HOME > IT & Software > Certified Secure Software Lifecycle Pro (CSSLP) Crash Course

Certified Secure Software Lifecycle Pro (CSSLP) Crash Course

SynopsisCertified Secure Software Lifecycle Pro (CSSLP Crash Course,...
Certified Secure Software Lifecycle Pro (CSSLP) Crash Course  No.1

Certified Secure Software Lifecycle Pro (CSSLP) Crash Course, available at $69.99, has an average rating of 4.17, with 123 lectures, 3 quizzes, based on 78 reviews, and has 690 subscribers.

You will learn about Certified Secure Software Lifecycle Pro (CSSLP)Exam Objective Coverage Software Architecture best practices IT Security Best Practices Software Development Lifecycle (SDLC) DevOps best practices Software Testing Techniques Document Security Policies Perform Threat Analysis Create a Threat Tree This course is ideal for individuals who are CSSLP exam candidates interested in passing the exam with targeted content or Software Engineers or Software developers or Software testers or CISSP and IT Security Experts or Software Procurement Analyst or Application Developers or DevOps Engineers or US Government Employees, contractors and consultants that need to meet DoD Directive 8570.1 Baseline Certifications It is particularly useful for CSSLP exam candidates interested in passing the exam with targeted content or Software Engineers or Software developers or Software testers or CISSP and IT Security Experts or Software Procurement Analyst or Application Developers or DevOps Engineers or US Government Employees, contractors and consultants that need to meet DoD Directive 8570.1 Baseline Certifications.

Enroll now: Certified Secure Software Lifecycle Pro (CSSLP) Crash Course

Summary

Title: Certified Secure Software Lifecycle Pro (CSSLP) Crash Course

Price: $69.99

Average Rating: 4.17

Number of Lectures: 123

Number of Quizzes: 3

Number of Published Lectures: 123

Number of Published Quizzes: 3

Number of Curriculum Items: 126

Number of Published Curriculum Objects: 126

Original Price: $54.99

Quality Status: approved

Status: Live

What You Will Learn

  • Certified Secure Software Lifecycle Pro (CSSLP)Exam Objective Coverage
  • Software Architecture best practices
  • IT Security Best Practices
  • Software Development Lifecycle (SDLC)
  • DevOps best practices
  • Software Testing Techniques
  • Document Security Policies
  • Perform Threat Analysis
  • Create a Threat Tree
  • Who Should Attend

  • CSSLP exam candidates interested in passing the exam with targeted content
  • Software Engineers
  • Software developers
  • Software testers
  • CISSP and IT Security Experts
  • Software Procurement Analyst
  • Application Developers
  • DevOps Engineers
  • US Government Employees, contractors and consultants that need to meet DoD Directive 8570.1 Baseline Certifications
  • Target Audiences

  • CSSLP exam candidates interested in passing the exam with targeted content
  • Software Engineers
  • Software developers
  • Software testers
  • CISSP and IT Security Experts
  • Software Procurement Analyst
  • Application Developers
  • DevOps Engineers
  • US Government Employees, contractors and consultants that need to meet DoD Directive 8570.1 Baseline Certifications
  • Please note that the content is broken into TWO Courses. This is Course ONE which is available now on Udemy.

    Domain 1-4 is covered in this course. 

    Content between two courses is over 20 hours.

    Earning the globally recognized CSSLP secure software development certification is a proven way to build your career and better incorporate security practices into each phase of the software development lifecycle (SDLC).

    CSSLP certification recognizes leading application security skills. It shows employers and peers you have the advanced technical skills and knowledge necessary for authentication, authorization and auditing throughout the SDLC using best practices, policies and procedures established by the cybersecurity experts at (ISC)2.

    Obtaining your certification will prove your skills, help advance your career, and even gain support from a community of cybersecurity leaders here to help you throughout your professional journey.

    The Certified Secure Software Lifecycle Professional (CSSLP) certification is a vendor neutral credential; launched in 2008 by the International Information System Security Certification Consortium, or (ISC)2. This exam is very challenging even to software developers with experience because of the depth of knowledge required to learn in order to pass.

    This course has been developed by an industry professional with over twenty years of IT experience. Course contains numerous aids to help the learning process such as demos, discussions, whiteboard designs, test tips, practice reviews and practice questions.

