Training content
The Certified Secure Software Lifecycle Professional (CSSLP) is a certification created and conferred by the International Information Systems Security Consortium, known as ISC2 for short. Using only the most current sources and information, this course will bring insights and knowledge to add to your experience and thus prepare you to successfully take and pass the certification examination. Having the CSSLP credentials signifies that its owner is both skilled and experienced in addressing these complex situations effectively, and thus enabling them to provide much-needed support to their team's efforts.
Intended Audience
This is a unique certification intended for those involved in the software development process, who need to understand how to bring security into the picture, an interesting and important aspect of systems development and operation.
Learning Objectives
In this course, we will cover foundational knowledge and ideas about what informs the designing and building of secure software. As a result, by the end of this course, you will have an understanding of:
- The CIA Triad
- Authorization, Authentication, and Accounting
- Design Principles
- Security Models
- Access Controls
- Threat/Adversary Analysis
- Risk management problem space and management flow
- Definitions, terminology, and types of risks
- Control Categories and Functions
- Cost-Benefit Assessment
- General Risk Assessment Model
- Overall Control Objectives
- Security policies, regulations, and compliance
- The legal and privacy issues that these regulations aim to address
- A variety of security frameworks and standards
- Trusted computed principles and how they underpin security frameworks
- Security implications of acquiring software
- The secure development lifecycle and the implications it has on your software
- The various software development methods for keeping your environments secure
- The software development lifecycle
Agenda
1:1 - Secure software concepts
1:2 - Risk Management
1:3 - Security, policies, and regulations
1:4 - Software Development Methodologies
Feedback
If you have any feedback please contact us at support@cloudacademy.com, thank you!
About the Author
Mr. Leo has been in Information System for 38 years, and an Information Security professional for over 36 years. He has worked internationally as a Systems Analyst/Engineer, and as a Security and Privacy Consultant. His past employers include IBM, St. Luke’s Episcopal Hospital, Computer Sciences Corporation, and Rockwell International. A NASA contractor for 22 years, from 1998 to 2002 he was Director of Security Engineering and Chief Security Architect for Mission Control at the Johnson Space Center. From 2002 to 2006 Mr. Leo was the Director of Information Systems, and Chief Information Security Officer for the Managed Care Division of the University of Texas Medical Branch in Galveston, Texas.
Upon attaining his CISSP license in 1997, Mr. Leo joined ISC2 (a professional role) as Chairman of the Curriculum Development Committee, and served in this role until 2004. During this time, he formulated and directed the effort that produced what became and remains the standard curriculum used to train CISSP candidates worldwide. He has maintained his professional standards as a professional educator and has since trained and certified nearly 8500 CISSP candidates since 1998, and nearly 2500 in HIPAA compliance certification since 2004. Mr. leo is an ISC2 Certified Instructor.