture 20: Maturity Model
Lecture 21: Threats
Lecture 22: Threat Modeling
Lecture 23: Orgs to Know
Lecture 24: 2.6 Develop Security Requirement Traceability Matrix
Lecture 25: SRTM
Lecture 26: Safecode
Lecture 27: Test Tips
Lecture 28: Section Review Questions
Chapter 4: 3. Secure Software Design 16%
Lecture 1: 3. Secure Software Design 16%
Lecture 2: 3.1 Perform Threat Modeling
Lecture 3: Common Threats
Lecture 4: Threats and Threat Modeling
Lecture 5: Threat Models
Lecture 6: What is a Threat Tree?
Lecture 7: Whiteboard – Threat Tree
Lecture 8: Attack surface evaluation
Lecture 9: Terminology to know
Lecture 10: 3.2 Define the Security Architecture
Lecture 11: Control identification and prioritization
Lecture 12: Whiteboard – Controls
Lecture 13: Distributed computing
Lecture 14: Service-oriented architecture
Lecture 15: Whiteboard SOA
Lecture 16: Rich Internet Apps
Lecture 17: Embedded Devices
Lecture 18: Cloud Computing
Lecture 19: Whiteboard – Cloud Computing
Lecture 20: Cloud Security Best Practices – AWS
Lecture 21: Cloud Security Best Practices – GCP
Lecture 22: Mobile Apps
Lecture 23: Whiteboard – Mobile and SSO
Lecture 24: Hardware Platform Concerns
Lecture 25: 3.3 Performing Secure Interface Design
Lecture 26: Security management interfaces, out-of-band management, log interfaces
Lecture 27: Whiteboard – In Band and Out of Band Management
Lecture 28: Whiteboard – Interfaces
Lecture 29: Network Protocol design choices
Lecture 30: Whiteboard SSH
Lecture 31: API Design Choices
Lecture 32: 3.4 Performing Architectural Risk Assessment
Lecture 33: Architectural Risk Assement
Lecture 34: Whiteboard – Risk Assessment
Lecture 35: Risk Registers
Lecture 36: Whiteboard – Risk Registers
Lecture 37: Risk Management Plans
Instructors
-
Joseph Holbrook (The Cloud Tech Guy)
Cloud Computing and Blockchain Architect/Blogger/Trainer
Rating Distribution
- 1 stars: 5 votes
- 2 stars: 6 votes
- 3 stars: 6 votes
- 4 stars: 31 votes
- 5 stars: 30 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024