    The CSSLP certification validates that the certified professional has the expertise to include the best security practices, auditing, and authorization into each phase of the Software Development Lifecycle (SDLC). SDLC phases include software design, implementation, testing, and deployment.

    After earning their CSSLP certification, a software professional will be able to develop a software security program in their organization, reduce production cost, mitigate source code vulnerabilities, and reduce losses because of software breaches.

    The CSSLP meets the Level I and II IA System Architecture and Engineering requirements of the DoD mandate 8570.01M. Additionally, the CSSLP certification is accredited for the requirements of ANSI/IEC/ISO Standard-17024.

    The CSSLP certification exam is a well written exam evaluating potential candidates across eight different domains. The exam contains 175 question, multiple-choice exam is administered over a 4-hour period at a Pearson Professional Center.

    The CSSLP exam questions are developed from the skills and information contained within the CSSLP CBK with the following tested percentages.

    Note Course is broken into TWO Courses due to size of content.

    Course One Contains content for these Domains (This Course).

    1. Secure Software Concepts – 13%

    2. Secure Software Requirements – 14%

    3. Secure Software Design – 16% Secure Software Implementation/Programming – 16%

    Course Two Contains these Domain Objectives.

    1. Secure Software Testing – 14%

    2. Secure Lifecycle Management – 10%

    3. Software Development, Operations, and Maintenance – 9%

    4. Supply Chain and Software Acquisition – 8%

    Who would be the target audience?

    The audience should be willing to study and review materials to pass the CSSLP Plus and meet the requirements set by ISC2

    In order to become a fully certified CSSLP, (ISC)2 requires the candidate to have a minimum of four years cumulative paid full-time SDLC experience in one or more of the eight domains of the CSSLP credential. A candidate can substitute one year of experience for a four-year college degree. If a candidate passes the certification exam but does not possess the required years of experience they will become an associate of (ISC)2 and have five years to earn the experience. At which time they will become a fully certified CSSLP.

    Roles which would benefit from taking the exam.

    Software Developers Software Engineers DevOps Engineers Enterprise Architects Application Developers Security Professionals

    What you will learn

    ? Protecting data and business assets and complying with applicable laws and regulations

    ? Following secure coding standards and how documentation can help in the maintenance and operations of software

    ? Identifying software vulnerabilities and how to perform testing of units of code

    ? Managing each phase of the software development life cycle (SDLC)

    ? Developing security to meet environmental risk and operational challenges

    ? Supporting incident response, patch and vulnerability management, and continuity of operations

    ? Supporting the software acquisitions process

    ? Understanding security related frameworks and best practices

    TechCommanders is an online training platform for both aspiring and veteran IT professionals interested in next generation IT Skills.
    TechCommanders is led by Joseph Holbrook, a highly sought-after technology industry veteran.

    Techcommanders offers blended learning which allows the students to learn on demand but with live training.

    Courses offered are used to prepare students to take certification exams in Cloud, DevOps, IT Security and Blockchain.

    Techcommanders was established in Jacksonville, Florida in 2020 by Joseph Holbrook, both a US Navy Veteran and a technology industry veteran. Techcommanders, Advancing your NextGen Technology Skills.

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Introduction

    Lecture 2: Course Requirements

    Lecture 3: What is a CSSLP?

    Lecture 4: Why a CSSLP Certification Matters

    Lecture 5: DoD Approved 8570 Baseline Certifications

    Lecture 6: Exam Logistics Overview

    Lecture 7: Exam Requirements

    Lecture 8: Course Material Download

    Chapter 2: Objective Coverage – Secure Software Concepts 13%

    Lecture 1: Section Overview

    Lecture 2: 1.1 Core Concepts

    Lecture 3: Confidentiality, integrity and Availability (CIA)

