CSSLP Certification Training | Certified Secure Software Lifecycle Professional Training

CSSLP Certification Training | Certified Secure Software Lifecycle Professional Training

Introduction:

CSSLP Certification Training | Certified Secure Software Lifecycle Professional Training Public and Onsite Classes

It's widely agreed upon that almost 90% of security vulnerabilities are tied to the application layer and software, not to networks or hard IT assets. The CSSLP credential from (ISC)² is the definitive assurance that a security professional is trained and ready to mitigate and prevent this primary source of vulnerability.The CSSLP is the most up-to-date software security certification available, and is a critical skill set for the teams responsible for holistic organizational security. ASPE is one of the few Official Training Partners of the (ISC)² governing body, and we deliver only the most up-to-date official version of this CSSLP Training | Certified Secure Software Lifecycle Professional Training class, conducted only by (ISC)² Authorized Instructors. With real-world application, this CSSLP Certification Training | Certified Secure Software Lifecycle Professional Training boot camp will cover the eight domains of the CSSLP CBK (Common Body of Knowledge).

Customize It:

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

Audience/Target Group

Software developers
Engineers and architects
Product managers
Project managers
Software QA
QA testers
Business analysts
Anyone managing these stakeholders

CSSLP Certification Training | Certified Secure Software Lifecycle Professional TrainingRelated Courses:

Duration: 5 days

Skilled Gained:

Learn About Security Software Concepts
Learn About Security Software Requirements
Design phase of Secure Software Development
Learn About Security Software Implementation/Coding
Learn About Security Software Testing
Learn About Software Acceptance
Learn Software Deployment, Operations, Maintenance and Disposal
Learn About Supply Chain and Software Acquisition

Course Content:

Secure Software Concepts

Concepts of Secure Software
Principles of Security Design
Secuirty Privacy
Governance, Risk, and Compliance
Methodologies for Software Development

Domain: Security Software Concepts

provides you with concepts related to the core software security requirements and foundational design principles as they relate to issues of privacy, governance, risk and compliance. Understand the software methodologies needed in order to develop software that is secure and resilient to attacks.

Concepts of Secure Software
Principles of Security Design
Secuirty Privacy
Governance, Risk, and Compliance
Methodologies for Software Development

Domain: Security Software Requirements

provides you with concepts related to understanding the importance of identifying and developing software with secure requirements. You incorporate security requirements in the development of software in order to produce software that is reliable, resilient, and recoverable.

Policy Decomposition
Classification and Categorization
Functional Requirements - Use Cases and Abuse Cases
Secure Software Operational Requirements

Domain:Secure Software Design

is one of the most important phases in the Software Development Life Cycle. The Security Software Design module provides you with an understanding on how to ensure that software security requirements are included in the design of the software. You will gain knowledge of secure design principles and processes, and be exposed to different architectures and technologies for securing software.

Importance of Secure Design
Design Considerations
The Design Process
Securing Commonly Used Architectures

Domain: Secure Software Implementation/Coding

provides you with an understanding of the importance of programming concepts that can effectively protect software from vulnerabilities. Cover topics such as software coding vulnerabilities, defensive coding techniques and processes, code analysis and protection, and environmental security considerations that should be factored into software.

Fundamental Programming Concepts
Code Access Security
Vulnerability Databases and Lists
Defensive Coding Practices and Controls
Secure Software Processes

Domain: Security Software Testing

addresses issues pertaining to proper testing of software for security, including the overall strategies and plans. You will understand the different types of functional and security testing that should be performed, the criteria for testing, concepts related to impact assessment and corrective actions, and the test data lifecycle.

Artifacts of Testing
Testing for Secure Quality Assurance
Types of Testing
Impact Assessment and Corrective Action
Test Data Lifecycle Management

Domain: Software Acceptance

covers requirements for software acceptance paying specific attention to compliance, quality, functionality, and assurance. You will learn about pre and post-release validation requirements as well as pre-deployment criteria.

Software Acceptance Considerations
Post-release

Domain: Software Deployment, Operation, Maintenance and Disposal

provides you with knowledge pertaining to the deployment, operations, maintenance, and disposal of software from a secure perspective. You identify processes during installation and deployment, operations and maintenance, and disposal that can affect the ability of the software to remain reliable, resilient, and recoverable in its prescribed manner.

Installation and Deployment
Operations and Maintenance
Disposal of Software

Domain: Supply Chain and Software Acquisition

gives you the knowledge to perform effective assessments on an organizations cyber-supply chain, and describes how security applies to the supply chain and software acquisition process. You will understand the importance of supplier sourcing and being able to validate vendor integrity, from third-party vendors to complete outsourcing. Finally, cover how to manage risk through the adoption of standards and best practices for the proper development, testing, and learn to employ tools and resources necessary to mitigate risk across the entire lifecycle of products.

Supplier Risk Assessment
Supplier Sourcing
Software Development and Test
Software Delivery, Operations and Maintenance
Supplier Transitioning

Request More Information

Time Frame: 0-3 Months4-12 Months

Print Friendly, PDF & Email

No Comments Yet.

Leave a comment