What do you want to learn today?

Details

This course is designed to take you through all aspects of the secure software lifecycle incorporating planning, designing, developing, acquiring, testing, deploying, maintaining, and managing software. You will learn a series of software methodologies to develop software that is secure and resilient to attacks while meeting software requirements for compliance, quality, functionality and assurance through design principles and processes. Participants will gain programming concepts that can effectively protect software from vulnerabilities. You will gain skills to manage risk through the adoption of standards and best practices for the proper development, testing, and learning to employ tools and resources necessary to mitigate risk across the entire lifecycle of products all while preparing for the official (ISC)2 CSSLP exam. 

Note: This is to declare that it is a DoD approved course.

Outline

  1. Domain 1: Secure Software Concepts
    1. Concepts of Secure Software
    2. Principles of Security Design
    3. Security Privacy
    4. Governance, Risk, and Compliance
    5. Methodologies for Software Development
  2. Domain 2: Security Software Requirements
    1. Policy Decomposition
    2. Classification and Categorization
    3. Functional Requirements - Use Cases and Abuse Cases
    4. Secure Software Operational Requirements
  3. Domain 3 - Secure Software Design
    1. Importance of Secure Design
    2. Design Considerations
    3. The Design Process
    4. Securing Commonly Used Architectures
  4. Domain 4 - Secure Software Implementation/coding
    1. Fundamental Programming Concepts
    2. Code Access Security
    3. Vulnerability Databases and Lists
    4. Defensive Coding Practices and Controls
    5. Secure Software Processes
  5. Domain 5 - Security Software Testing
    1. Artifacts of Testing
    2. Testing for Secure Quality Assurance
    3. Types of Testing
    4. Impact Assessment and Corrective Action
    5. Test Data Lifecycle Management
  6. Domain 6 - Software Acceptance
    1. Software Acceptance Considerations
    2. Post-release
  7. Domain 7 - Software Deployment, Operation, Maintenance and Disposal
    1. Installation and Deployment
    2. Operations and Maintenance
    3. Disposal of Software
  8. Domain 8 - Supply Chain and Software Acquisition
    1. Supplier Risk Assessment
    2. Supplier Sourcing
    3. Software Development and Test
    4. Software Delivery, Operations and Maintenance
    5. Supplier Transitioning
Reviews
Be the first to write a review about this course.
Write a Review

NetCom Learning helps build innovative learning organizations in the workplace by structuring a smarter workforce, supporting learning changes, and driving learning growth. Since 1998 we have been empowering organizations to reach optimal performance results and address challenges by managing all aspects of organizational learning.

With a team of dedicated and knowledgeable learning professionals having deep subject-matter expertise, NetCom Learning has serviced over 80% of Fortune 100 companies. We've helped over 10,000 organizations achieve their business goals by offering a full complement of Managed Learning Services, including IT and business training, curriculum design and content development, learning delivery and administration, consulting and advisory services, and management of learning technology.

NetCom Learning is honored to be recognized as Microsoft's Worldwide Training Partner of the Year by Microsoft and as a Top 20 IT Training Company by TrainingIndustry.com for three years. We offer over 1,500 courses available to organizations around the world, encompassing all your technology and business training needs. From authorized or foundational training to specialized certifications, we empower organizations to achieve a competitive advantage. In addition, we provide customers with a choice of customized private programs, convenient scheduling options, flexible delivery formats, and continuous learning support, all tailored towards minimizing the skills gap and gaining maximum business impact for your organization. ...

Sending Message
Please wait...
× × Speedycourse.com uses cookies to deliver our services. By continuing to use the site, you are agreeing to our use of cookies, Privacy Policy, and our Terms & Conditions.