    Lecture 4: Non Repudiation

    Lecture 5: AAA

    Lecture 6: 1.2 Security Design Principles

    Lecture 7: Least Privalage

    Lecture 8: Separation of duties

    Lecture 9: Defense in Depth

    Lecture 10: Whiteboard – Defense in Depth

    Lecture 11: Fail Safe

    Lecture 12: Economy of Mechanism

    Lecture 13: Complete Remediation

    Lecture 14: Open Design

    Lecture 15: Least Common Mechanism

    Lecture 16: Psychological acceptability

    Lecture 17: Leveraging existing components

    Lecture 18: Eliminate single point of failure

    Lecture 19: Hashing Demo

    Lecture 20: Test Tips Section 1

    Lecture 21: Section 1 Review Questions

    Chapter 3: 2. Secure Software Requirements

    Lecture 1: Section Overview

    Lecture 2: 2.1 Identify Security Requirements

    Lecture 3: Functional and Non Functional Requirements

    Lecture 4: Terminology To Know Part 1

    Lecture 5: Whiteboard

    Lecture 6: Terminology to Know Part 2

    Lecture 7: Owasp

    Lecture 8: Terminology to Know Part 3

    Lecture 9: Policy decomposition

    Lecture 10: Legal Terminology to Know

    Lecture 11: Privacy Requirements

    Lecture 12: Control Basics

    Lecture 13: 2.2 Interpret Data Classification Requirements

    Lecture 14: Data Classification overview- Ownership, Labeling, Data Types, Data Lifecycle

    Lecture 15: 2.3 Identify Privacy Requirements

    Lecture 16: Data Anonymization

    Lecture 17: 2.4 Develop Misuse and Abuse Cases

    Lecture 18: Abuse Cases

    Lecture 19: 2.5 Include Security in Software Requirement Specifications

    Lecture 20: Maturity Model

    Lecture 21: Threats

    Lecture 22: Threat Modeling

    Lecture 23: Orgs to Know

    Lecture 24: 2.6 Develop Security Requirement Traceability Matrix

    Lecture 25: SRTM

    Lecture 26: Safecode

    Lecture 27: Test Tips

    Lecture 28: Section Review Questions

    Chapter 4: 3. Secure Software Design 16%

    Lecture 1: 3. Secure Software Design 16%

    Lecture 2: 3.1 Perform Threat Modeling

    Lecture 3: Common Threats

    Lecture 4: Threats and Threat Modeling

    Lecture 5: Threat Models

    Lecture 6: What is a Threat Tree?

    Lecture 7: Whiteboard – Threat Tree

    Lecture 8: Attack surface evaluation

    Lecture 9: Terminology to know

    Lecture 10: 3.2 Define the Security Architecture

    Lecture 11: Control identification and prioritization

    Lecture 12: Whiteboard – Controls

    Lecture 13: Distributed computing

    Lecture 14: Service-oriented architecture

    Lecture 15: Whiteboard SOA

    Lecture 16: Rich Internet Apps

    Lecture 17: Embedded Devices

    Lecture 18: Cloud Computing

    Lecture 19: Whiteboard – Cloud Computing

    Lecture 20: Cloud Security Best Practices – AWS

    Lecture 21: Cloud Security Best Practices – GCP

    Lecture 22: Mobile Apps

    Lecture 23: Whiteboard – Mobile and SSO

    Lecture 24: Hardware Platform Concerns

    Lecture 25: 3.3 Performing Secure Interface Design

    Lecture 26: Security management interfaces, out-of-band management, log interfaces

    Lecture 27: Whiteboard – In Band and Out of Band Management

    Lecture 28: Whiteboard – Interfaces

    Lecture 29: Network Protocol design choices

    Lecture 30: Whiteboard SSH

    Lecture 31: API Design Choices

    Lecture 32: 3.4 Performing Architectural Risk Assessment

    Lecture 33: Architectural Risk Assement

    Lecture 34: Whiteboard – Risk Assessment

    Lecture 35: Risk Registers

    Lecture 36: Whiteboard – Risk Registers

    Lecture 37: Risk Management Plans

    Instructors

  • Certified Secure Software Lifecycle Pro (CSSLP) Crash Course  No.2
    Joseph Holbrook (The Cloud Tech Guy)
    Cloud Computing and Blockchain Architect/Blogger/Trainer
  • Rating Distribution

  • 1 stars: 5 votes
  • 2 stars: 6 votes
  • 3 stars: 6 votes
  • 4 stars: 31 votes
  • 5 stars: 30 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!