Certified Secure Software Lifecycle Professional (CSSLP) 2019: Abuse Cases & RTMs

CSSLP 2019
  • 6 Videos | 17m 59s
  • Includes Assessment
  • Earns a Badge
Likes 18 Likes 18
This 6-video course explores numerous concepts important in developing secure software requirements. First, learn the purpose of use cases which is a powerful graphical technique for mapping out the functional requirements of a system, and how they can be designed for both developers and testers. The course then explores misuse/abuse cases to examine prohibited activities or a typical attack, and demonstrates an attack through specific misuse case scenarios. Learners examine the benefits of a traceability matrix, a table structure used for documenting and managing requirements, and learn to track implementation details and specifics. This course explores aspects of secure software, and reliable attributes common to all secure software. You will learn that in recovering data, secure software must be predictable and designed to limit damage. Then examine the importance of gathering of security requirements while gathering software requirements. Finally, you will learn how confidentiality requirements detail the ways in which a system must protect against unauthorized disclosure. This course may be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe how use cases model the intended behavior of the software or system
    describe when to use misuse/abuse cases
  • list the benefits of RTM for software development
    list software requirement specifications such as confidentiality, integrity, availability, authentication, authorization, and accountability
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 40s
    UP NEXT
  • Playable
    2. 
    Use Cases
    3m 18s
  • Locked
    3. 
    Misuse Cases
    1m 58s
  • Locked
    4. 
    Requirements Traceability Matrix
    3m 37s
  • Locked
    5. 
    Software Requirement Specifications
    4m 12s
  • Locked
    6. 
    Course Summary
    1m 14s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.