Resumen del Curso
Official ISC2® CSSLP® CBK® Training Seminar
This official training seminar is your exclusive way to learn security best practices and industr y standards for the software lifecycle – critical information to CSSLP. Through this program you will gain knowledge and learn how security should be built into each phase of the software lifecycle. It also details essential security measures that should take place, beginning with the requirement phase, through software specification and design, software testing and ultimately disposal.
This intense program provides an in-depth breakdown of the CSSLP domains, while identifying key study areas, including:
- Official (ISC) courseware
- Taught by an authorized ISC2 instructor
- Student handbook
- Real-world case studies and examples 2
Quién debería asistir
- Software Architect
- Software Engineer
- Software Developer
- Application Security Specialist
- Software Program Manager
- Quality Assurance Tester
- Penetration Tester
- Software Procurement Analyst
- Project Manager
- Security Manager
- IT Director/Manager
Objetivos del curso
The CSSLP Helps You:
- Validate your exper tise in application security.
- Conquer application vulnerabilities offering more value to your employer.
- Demonstrate a working knowledge of application security.
- Differentiate and enhance your credibility and marketability on a worldwide scale.
- Affirm your commitment to continued competence in the most current best practices through (ISC)’s Continuing Professional Education (CPE) requirements.
The CSSLP Helps Employers:
- Break the penetrate and patch test approach.
- Reduce production cost, vulnerabilities and deliver y delays.
- Enhance the credibility of your organization and its development team.
- Reduce loss of revenue and reputation due to a breach resulting from insecure software.
- Ensure compliance with government or industr y regulations.
Contenido del curso
Secure Software Concepts – security implications and methodologies within centralized and decentralized environments across the enterprise’s computer systems in software development.
- Core Concepts
- Security Design Principles
- Privacy
- Governance, Risk and Compliance
- Software Development Methodologies
Secure Software Requirements – capturing security controls used during the requirements phase to integrate security within the process, to identify key security objectives, and to maximize software security while minimizing disruption to plans and schedules.
- Policy Decomposition
- Data Classification & Categorization
- Functional Requirements
- Operational Requirements
Secure Software Design – translating security requirements into application design elements including documenting the elements of the software attack surfaces, conducting threat modeling, and defining any specific security criteria.
- Design Processes
- Design Considerations
- Securing Commonly Used Architecture
- Technologies
Secure Software Implementation/Coding – involves the application of coding and testing standards, applying security testing tools including ‘fuzzing’, static-analysis code scanning tools, and conducting code reviews.
- Declarative versus Imperative (Programmatic) Security
- Vulnerability Database / Lists
- Defensive Coding Practices and Controls
- Source Code and Versioning
- Development and Build Environment
- Code / Peer Review
- Code Analysis
- Anti-tampering Techniques
Secure Software Testing – integrated QA testing for security functionality and resiliency to attack.
- Testing Ar tifacts
- Testing for Security and Quality Assurance
- Types of Testing
- Impact Assessment and Corrective Action
- Test Data Lifecycle Management
Software Acceptance – security implications in the software acceptance phase including completion criteria, risk acceptance and documentation, Common Criteria and methods of independent testing.
- Pre-Release or Pre-Deployment
- Post-Release
Software Deployment, Operations, Maintenance and Disposal – security issues around steady state operations and management of software. Security measures that must be taken when a product reaches its end of life.
- Installation and Deployment
- Operations and Maintenance
- Software Disposal
Supply Chain & Software Acquisition – provides a holistic outline of the knowledge and tasks required in managing risk for outsourced development, acquisition, and procurement of software and related ser vices.
- Supplier Risk Assessment
- Supplier Sourcing
- Software Development Test
- Software Deliver y, Operations & Maintenance
- Supplier Transitioning
Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common application flaws are previous, rediscovered threats. This high volume of known application vulnerabilities suggests that many development teams do not have the security resources needed to address all potential security flaws and a clear shor tage of qualified professionals with application security skills exists. Without action, this soft underbelly of business and governmental entities has and will continue to be exposed with serious consequences—data breaches, disrupted operations, lost business, brand damage, and regulator y fines. This is why it is essential for software professionals to stay current on the latest advances in software development and the new security threats they create.
The Cer tified Secure Software Lifecycle Professional (CSSLP) certification validates that software professionals have the exper tise to incorporate security practices – authentication, authorization and auditing – into each phase of the software development lifecycle, from software design and implementation to testing and deployment.